Hay
Date
July 15, 2025, 2:09 p.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   19.893374] ==================================================================
[   19.893435] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.893489] Read of size 1 at addr fff00000c5996240 by task kunit_try_catch/233
[   19.893541] 
[   19.893570] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.893655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.893683] Hardware name: linux,dummy-virt (DT)
[   19.894325] Call trace:
[   19.894449]  show_stack+0x20/0x38 (C)
[   19.894610]  dump_stack_lvl+0x8c/0xd0
[   19.894789]  print_report+0x118/0x5d0
[   19.894908]  kasan_report+0xdc/0x128
[   19.894959]  __asan_report_load1_noabort+0x20/0x30
[   19.895011]  mempool_uaf_helper+0x314/0x340
[   19.895059]  mempool_slab_uaf+0xc0/0x118
[   19.895105]  kunit_try_run_case+0x170/0x3f0
[   19.895339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.895534]  kthread+0x328/0x630
[   19.895633]  ret_from_fork+0x10/0x20
[   19.895826] 
[   19.895893] Allocated by task 233:
[   19.896080]  kasan_save_stack+0x3c/0x68
[   19.896157]  kasan_save_track+0x20/0x40
[   19.896195]  kasan_save_alloc_info+0x40/0x58
[   19.896529]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.896713]  remove_element+0x16c/0x1f8
[   19.896786]  mempool_alloc_preallocated+0x58/0xc0
[   19.896962]  mempool_uaf_helper+0xa4/0x340
[   19.897053]  mempool_slab_uaf+0xc0/0x118
[   19.897217]  kunit_try_run_case+0x170/0x3f0
[   19.897269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.897521]  kthread+0x328/0x630
[   19.897568]  ret_from_fork+0x10/0x20
[   19.897611] 
[   19.897651] Freed by task 233:
[   19.897706]  kasan_save_stack+0x3c/0x68
[   19.898406]  kasan_save_track+0x20/0x40
[   19.898474]  kasan_save_free_info+0x4c/0x78
[   19.898607]  __kasan_mempool_poison_object+0xc0/0x150
[   19.898738]  mempool_free+0x28c/0x328
[   19.898891]  mempool_uaf_helper+0x104/0x340
[   19.898998]  mempool_slab_uaf+0xc0/0x118
[   19.899138]  kunit_try_run_case+0x170/0x3f0
[   19.899264]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.899334]  kthread+0x328/0x630
[   19.899610]  ret_from_fork+0x10/0x20
[   19.899752] 
[   19.899794] The buggy address belongs to the object at fff00000c5996240
[   19.899794]  which belongs to the cache test_cache of size 123
[   19.899917] The buggy address is located 0 bytes inside of
[   19.899917]  freed 123-byte region [fff00000c5996240, fff00000c59962bb)
[   19.899993] 
[   19.900042] The buggy address belongs to the physical page:
[   19.900306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105996
[   19.900384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.900480] page_type: f5(slab)
[   19.900583] raw: 0bfffe0000000000 fff00000c1c3adc0 dead000000000122 0000000000000000
[   19.900636] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.900821] page dumped because: kasan: bad access detected
[   19.900863] 
[   19.900881] Memory state around the buggy address:
[   19.900943]  fff00000c5996100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.901021]  fff00000c5996180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.901130] >fff00000c5996200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   19.901267]                                            ^
[   19.901362]  fff00000c5996280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.901467]  fff00000c5996300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.901538] ==================================================================
[   19.856833] ==================================================================
[   19.857147] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   19.857230] Read of size 1 at addr fff00000c59e4a00 by task kunit_try_catch/229
[   19.857283] 
[   19.857783] CPU: 0 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.857982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.858074] Hardware name: linux,dummy-virt (DT)
[   19.858148] Call trace:
[   19.858196]  show_stack+0x20/0x38 (C)
[   19.858308]  dump_stack_lvl+0x8c/0xd0
[   19.858377]  print_report+0x118/0x5d0
[   19.858447]  kasan_report+0xdc/0x128
[   19.858493]  __asan_report_load1_noabort+0x20/0x30
[   19.858544]  mempool_uaf_helper+0x314/0x340
[   19.858858]  mempool_kmalloc_uaf+0xc4/0x120
[   19.858937]  kunit_try_run_case+0x170/0x3f0
[   19.859002]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.859073]  kthread+0x328/0x630
[   19.859164]  ret_from_fork+0x10/0x20
[   19.859238] 
[   19.859276] Allocated by task 229:
[   19.859326]  kasan_save_stack+0x3c/0x68
[   19.859405]  kasan_save_track+0x20/0x40
[   19.859494]  kasan_save_alloc_info+0x40/0x58
[   19.859571]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.859639]  remove_element+0x130/0x1f8
[   19.859696]  mempool_alloc_preallocated+0x58/0xc0
[   19.859886]  mempool_uaf_helper+0xa4/0x340
[   19.860417]  mempool_kmalloc_uaf+0xc4/0x120
[   19.860556]  kunit_try_run_case+0x170/0x3f0
[   19.860668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.861006]  kthread+0x328/0x630
[   19.861192]  ret_from_fork+0x10/0x20
[   19.861252] 
[   19.861417] Freed by task 229:
[   19.861510]  kasan_save_stack+0x3c/0x68
[   19.861739]  kasan_save_track+0x20/0x40
[   19.861818]  kasan_save_free_info+0x4c/0x78
[   19.861959]  __kasan_mempool_poison_object+0xc0/0x150
[   19.862058]  mempool_free+0x28c/0x328
[   19.862136]  mempool_uaf_helper+0x104/0x340
[   19.862708]  mempool_kmalloc_uaf+0xc4/0x120
[   19.863174]  kunit_try_run_case+0x170/0x3f0
[   19.863323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.863476]  kthread+0x328/0x630
[   19.863588]  ret_from_fork+0x10/0x20
[   19.863719] 
[   19.863772] The buggy address belongs to the object at fff00000c59e4a00
[   19.863772]  which belongs to the cache kmalloc-128 of size 128
[   19.863860] The buggy address is located 0 bytes inside of
[   19.863860]  freed 128-byte region [fff00000c59e4a00, fff00000c59e4a80)
[   19.864254] 
[   19.864322] The buggy address belongs to the physical page:
[   19.864434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   19.864714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.864922] page_type: f5(slab)
[   19.865032] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.865086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.865332] page dumped because: kasan: bad access detected
[   19.865542] 
[   19.865576] Memory state around the buggy address:
[   19.865850]  fff00000c59e4900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.866038]  fff00000c59e4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.866098] >fff00000c59e4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.866467]                    ^
[   19.866583]  fff00000c59e4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.866639]  fff00000c59e4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.866842] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   19.837067] ==================================================================
[   19.837141] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.837199] Read of size 1 at addr fff00000c59912bb by task kunit_try_catch/227
[   19.837281] 
[   19.837319] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.837412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.837437] Hardware name: linux,dummy-virt (DT)
[   19.837466] Call trace:
[   19.837487]  show_stack+0x20/0x38 (C)
[   19.837755]  dump_stack_lvl+0x8c/0xd0
[   19.837818]  print_report+0x118/0x5d0
[   19.837865]  kasan_report+0xdc/0x128
[   19.837908]  __asan_report_load1_noabort+0x20/0x30
[   19.837976]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.838067]  mempool_slab_oob_right+0xc0/0x118
[   19.838143]  kunit_try_run_case+0x170/0x3f0
[   19.838253]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.838327]  kthread+0x328/0x630
[   19.838406]  ret_from_fork+0x10/0x20
[   19.838493] 
[   19.838511] Allocated by task 227:
[   19.838563]  kasan_save_stack+0x3c/0x68
[   19.838631]  kasan_save_track+0x20/0x40
[   19.838679]  kasan_save_alloc_info+0x40/0x58
[   19.838740]  __kasan_mempool_unpoison_object+0xbc/0x180
[   19.838792]  remove_element+0x16c/0x1f8
[   19.838830]  mempool_alloc_preallocated+0x58/0xc0
[   19.838872]  mempool_oob_right_helper+0x98/0x2f0
[   19.838913]  mempool_slab_oob_right+0xc0/0x118
[   19.838951]  kunit_try_run_case+0x170/0x3f0
[   19.839241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.839330]  kthread+0x328/0x630
[   19.839418]  ret_from_fork+0x10/0x20
[   19.839499] 
[   19.839569] The buggy address belongs to the object at fff00000c5991240
[   19.839569]  which belongs to the cache test_cache of size 123
[   19.839686] The buggy address is located 0 bytes to the right of
[   19.839686]  allocated 123-byte region [fff00000c5991240, fff00000c59912bb)
[   19.839787] 
[   19.839859] The buggy address belongs to the physical page:
[   19.839906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105991
[   19.839976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.840042] page_type: f5(slab)
[   19.840122] raw: 0bfffe0000000000 fff00000c1c3ac80 dead000000000122 0000000000000000
[   19.840198] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   19.840287] page dumped because: kasan: bad access detected
[   19.840321] 
[   19.840338] Memory state around the buggy address:
[   19.840613]  fff00000c5991180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.840689]  fff00000c5991200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   19.840745] >fff00000c5991280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   19.840876]                                         ^
[   19.840925]  fff00000c5991300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.841027]  fff00000c5991380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.841106] ==================================================================
[   19.808413] ==================================================================
[   19.808477] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.808533] Read of size 1 at addr fff00000c7932001 by task kunit_try_catch/225
[   19.808583] 
[   19.808614] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.808696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.808723] Hardware name: linux,dummy-virt (DT)
[   19.808754] Call trace:
[   19.809471]  show_stack+0x20/0x38 (C)
[   19.809557]  dump_stack_lvl+0x8c/0xd0
[   19.809655]  print_report+0x118/0x5d0
[   19.809719]  kasan_report+0xdc/0x128
[   19.809775]  __asan_report_load1_noabort+0x20/0x30
[   19.809826]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.810014]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   19.810530]  kunit_try_run_case+0x170/0x3f0
[   19.810673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.810883]  kthread+0x328/0x630
[   19.810932]  ret_from_fork+0x10/0x20
[   19.811326] 
[   19.811363] The buggy address belongs to the physical page:
[   19.811478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107930
[   19.811721] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.811802] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.812188] page_type: f8(unknown)
[   19.812282] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.812341] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.812460] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.812698] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.813165] head: 0bfffe0000000002 ffffc1ffc31e4c01 00000000ffffffff 00000000ffffffff
[   19.813440] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.813489] page dumped because: kasan: bad access detected
[   19.813521] 
[   19.813541] Memory state around the buggy address:
[   19.813792]  fff00000c7931f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.813854]  fff00000c7931f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.814048] >fff00000c7932000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.814090]                    ^
[   19.814119]  fff00000c7932080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.814684]  fff00000c7932100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   19.814873] ==================================================================
[   19.791389] ==================================================================
[   19.791468] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   19.791540] Read of size 1 at addr fff00000c59e4673 by task kunit_try_catch/223
[   19.791591] 
[   19.791632] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.791720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.791748] Hardware name: linux,dummy-virt (DT)
[   19.791782] Call trace:
[   19.791805]  show_stack+0x20/0x38 (C)
[   19.791856]  dump_stack_lvl+0x8c/0xd0
[   19.791906]  print_report+0x118/0x5d0
[   19.791951]  kasan_report+0xdc/0x128
[   19.791996]  __asan_report_load1_noabort+0x20/0x30
[   19.792045]  mempool_oob_right_helper+0x2ac/0x2f0
[   19.792097]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.792147]  kunit_try_run_case+0x170/0x3f0
[   19.792197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.792271]  kthread+0x328/0x630
[   19.792318]  ret_from_fork+0x10/0x20
[   19.792372] 
[   19.792393] Allocated by task 223:
[   19.792424]  kasan_save_stack+0x3c/0x68
[   19.792464]  kasan_save_track+0x20/0x40
[   19.792501]  kasan_save_alloc_info+0x40/0x58
[   19.792540]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.792584]  remove_element+0x130/0x1f8
[   19.792624]  mempool_alloc_preallocated+0x58/0xc0
[   19.792665]  mempool_oob_right_helper+0x98/0x2f0
[   19.792707]  mempool_kmalloc_oob_right+0xc4/0x120
[   19.792749]  kunit_try_run_case+0x170/0x3f0
[   19.792790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.792835]  kthread+0x328/0x630
[   19.792872]  ret_from_fork+0x10/0x20
[   19.792908] 
[   19.792927] The buggy address belongs to the object at fff00000c59e4600
[   19.792927]  which belongs to the cache kmalloc-128 of size 128
[   19.792988] The buggy address is located 0 bytes to the right of
[   19.792988]  allocated 115-byte region [fff00000c59e4600, fff00000c59e4673)
[   19.793055] 
[   19.793077] The buggy address belongs to the physical page:
[   19.793111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   19.793168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.793233] page_type: f5(slab)
[   19.793276] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.793348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.793394] page dumped because: kasan: bad access detected
[   19.793440] 
[   19.793463] Memory state around the buggy address:
[   19.793498]  fff00000c59e4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.793544]  fff00000c59e4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.793587] >fff00000c59e4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.793627]                                                              ^
[   19.793668]  fff00000c59e4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.793712]  fff00000c59e4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   19.793752] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   20.435090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   20.522308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   20.516771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   20.456228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   20.259392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   20.215001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   51.534327] ==================================================================
[   51.534405] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   51.534405] 
[   51.534488] Use-after-free read at 0x0000000008442b72 (in kfence-#152):
[   51.534540]  test_krealloc+0x51c/0x830
[   51.534585]  kunit_try_run_case+0x170/0x3f0
[   51.534628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.534675]  kthread+0x328/0x630
[   51.534716]  ret_from_fork+0x10/0x20
[   51.534756] 
[   51.534780] kfence-#152: 0x0000000008442b72-0x000000002418ac05, size=32, cache=kmalloc-32
[   51.534780] 
[   51.534835] allocated by task 339 on cpu 1 at 51.533680s (0.001152s ago):
[   51.534903]  test_alloc+0x29c/0x628
[   51.534942]  test_krealloc+0xc0/0x830
[   51.534981]  kunit_try_run_case+0x170/0x3f0
[   51.535022]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.535068]  kthread+0x328/0x630
[   51.535107]  ret_from_fork+0x10/0x20
[   51.535145] 
[   51.535168] freed by task 339 on cpu 1 at 51.533936s (0.001228s ago):
[   51.535240]  krealloc_noprof+0x148/0x360
[   51.535280]  test_krealloc+0x1dc/0x830
[   51.535318]  kunit_try_run_case+0x170/0x3f0
[   51.535358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.535403]  kthread+0x328/0x630
[   51.535442]  ret_from_fork+0x10/0x20
[   51.535480] 
[   51.535523] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   51.535602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.535632] Hardware name: linux,dummy-virt (DT)
[   51.535667] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   51.441834] ==================================================================
[   51.441931] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   51.441931] 
[   51.442028] Use-after-free read at 0x000000003da52c74 (in kfence-#151):
[   51.442084]  test_memcache_typesafe_by_rcu+0x280/0x560
[   51.442133]  kunit_try_run_case+0x170/0x3f0
[   51.442181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.442250]  kthread+0x328/0x630
[   51.442293]  ret_from_fork+0x10/0x20
[   51.442334] 
[   51.442357] kfence-#151: 0x000000003da52c74-0x000000001f7f9cd0, size=32, cache=test
[   51.442357] 
[   51.442412] allocated by task 337 on cpu 0 at 51.429741s (0.012667s ago):
[   51.442482]  test_alloc+0x230/0x628
[   51.442521]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   51.442564]  kunit_try_run_case+0x170/0x3f0
[   51.442604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.442649]  kthread+0x328/0x630
[   51.442688]  ret_from_fork+0x10/0x20
[   51.442727] 
[   51.442750] freed by task 337 on cpu 0 at 51.429852s (0.012895s ago):
[   51.442805]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   51.442845]  kunit_try_run_case+0x170/0x3f0
[   51.442887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.442931]  kthread+0x328/0x630
[   51.442970]  ret_from_fork+0x10/0x20
[   51.443008] 
[   51.443055] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   51.443134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.443163] Hardware name: linux,dummy-virt (DT)
[   51.443198] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   28.673239] ==================================================================
[   28.673400] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   28.673400] 
[   28.673502] Invalid read at 0x00000000d3f92f65:
[   28.673974]  test_invalid_access+0xdc/0x1f0
[   28.674069]  kunit_try_run_case+0x170/0x3f0
[   28.674124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.674430]  kthread+0x328/0x630
[   28.674488]  ret_from_fork+0x10/0x20
[   28.674544] 
[   28.674876] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   28.674969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.675006] Hardware name: linux,dummy-virt (DT)
[   28.675592] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   28.445953] ==================================================================
[   28.446046] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.446046] 
[   28.446108] Corrupted memory at 0x00000000d208c000 [ ! . . . . . . . . . . . . . . . ] (in kfence-#147):
[   28.446437]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.446485]  kunit_try_run_case+0x170/0x3f0
[   28.446529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.446573]  kthread+0x328/0x630
[   28.446615]  ret_from_fork+0x10/0x20
[   28.446654] 
[   28.446678] kfence-#147: 0x0000000029e18e68-0x00000000a96e3cc9, size=73, cache=kmalloc-96
[   28.446678] 
[   28.446734] allocated by task 327 on cpu 1 at 28.445719s (0.001011s ago):
[   28.446796]  test_alloc+0x29c/0x628
[   28.446835]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   28.446877]  kunit_try_run_case+0x170/0x3f0
[   28.446918]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.446964]  kthread+0x328/0x630
[   28.447003]  ret_from_fork+0x10/0x20
[   28.447041] 
[   28.447065] freed by task 327 on cpu 1 at 28.445870s (0.001191s ago):
[   28.447125]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   28.447167]  kunit_try_run_case+0x170/0x3f0
[   28.447218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.447262]  kthread+0x328/0x630
[   28.447302]  ret_from_fork+0x10/0x20
[   28.447342] 
[   28.447383] CPU: 1 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   28.447462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.447490] Hardware name: linux,dummy-virt (DT)
[   28.447521] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   28.341885] ==================================================================
[   28.341960] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   28.341960] 
[   28.342052] Out-of-bounds read at 0x0000000060d169f8 (105B right of kfence-#146):
[   28.342114]  test_kmalloc_aligned_oob_read+0x238/0x468
[   28.342162]  kunit_try_run_case+0x170/0x3f0
[   28.342224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.342270]  kthread+0x328/0x630
[   28.342314]  ret_from_fork+0x10/0x20
[   28.342357] 
[   28.342381] kfence-#146: 0x00000000fe61792c-0x000000007aac11cf, size=73, cache=kmalloc-96
[   28.342381] 
[   28.342436] allocated by task 325 on cpu 1 at 28.341665s (0.000767s ago):
[   28.342507]  test_alloc+0x29c/0x628
[   28.342547]  test_kmalloc_aligned_oob_read+0x100/0x468
[   28.342590]  kunit_try_run_case+0x170/0x3f0
[   28.342632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   28.342677]  kthread+0x328/0x630
[   28.342716]  ret_from_fork+0x10/0x20
[   28.342755] 
[   28.342801] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   28.342881] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.342912] Hardware name: linux,dummy-virt (DT)
[   28.342947] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   24.181887] ==================================================================
[   24.181985] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   24.181985] 
[   24.182046] Corrupted memory at 0x000000001fa14298 [ ! ] (in kfence-#106):
[   24.182163]  test_corruption+0x1d8/0x378
[   24.182225]  kunit_try_run_case+0x170/0x3f0
[   24.182270]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.182316]  kthread+0x328/0x630
[   24.182358]  ret_from_fork+0x10/0x20
[   24.182398] 
[   24.182424] kfence-#106: 0x00000000adb18180-0x00000000d365b346, size=32, cache=test
[   24.182424] 
[   24.182480] allocated by task 315 on cpu 1 at 24.181738s (0.000738s ago):
[   24.182539]  test_alloc+0x230/0x628
[   24.182579]  test_corruption+0x198/0x378
[   24.182616]  kunit_try_run_case+0x170/0x3f0
[   24.182658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.182703]  kthread+0x328/0x630
[   24.182741]  ret_from_fork+0x10/0x20
[   24.182780] 
[   24.182803] freed by task 315 on cpu 1 at 24.181802s (0.000998s ago):
[   24.182862]  test_corruption+0x1d8/0x378
[   24.182901]  kunit_try_run_case+0x170/0x3f0
[   24.182940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.182985]  kthread+0x328/0x630
[   24.183022]  ret_from_fork+0x10/0x20
[   24.183062] 
[   24.183105] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   24.183183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.183222] Hardware name: linux,dummy-virt (DT)
[   24.183257] ==================================================================
[   23.869871] ==================================================================
[   23.869964] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   23.869964] 
[   23.870029] Corrupted memory at 0x000000000e8c30b0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#103):
[   23.870361]  test_corruption+0x120/0x378
[   23.870409]  kunit_try_run_case+0x170/0x3f0
[   23.870453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.870498]  kthread+0x328/0x630
[   23.870541]  ret_from_fork+0x10/0x20
[   23.870582] 
[   23.870605] kfence-#103: 0x00000000b58a8111-0x00000000e9710fac, size=32, cache=test
[   23.870605] 
[   23.870661] allocated by task 315 on cpu 1 at 23.869730s (0.000928s ago):
[   23.870722]  test_alloc+0x230/0x628
[   23.870761]  test_corruption+0xdc/0x378
[   23.870800]  kunit_try_run_case+0x170/0x3f0
[   23.870842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.870886]  kthread+0x328/0x630
[   23.870925]  ret_from_fork+0x10/0x20
[   23.870964] 
[   23.870987] freed by task 315 on cpu 1 at 23.869790s (0.001193s ago):
[   23.871047]  test_corruption+0x120/0x378
[   23.871087]  kunit_try_run_case+0x170/0x3f0
[   23.871128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.871172]  kthread+0x328/0x630
[   23.871221]  ret_from_fork+0x10/0x20
[   23.871261] 
[   23.871306] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   23.871383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.871413] Hardware name: linux,dummy-virt (DT)
[   23.871445] ==================================================================
[   23.662074] ==================================================================
[   23.662171] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   23.662171] 
[   23.662247] Corrupted memory at 0x00000000d1d07bd7 [ ! ] (in kfence-#101):
[   23.662376]  test_corruption+0x284/0x378
[   23.662420]  kunit_try_run_case+0x170/0x3f0
[   23.662465]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.662510]  kthread+0x328/0x630
[   23.662552]  ret_from_fork+0x10/0x20
[   23.662591] 
[   23.662614] kfence-#101: 0x00000000d77cd55f-0x0000000076d77c81, size=32, cache=kmalloc-32
[   23.662614] 
[   23.662671] allocated by task 313 on cpu 1 at 23.661800s (0.000867s ago):
[   23.662733]  test_alloc+0x29c/0x628
[   23.662770]  test_corruption+0x198/0x378
[   23.662811]  kunit_try_run_case+0x170/0x3f0
[   23.662851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.662895]  kthread+0x328/0x630
[   23.662936]  ret_from_fork+0x10/0x20
[   23.662974] 
[   23.662997] freed by task 313 on cpu 1 at 23.661907s (0.001086s ago):
[   23.663055]  test_corruption+0x284/0x378
[   23.663094]  kunit_try_run_case+0x170/0x3f0
[   23.663134]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.663179]  kthread+0x328/0x630
[   23.663230]  ret_from_fork+0x10/0x20
[   23.663268] 
[   23.663312] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   23.663390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.663421] Hardware name: linux,dummy-virt (DT)
[   23.663453] ==================================================================
[   23.557954] ==================================================================
[   23.558047] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   23.558047] 
[   23.558109] Corrupted memory at 0x00000000d50d6e38 [ ! . . . . . . . . . . . . . . . ] (in kfence-#100):
[   23.558435]  test_corruption+0x278/0x378
[   23.558481]  kunit_try_run_case+0x170/0x3f0
[   23.558527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.558573]  kthread+0x328/0x630
[   23.558615]  ret_from_fork+0x10/0x20
[   23.558657] 
[   23.558680] kfence-#100: 0x00000000891cf55c-0x0000000011ab3e63, size=32, cache=kmalloc-32
[   23.558680] 
[   23.558736] allocated by task 313 on cpu 1 at 23.557764s (0.000968s ago):
[   23.558796]  test_alloc+0x29c/0x628
[   23.558837]  test_corruption+0xdc/0x378
[   23.558875]  kunit_try_run_case+0x170/0x3f0
[   23.558916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.558961]  kthread+0x328/0x630
[   23.559000]  ret_from_fork+0x10/0x20
[   23.559039] 
[   23.559062] freed by task 313 on cpu 1 at 23.557866s (0.001192s ago):
[   23.559121]  test_corruption+0x278/0x378
[   23.559159]  kunit_try_run_case+0x170/0x3f0
[   23.559199]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.559255]  kthread+0x328/0x630
[   23.559294]  ret_from_fork+0x10/0x20
[   23.559334] 
[   23.559383] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   23.559462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.559491] Hardware name: linux,dummy-virt (DT)
[   23.559526] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   23.241885] ==================================================================
[   23.241973] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   23.241973] 
[   23.242033] Invalid free of 0x000000002da13f39 (in kfence-#97):
[   23.242087]  test_invalid_addr_free+0x1ac/0x238
[   23.242133]  kunit_try_run_case+0x170/0x3f0
[   23.242180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.242241]  kthread+0x328/0x630
[   23.242283]  ret_from_fork+0x10/0x20
[   23.242324] 
[   23.242347] kfence-#97: 0x00000000f1fd5b59-0x00000000f4ba7209, size=32, cache=kmalloc-32
[   23.242347] 
[   23.242404] allocated by task 309 on cpu 0 at 23.241744s (0.000656s ago):
[   23.242467]  test_alloc+0x29c/0x628
[   23.242506]  test_invalid_addr_free+0xd4/0x238
[   23.242547]  kunit_try_run_case+0x170/0x3f0
[   23.242589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.242635]  kthread+0x328/0x630
[   23.242673]  ret_from_fork+0x10/0x20
[   23.242712] 
[   23.242761] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   23.242840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.242869] Hardware name: linux,dummy-virt (DT)
[   23.242905] ==================================================================
[   23.350659] ==================================================================
[   23.350755] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   23.350755] 
[   23.350815] Invalid free of 0x00000000c6cd1d47 (in kfence-#98):
[   23.350869]  test_invalid_addr_free+0xec/0x238
[   23.350912]  kunit_try_run_case+0x170/0x3f0
[   23.350957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.351002]  kthread+0x328/0x630
[   23.351043]  ret_from_fork+0x10/0x20
[   23.351084] 
[   23.351108] kfence-#98: 0x0000000064563c51-0x0000000024f6ce94, size=32, cache=test
[   23.351108] 
[   23.351161] allocated by task 311 on cpu 0 at 23.350530s (0.000628s ago):
[   23.351238]  test_alloc+0x230/0x628
[   23.351278]  test_invalid_addr_free+0xd4/0x238
[   23.351319]  kunit_try_run_case+0x170/0x3f0
[   23.351359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.351404]  kthread+0x328/0x630
[   23.351442]  ret_from_fork+0x10/0x20
[   23.351482] 
[   23.351523] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   23.351603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.351630] Hardware name: linux,dummy-virt (DT)
[   23.351663] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   23.137921] ==================================================================
[   23.138014] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   23.138014] 
[   23.138073] Invalid free of 0x000000006fb98c8e (in kfence-#96):
[   23.138126]  test_double_free+0x100/0x238
[   23.138173]  kunit_try_run_case+0x170/0x3f0
[   23.138234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.138280]  kthread+0x328/0x630
[   23.138321]  ret_from_fork+0x10/0x20
[   23.138361] 
[   23.138386] kfence-#96: 0x000000006fb98c8e-0x00000000270dc602, size=32, cache=test
[   23.138386] 
[   23.138437] allocated by task 307 on cpu 1 at 23.137705s (0.000729s ago):
[   23.138500]  test_alloc+0x230/0x628
[   23.138540]  test_double_free+0xd4/0x238
[   23.138578]  kunit_try_run_case+0x170/0x3f0
[   23.138619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.138663]  kthread+0x328/0x630
[   23.138702]  ret_from_fork+0x10/0x20
[   23.138741] 
[   23.138764] freed by task 307 on cpu 1 at 23.137765s (0.000996s ago):
[   23.138824]  test_double_free+0xf0/0x238
[   23.138862]  kunit_try_run_case+0x170/0x3f0
[   23.138903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.138949]  kthread+0x328/0x630
[   23.138987]  ret_from_fork+0x10/0x20
[   23.139026] 
[   23.139069] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   23.139146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.139176] Hardware name: linux,dummy-virt (DT)
[   23.139221] ==================================================================
[   23.034050] ==================================================================
[   23.034175] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   23.034175] 
[   23.034262] Invalid free of 0x0000000058bd1c1c (in kfence-#95):
[   23.034328]  test_double_free+0x1bc/0x238
[   23.034374]  kunit_try_run_case+0x170/0x3f0
[   23.034421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.034468]  kthread+0x328/0x630
[   23.034509]  ret_from_fork+0x10/0x20
[   23.034549] 
[   23.034574] kfence-#95: 0x0000000058bd1c1c-0x00000000ada53306, size=32, cache=kmalloc-32
[   23.034574] 
[   23.034629] allocated by task 305 on cpu 1 at 23.033791s (0.000834s ago):
[   23.034691]  test_alloc+0x29c/0x628
[   23.034729]  test_double_free+0xd4/0x238
[   23.034768]  kunit_try_run_case+0x170/0x3f0
[   23.034808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.034855]  kthread+0x328/0x630
[   23.034893]  ret_from_fork+0x10/0x20
[   23.034931] 
[   23.034954] freed by task 305 on cpu 1 at 23.033868s (0.001082s ago):
[   23.035016]  test_double_free+0x1ac/0x238
[   23.035055]  kunit_try_run_case+0x170/0x3f0
[   23.035096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.035143]  kthread+0x328/0x630
[   23.035182]  ret_from_fork+0x10/0x20
[   23.035233] 
[   23.035282] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   23.035361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.035396] Hardware name: linux,dummy-virt (DT)
[   23.035431] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   22.714636] ==================================================================
[   22.714997] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.714997] 
[   22.715104] Use-after-free read at 0x0000000091d925ae (in kfence-#92):
[   22.715158]  test_use_after_free_read+0x114/0x248
[   22.715408]  kunit_try_run_case+0x170/0x3f0
[   22.715590]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.715650]  kthread+0x328/0x630
[   22.715752]  ret_from_fork+0x10/0x20
[   22.715793] 
[   22.715816] kfence-#92: 0x0000000091d925ae-0x00000000f8321f6c, size=32, cache=test
[   22.715816] 
[   22.716079] allocated by task 299 on cpu 0 at 22.714301s (0.001746s ago):
[   22.716267]  test_alloc+0x230/0x628
[   22.716407]  test_use_after_free_read+0xd0/0x248
[   22.716594]  kunit_try_run_case+0x170/0x3f0
[   22.716858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.716906]  kthread+0x328/0x630
[   22.716944]  ret_from_fork+0x10/0x20
[   22.716983] 
[   22.717007] freed by task 299 on cpu 0 at 22.714513s (0.002491s ago):
[   22.717502]  test_use_after_free_read+0xf0/0x248
[   22.717560]  kunit_try_run_case+0x170/0x3f0
[   22.717625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.717671]  kthread+0x328/0x630
[   22.717711]  ret_from_fork+0x10/0x20
[   22.717776] 
[   22.717861] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   22.718148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.718183] Hardware name: linux,dummy-virt (DT)
[   22.718228] ==================================================================
[   22.607504] ==================================================================
[   22.607601] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   22.607601] 
[   22.607693] Use-after-free read at 0x000000002ea02368 (in kfence-#91):
[   22.607745]  test_use_after_free_read+0x114/0x248
[   22.607790]  kunit_try_run_case+0x170/0x3f0
[   22.607834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.607881]  kthread+0x328/0x630
[   22.608437]  ret_from_fork+0x10/0x20
[   22.608516] 
[   22.608974] kfence-#91: 0x000000002ea02368-0x0000000070e729a0, size=32, cache=kmalloc-32
[   22.608974] 
[   22.609097] allocated by task 297 on cpu 0 at 22.606974s (0.002098s ago):
[   22.609562]  test_alloc+0x29c/0x628
[   22.609628]  test_use_after_free_read+0xd0/0x248
[   22.609768]  kunit_try_run_case+0x170/0x3f0
[   22.609980]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.610570]  kthread+0x328/0x630
[   22.610746]  ret_from_fork+0x10/0x20
[   22.611083] 
[   22.611121] freed by task 297 on cpu 0 at 22.607079s (0.004037s ago):
[   22.611656]  test_use_after_free_read+0x1c0/0x248
[   22.611811]  kunit_try_run_case+0x170/0x3f0
[   22.611960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.612009]  kthread+0x328/0x630
[   22.612047]  ret_from_fork+0x10/0x20
[   22.612679] 
[   22.612737] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   22.612955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.612995] Hardware name: linux,dummy-virt (DT)
[   22.613045] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   22.498433] ==================================================================
[   22.498554] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.498554] 
[   22.498755] Out-of-bounds write at 0x00000000f5e7ec1e (1B left of kfence-#90):
[   22.498827]  test_out_of_bounds_write+0x100/0x240
[   22.498874]  kunit_try_run_case+0x170/0x3f0
[   22.499061]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.499340]  kthread+0x328/0x630
[   22.499675]  ret_from_fork+0x10/0x20
[   22.499914] 
[   22.499940] kfence-#90: 0x000000000770588e-0x000000002e0a4175, size=32, cache=test
[   22.499940] 
[   22.500322] allocated by task 295 on cpu 0 at 22.498099s (0.002215s ago):
[   22.500406]  test_alloc+0x230/0x628
[   22.500468]  test_out_of_bounds_write+0xc8/0x240
[   22.500510]  kunit_try_run_case+0x170/0x3f0
[   22.500786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.501023]  kthread+0x328/0x630
[   22.501062]  ret_from_fork+0x10/0x20
[   22.501102] 
[   22.501148] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   22.501240] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.501270] Hardware name: linux,dummy-virt (DT)
[   22.501302] ==================================================================
[   22.290366] ==================================================================
[   22.290450] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   22.290450] 
[   22.290535] Out-of-bounds write at 0x00000000e11094f6 (1B left of kfence-#88):
[   22.290593]  test_out_of_bounds_write+0x100/0x240
[   22.290639]  kunit_try_run_case+0x170/0x3f0
[   22.290727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.290784]  kthread+0x328/0x630
[   22.290845]  ret_from_fork+0x10/0x20
[   22.290901] 
[   22.290942] kfence-#88: 0x000000001fb7efbb-0x00000000ad4e2db5, size=32, cache=kmalloc-32
[   22.290942] 
[   22.291033] allocated by task 293 on cpu 0 at 22.290201s (0.000792s ago):
[   22.291103]  test_alloc+0x29c/0x628
[   22.291162]  test_out_of_bounds_write+0xc8/0x240
[   22.291235]  kunit_try_run_case+0x170/0x3f0
[   22.291278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.291322]  kthread+0x328/0x630
[   22.291379]  ret_from_fork+0x10/0x20
[   22.291572] 
[   22.291641] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   22.291751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.291806] Hardware name: linux,dummy-virt (DT)
[   22.291867] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   21.870292] ==================================================================
[   21.870374] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.870374] 
[   21.870495] Out-of-bounds read at 0x00000000e2116ad3 (1B left of kfence-#84):
[   21.870569]  test_out_of_bounds_read+0x114/0x3e0
[   21.870641]  kunit_try_run_case+0x170/0x3f0
[   21.870712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.870760]  kthread+0x328/0x630
[   21.870818]  ret_from_fork+0x10/0x20
[   21.870863] 
[   21.871110] kfence-#84: 0x0000000020e349ec-0x000000000085d0e1, size=32, cache=test
[   21.871110] 
[   21.871231] allocated by task 291 on cpu 0 at 21.869929s (0.001249s ago):
[   21.871344]  test_alloc+0x230/0x628
[   21.871431]  test_out_of_bounds_read+0xdc/0x3e0
[   21.871643]  kunit_try_run_case+0x170/0x3f0
[   21.871698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.871744]  kthread+0x328/0x630
[   21.871843]  ret_from_fork+0x10/0x20
[   21.871900] 
[   21.871966] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.872049] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.872119] Hardware name: linux,dummy-virt (DT)
[   21.872168] ==================================================================
[   21.331696] ==================================================================
[   21.331810] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   21.331810] 
[   21.331942] Out-of-bounds read at 0x000000007e5279be (1B left of kfence-#79):
[   21.332025]  test_out_of_bounds_read+0x114/0x3e0
[   21.332077]  kunit_try_run_case+0x170/0x3f0
[   21.332122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.332168]  kthread+0x328/0x630
[   21.332229]  ret_from_fork+0x10/0x20
[   21.332271] 
[   21.332297] kfence-#79: 0x0000000096c878e4-0x00000000f689520e, size=32, cache=kmalloc-32
[   21.332297] 
[   21.332353] allocated by task 289 on cpu 0 at 21.330486s (0.001863s ago):
[   21.332423]  test_alloc+0x29c/0x628
[   21.332461]  test_out_of_bounds_read+0xdc/0x3e0
[   21.332501]  kunit_try_run_case+0x170/0x3f0
[   21.332542]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.332585]  kthread+0x328/0x630
[   21.332644]  ret_from_fork+0x10/0x20
[   21.332700] 
[   21.332746] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.332824] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.332863] Hardware name: linux,dummy-virt (DT)
[   21.332897] ==================================================================
[   21.438299] ==================================================================
[   21.438379] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.438379] 
[   21.438478] Out-of-bounds read at 0x00000000dae5f7c0 (32B right of kfence-#80):
[   21.438554]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.438635]  kunit_try_run_case+0x170/0x3f0
[   21.438700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.438765]  kthread+0x328/0x630
[   21.438905]  ret_from_fork+0x10/0x20
[   21.439069] 
[   21.439095] kfence-#80: 0x000000009fd747b2-0x00000000507a81d7, size=32, cache=kmalloc-32
[   21.439095] 
[   21.439258] allocated by task 289 on cpu 0 at 21.437866s (0.001319s ago):
[   21.439330]  test_alloc+0x29c/0x628
[   21.439531]  test_out_of_bounds_read+0x198/0x3e0
[   21.439732]  kunit_try_run_case+0x170/0x3f0
[   21.439777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.439921]  kthread+0x328/0x630
[   21.440001]  ret_from_fork+0x10/0x20
[   21.440062] 
[   21.440143] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.440242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.440271] Hardware name: linux,dummy-virt (DT)
[   21.440303] ==================================================================
[   21.974093] ==================================================================
[   21.974176] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   21.974176] 
[   21.974593] Out-of-bounds read at 0x00000000e378db27 (32B right of kfence-#85):
[   21.974704]  test_out_of_bounds_read+0x1c8/0x3e0
[   21.974755]  kunit_try_run_case+0x170/0x3f0
[   21.974799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.974845]  kthread+0x328/0x630
[   21.974927]  ret_from_fork+0x10/0x20
[   21.974968] 
[   21.974994] kfence-#85: 0x00000000ff92fff2-0x000000008f0c264f, size=32, cache=test
[   21.974994] 
[   21.975083] allocated by task 291 on cpu 0 at 21.973959s (0.001102s ago):
[   21.975170]  test_alloc+0x230/0x628
[   21.975279]  test_out_of_bounds_read+0x198/0x3e0
[   21.975322]  kunit_try_run_case+0x170/0x3f0
[   21.975392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.975456]  kthread+0x328/0x630
[   21.975497]  ret_from_fork+0x10/0x20
[   21.975808] 
[   21.975904] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.976007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.976061] Hardware name: linux,dummy-virt (DT)
[   21.976144] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_8
[   17.944243] ==================================================================
[   17.944698] BUG: KFENCE: memory corruption in kmalloc_oob_memset_8+0x170/0x2f8
[   17.944698] 
[   17.945317] Corrupted memory at 0x000000002576805e [ ! . . . . . . . . . . . . . . . ] (in kfence-#56):
[   17.946529]  kmalloc_oob_memset_8+0x170/0x2f8
[   17.946954]  kunit_try_run_case+0x170/0x3f0
[   17.947343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.947503]  kthread+0x328/0x630
[   17.947573]  ret_from_fork+0x10/0x20
[   17.947881] 
[   17.948042] kfence-#56: 0x000000008cc826dd-0x000000001791213f, size=120, cache=kmalloc-128
[   17.948042] 
[   17.948238] allocated by task 178 on cpu 0 at 17.940428s (0.007761s ago):
[   17.948640]  kmalloc_oob_memset_8+0xb0/0x2f8
[   17.948738]  kunit_try_run_case+0x170/0x3f0
[   17.948780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.949013]  kthread+0x328/0x630
[   17.949139]  ret_from_fork+0x10/0x20
[   17.949303] 
[   17.949333] freed by task 178 on cpu 0 at 17.944131s (0.005188s ago):
[   17.949571]  kmalloc_oob_memset_8+0x170/0x2f8
[   17.949852]  kunit_try_run_case+0x170/0x3f0
[   17.949938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.950104]  kthread+0x328/0x630
[   17.950241]  ret_from_fork+0x10/0x20
[   17.950439] 
[   17.950502] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.950982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.951029] Hardware name: linux,dummy-virt (DT)
[   17.951466] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_oob_16
[   17.839625] ==================================================================
[   17.839756] BUG: KFENCE: memory corruption in kmalloc_oob_16+0x1f0/0x3f8
[   17.839756] 
[   17.839821] Corrupted memory at 0x000000008a2a8b16 [ ! ! ! ] (in kfence-#55):
[   17.845105]  kmalloc_oob_16+0x1f0/0x3f8
[   17.845611]  kunit_try_run_case+0x170/0x3f0
[   17.846171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.846272]  kthread+0x328/0x630
[   17.846671]  ret_from_fork+0x10/0x20
[   17.847159] 
[   17.847926] kfence-#55: 0x0000000063b392e4-0x0000000069a94259, size=13, cache=kmalloc-16
[   17.847926] 
[   17.849105] allocated by task 168 on cpu 0 at 17.838129s (0.010383s ago):
[   17.850140]  kmalloc_oob_16+0xb4/0x3f8
[   17.851045]  kunit_try_run_case+0x170/0x3f0
[   17.851185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.851625]  kthread+0x328/0x630
[   17.851714]  ret_from_fork+0x10/0x20
[   17.852083] 
[   17.852428] freed by task 168 on cpu 0 at 17.838865s (0.013419s ago):
[   17.852779]  kmalloc_oob_16+0x1f0/0x3f8
[   17.853163]  kunit_try_run_case+0x170/0x3f0
[   17.853415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.853560]  kthread+0x328/0x630
[   17.853870]  ret_from_fork+0x10/0x20
[   17.854141] 
[   17.854366] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.854565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.854632] Hardware name: linux,dummy-virt (DT)
[   17.854688] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   21.168287] ==================================================================
[   21.168483] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   21.168566] Write of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287
[   21.168735] 
[   21.168769] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.169024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.169070] Hardware name: linux,dummy-virt (DT)
[   21.169353] Call trace:
[   21.169513]  show_stack+0x20/0x38 (C)
[   21.169697]  dump_stack_lvl+0x8c/0xd0
[   21.170034]  print_report+0x118/0x5d0
[   21.170523]  kasan_report+0xdc/0x128
[   21.170974]  kasan_check_range+0x100/0x1a8
[   21.171149]  __kasan_check_write+0x20/0x30
[   21.171258]  strncpy_from_user+0x3c/0x2a0
[   21.171377]  copy_user_test_oob+0x5c0/0xec8
[   21.171684]  kunit_try_run_case+0x170/0x3f0
[   21.171832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.172253]  kthread+0x328/0x630
[   21.172404]  ret_from_fork+0x10/0x20
[   21.172581] 
[   21.172739] Allocated by task 287:
[   21.172935]  kasan_save_stack+0x3c/0x68
[   21.173237]  kasan_save_track+0x20/0x40
[   21.173508]  kasan_save_alloc_info+0x40/0x58
[   21.173794]  __kasan_kmalloc+0xd4/0xd8
[   21.174154]  __kmalloc_noprof+0x198/0x4c8
[   21.174250]  kunit_kmalloc_array+0x34/0x88
[   21.174393]  copy_user_test_oob+0xac/0xec8
[   21.174477]  kunit_try_run_case+0x170/0x3f0
[   21.174521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.174567]  kthread+0x328/0x630
[   21.174746]  ret_from_fork+0x10/0x20
[   21.174858] 
[   21.175006] The buggy address belongs to the object at fff00000c59cb700
[   21.175006]  which belongs to the cache kmalloc-128 of size 128
[   21.175253] The buggy address is located 0 bytes inside of
[   21.175253]  allocated 120-byte region [fff00000c59cb700, fff00000c59cb778)
[   21.175521] 
[   21.175564] The buggy address belongs to the physical page:
[   21.175679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.175787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.175972] page_type: f5(slab)
[   21.176027] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.176081] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.176324] page dumped because: kasan: bad access detected
[   21.176444] 
[   21.176797] Memory state around the buggy address:
[   21.177356]  fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.177720]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.177782] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.177979]                                                                 ^
[   21.178285]  fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.178629]  fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.178678] ==================================================================
[   21.180828] ==================================================================
[   21.180891] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   21.181240] Write of size 1 at addr fff00000c59cb778 by task kunit_try_catch/287
[   21.181321] 
[   21.181355] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.181522] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.181762] Hardware name: linux,dummy-virt (DT)
[   21.181873] Call trace:
[   21.182062]  show_stack+0x20/0x38 (C)
[   21.182182]  dump_stack_lvl+0x8c/0xd0
[   21.182281]  print_report+0x118/0x5d0
[   21.182629]  kasan_report+0xdc/0x128
[   21.182693]  __asan_report_store1_noabort+0x20/0x30
[   21.182816]  strncpy_from_user+0x270/0x2a0
[   21.182889]  copy_user_test_oob+0x5c0/0xec8
[   21.182940]  kunit_try_run_case+0x170/0x3f0
[   21.183005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.183061]  kthread+0x328/0x630
[   21.183108]  ret_from_fork+0x10/0x20
[   21.183166] 
[   21.183191] Allocated by task 287:
[   21.183235]  kasan_save_stack+0x3c/0x68
[   21.183287]  kasan_save_track+0x20/0x40
[   21.183336]  kasan_save_alloc_info+0x40/0x58
[   21.183376]  __kasan_kmalloc+0xd4/0xd8
[   21.183422]  __kmalloc_noprof+0x198/0x4c8
[   21.183460]  kunit_kmalloc_array+0x34/0x88
[   21.183502]  copy_user_test_oob+0xac/0xec8
[   21.183542]  kunit_try_run_case+0x170/0x3f0
[   21.183582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.183645]  kthread+0x328/0x630
[   21.183682]  ret_from_fork+0x10/0x20
[   21.183720] 
[   21.183750] The buggy address belongs to the object at fff00000c59cb700
[   21.183750]  which belongs to the cache kmalloc-128 of size 128
[   21.183813] The buggy address is located 0 bytes to the right of
[   21.183813]  allocated 120-byte region [fff00000c59cb700, fff00000c59cb778)
[   21.183888] 
[   21.183926] The buggy address belongs to the physical page:
[   21.183960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.184015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.184093] page_type: f5(slab)
[   21.184132] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.184187] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.184274] page dumped because: kasan: bad access detected
[   21.184482] 
[   21.184820] Memory state around the buggy address:
[   21.185221]  fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.185698]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.186132] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.186230]                                                                 ^
[   21.186300]  fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.186369]  fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.186435] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   21.152197] ==================================================================
[   21.152663] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   21.152964] Write of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287
[   21.153166] 
[   21.153250] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.153511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.153758] Hardware name: linux,dummy-virt (DT)
[   21.153814] Call trace:
[   21.153994]  show_stack+0x20/0x38 (C)
[   21.154148]  dump_stack_lvl+0x8c/0xd0
[   21.154340]  print_report+0x118/0x5d0
[   21.154712]  kasan_report+0xdc/0x128
[   21.154876]  kasan_check_range+0x100/0x1a8
[   21.154944]  __kasan_check_write+0x20/0x30
[   21.154993]  copy_user_test_oob+0x434/0xec8
[   21.155051]  kunit_try_run_case+0x170/0x3f0
[   21.155101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.155158]  kthread+0x328/0x630
[   21.155225]  ret_from_fork+0x10/0x20
[   21.155277] 
[   21.155298] Allocated by task 287:
[   21.155344]  kasan_save_stack+0x3c/0x68
[   21.155386]  kasan_save_track+0x20/0x40
[   21.155438]  kasan_save_alloc_info+0x40/0x58
[   21.155480]  __kasan_kmalloc+0xd4/0xd8
[   21.155528]  __kmalloc_noprof+0x198/0x4c8
[   21.155582]  kunit_kmalloc_array+0x34/0x88
[   21.155624]  copy_user_test_oob+0xac/0xec8
[   21.155661]  kunit_try_run_case+0x170/0x3f0
[   21.155710]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.155758]  kthread+0x328/0x630
[   21.155795]  ret_from_fork+0x10/0x20
[   21.155832] 
[   21.155864] The buggy address belongs to the object at fff00000c59cb700
[   21.155864]  which belongs to the cache kmalloc-128 of size 128
[   21.155927] The buggy address is located 0 bytes inside of
[   21.155927]  allocated 120-byte region [fff00000c59cb700, fff00000c59cb778)
[   21.156005] 
[   21.156048] The buggy address belongs to the physical page:
[   21.156090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.156156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.156222] page_type: f5(slab)
[   21.156262] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.156316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.156371] page dumped because: kasan: bad access detected
[   21.156416] 
[   21.156437] Memory state around the buggy address:
[   21.156471]  fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.156518]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.156565] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.156607]                                                                 ^
[   21.156659]  fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.156706]  fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.156750] ==================================================================
[   21.157958] ==================================================================
[   21.158013] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   21.158241] Read of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287
[   21.158318] 
[   21.158349] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.158435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.158463] Hardware name: linux,dummy-virt (DT)
[   21.158494] Call trace:
[   21.158733]  show_stack+0x20/0x38 (C)
[   21.158802]  dump_stack_lvl+0x8c/0xd0
[   21.159270]  print_report+0x118/0x5d0
[   21.159323]  kasan_report+0xdc/0x128
[   21.159490]  kasan_check_range+0x100/0x1a8
[   21.159835]  __kasan_check_read+0x20/0x30
[   21.159918]  copy_user_test_oob+0x4a0/0xec8
[   21.160049]  kunit_try_run_case+0x170/0x3f0
[   21.160102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.160166]  kthread+0x328/0x630
[   21.160230]  ret_from_fork+0x10/0x20
[   21.160283] 
[   21.160304] Allocated by task 287:
[   21.160332]  kasan_save_stack+0x3c/0x68
[   21.160376]  kasan_save_track+0x20/0x40
[   21.160413]  kasan_save_alloc_info+0x40/0x58
[   21.160456]  __kasan_kmalloc+0xd4/0xd8
[   21.160494]  __kmalloc_noprof+0x198/0x4c8
[   21.160530]  kunit_kmalloc_array+0x34/0x88
[   21.161241]  copy_user_test_oob+0xac/0xec8
[   21.161305]  kunit_try_run_case+0x170/0x3f0
[   21.161699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.162029]  kthread+0x328/0x630
[   21.162181]  ret_from_fork+0x10/0x20
[   21.162280] 
[   21.162303] The buggy address belongs to the object at fff00000c59cb700
[   21.162303]  which belongs to the cache kmalloc-128 of size 128
[   21.162375] The buggy address is located 0 bytes inside of
[   21.162375]  allocated 120-byte region [fff00000c59cb700, fff00000c59cb778)
[   21.162794] 
[   21.162843] The buggy address belongs to the physical page:
[   21.163043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.163174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.163362] page_type: f5(slab)
[   21.163451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.163631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.163681] page dumped because: kasan: bad access detected
[   21.163875] 
[   21.164121] Memory state around the buggy address:
[   21.164193]  fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.164522]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.164816] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.165185]                                                                 ^
[   21.165519]  fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.165754]  fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.165984] ==================================================================
[   21.102335] ==================================================================
[   21.103029] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   21.103427] Write of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287
[   21.103493] 
[   21.103836] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.104013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.104058] Hardware name: linux,dummy-virt (DT)
[   21.104093] Call trace:
[   21.104458]  show_stack+0x20/0x38 (C)
[   21.104771]  dump_stack_lvl+0x8c/0xd0
[   21.104950]  print_report+0x118/0x5d0
[   21.105331]  kasan_report+0xdc/0x128
[   21.105413]  kasan_check_range+0x100/0x1a8
[   21.105543]  __kasan_check_write+0x20/0x30
[   21.105687]  copy_user_test_oob+0x234/0xec8
[   21.105764]  kunit_try_run_case+0x170/0x3f0
[   21.105831]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.105889]  kthread+0x328/0x630
[   21.106283]  ret_from_fork+0x10/0x20
[   21.106395] 
[   21.106719] Allocated by task 287:
[   21.106797]  kasan_save_stack+0x3c/0x68
[   21.107223]  kasan_save_track+0x20/0x40
[   21.107414]  kasan_save_alloc_info+0x40/0x58
[   21.107491]  __kasan_kmalloc+0xd4/0xd8
[   21.107531]  __kmalloc_noprof+0x198/0x4c8
[   21.107573]  kunit_kmalloc_array+0x34/0x88
[   21.107626]  copy_user_test_oob+0xac/0xec8
[   21.107670]  kunit_try_run_case+0x170/0x3f0
[   21.107713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.107767]  kthread+0x328/0x630
[   21.107822]  ret_from_fork+0x10/0x20
[   21.107867] 
[   21.107890] The buggy address belongs to the object at fff00000c59cb700
[   21.107890]  which belongs to the cache kmalloc-128 of size 128
[   21.107964] The buggy address is located 0 bytes inside of
[   21.107964]  allocated 120-byte region [fff00000c59cb700, fff00000c59cb778)
[   21.108039] 
[   21.108073] The buggy address belongs to the physical page:
[   21.108131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.108229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.108286] page_type: f5(slab)
[   21.108351] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.108411] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.108456] page dumped because: kasan: bad access detected
[   21.108490] 
[   21.108518] Memory state around the buggy address:
[   21.108569]  fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.108621]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.108668] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.108710]                                                                 ^
[   21.108753]  fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.108804]  fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.108857] ==================================================================
[   21.134625] ==================================================================
[   21.134690] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   21.135015] Write of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287
[   21.135403] 
[   21.135482] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.135670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.135701] Hardware name: linux,dummy-virt (DT)
[   21.135736] Call trace:
[   21.135762]  show_stack+0x20/0x38 (C)
[   21.135886]  dump_stack_lvl+0x8c/0xd0
[   21.135937]  print_report+0x118/0x5d0
[   21.135983]  kasan_report+0xdc/0x128
[   21.136030]  kasan_check_range+0x100/0x1a8
[   21.136077]  __kasan_check_write+0x20/0x30
[   21.136137]  copy_user_test_oob+0x35c/0xec8
[   21.136186]  kunit_try_run_case+0x170/0x3f0
[   21.136261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.136319]  kthread+0x328/0x630
[   21.136365]  ret_from_fork+0x10/0x20
[   21.136412] 
[   21.136442] Allocated by task 287:
[   21.136472]  kasan_save_stack+0x3c/0x68
[   21.136525]  kasan_save_track+0x20/0x40
[   21.136563]  kasan_save_alloc_info+0x40/0x58
[   21.136604]  __kasan_kmalloc+0xd4/0xd8
[   21.136640]  __kmalloc_noprof+0x198/0x4c8
[   21.136678]  kunit_kmalloc_array+0x34/0x88
[   21.136725]  copy_user_test_oob+0xac/0xec8
[   21.136764]  kunit_try_run_case+0x170/0x3f0
[   21.136805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.136859]  kthread+0x328/0x630
[   21.136898]  ret_from_fork+0x10/0x20
[   21.136935] 
[   21.136957] The buggy address belongs to the object at fff00000c59cb700
[   21.136957]  which belongs to the cache kmalloc-128 of size 128
[   21.137024] The buggy address is located 0 bytes inside of
[   21.137024]  allocated 120-byte region [fff00000c59cb700, fff00000c59cb778)
[   21.137099] 
[   21.137130] The buggy address belongs to the physical page:
[   21.137167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.137240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.137291] page_type: f5(slab)
[   21.137329] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.137921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.138439] page dumped because: kasan: bad access detected
[   21.138737] 
[   21.139022] Memory state around the buggy address:
[   21.139509]  fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.139695]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.139779] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.139989]                                                                 ^
[   21.140149]  fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.140216]  fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.140889] ==================================================================
[   21.115694] ==================================================================
[   21.115756] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   21.115835] Read of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287
[   21.115898] 
[   21.115933] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.116369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.116421] Hardware name: linux,dummy-virt (DT)
[   21.116459] Call trace:
[   21.116485]  show_stack+0x20/0x38 (C)
[   21.116596]  dump_stack_lvl+0x8c/0xd0
[   21.116651]  print_report+0x118/0x5d0
[   21.116697]  kasan_report+0xdc/0x128
[   21.116795]  kasan_check_range+0x100/0x1a8
[   21.116849]  __kasan_check_read+0x20/0x30
[   21.116906]  copy_user_test_oob+0x728/0xec8
[   21.116972]  kunit_try_run_case+0x170/0x3f0
[   21.117025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.117082]  kthread+0x328/0x630
[   21.117127]  ret_from_fork+0x10/0x20
[   21.117542] 
[   21.117596] Allocated by task 287:
[   21.117703]  kasan_save_stack+0x3c/0x68
[   21.117793]  kasan_save_track+0x20/0x40
[   21.118154]  kasan_save_alloc_info+0x40/0x58
[   21.118314]  __kasan_kmalloc+0xd4/0xd8
[   21.118474]  __kmalloc_noprof+0x198/0x4c8
[   21.118561]  kunit_kmalloc_array+0x34/0x88
[   21.118602]  copy_user_test_oob+0xac/0xec8
[   21.118674]  kunit_try_run_case+0x170/0x3f0
[   21.118977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.119176]  kthread+0x328/0x630
[   21.119343]  ret_from_fork+0x10/0x20
[   21.119432] 
[   21.119490] The buggy address belongs to the object at fff00000c59cb700
[   21.119490]  which belongs to the cache kmalloc-128 of size 128
[   21.119722] The buggy address is located 0 bytes inside of
[   21.119722]  allocated 120-byte region [fff00000c59cb700, fff00000c59cb778)
[   21.119993] 
[   21.120064] The buggy address belongs to the physical page:
[   21.120232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.120346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.120403] page_type: f5(slab)
[   21.120952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.121182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.121288] page dumped because: kasan: bad access detected
[   21.121428] 
[   21.121480] Memory state around the buggy address:
[   21.121554]  fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.121604]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.121651] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.121693]                                                                 ^
[   21.121739]  fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.122413]  fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.122519] ==================================================================
[   21.142005] ==================================================================
[   21.142421] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   21.142490] Read of size 121 at addr fff00000c59cb700 by task kunit_try_catch/287
[   21.142546] 
[   21.142579] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.143232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.143287] Hardware name: linux,dummy-virt (DT)
[   21.143323] Call trace:
[   21.143347]  show_stack+0x20/0x38 (C)
[   21.143400]  dump_stack_lvl+0x8c/0xd0
[   21.143991]  print_report+0x118/0x5d0
[   21.144064]  kasan_report+0xdc/0x128
[   21.144286]  kasan_check_range+0x100/0x1a8
[   21.144350]  __kasan_check_read+0x20/0x30
[   21.144402]  copy_user_test_oob+0x3c8/0xec8
[   21.144674]  kunit_try_run_case+0x170/0x3f0
[   21.144904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.145073]  kthread+0x328/0x630
[   21.145184]  ret_from_fork+0x10/0x20
[   21.145252] 
[   21.145273] Allocated by task 287:
[   21.145308]  kasan_save_stack+0x3c/0x68
[   21.145688]  kasan_save_track+0x20/0x40
[   21.145988]  kasan_save_alloc_info+0x40/0x58
[   21.146185]  __kasan_kmalloc+0xd4/0xd8
[   21.146374]  __kmalloc_noprof+0x198/0x4c8
[   21.146455]  kunit_kmalloc_array+0x34/0x88
[   21.146544]  copy_user_test_oob+0xac/0xec8
[   21.146586]  kunit_try_run_case+0x170/0x3f0
[   21.146991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.147312]  kthread+0x328/0x630
[   21.147394]  ret_from_fork+0x10/0x20
[   21.147504] 
[   21.147674] The buggy address belongs to the object at fff00000c59cb700
[   21.147674]  which belongs to the cache kmalloc-128 of size 128
[   21.147897] The buggy address is located 0 bytes inside of
[   21.147897]  allocated 120-byte region [fff00000c59cb700, fff00000c59cb778)
[   21.148174] 
[   21.148225] The buggy address belongs to the physical page:
[   21.148318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.148497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.148894] page_type: f5(slab)
[   21.148952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.149050] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.149129] page dumped because: kasan: bad access detected
[   21.149165] 
[   21.149234] Memory state around the buggy address:
[   21.149809]  fff00000c59cb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.149871]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.149917] >fff00000c59cb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.149960]                                                                 ^
[   21.150342]  fff00000c59cb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.150423]  fff00000c59cb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.150486] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   21.051113] ==================================================================
[   21.051189] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   21.051509] Read of size 8 at addr fff00000c59cb678 by task kunit_try_catch/283
[   21.051641] 
[   21.051737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.051829] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.051870] Hardware name: linux,dummy-virt (DT)
[   21.051906] Call trace:
[   21.051931]  show_stack+0x20/0x38 (C)
[   21.051989]  dump_stack_lvl+0x8c/0xd0
[   21.052040]  print_report+0x118/0x5d0
[   21.052090]  kasan_report+0xdc/0x128
[   21.052138]  __asan_report_load8_noabort+0x20/0x30
[   21.052191]  copy_to_kernel_nofault+0x204/0x250
[   21.052260]  copy_to_kernel_nofault_oob+0x158/0x418
[   21.052311]  kunit_try_run_case+0x170/0x3f0
[   21.052361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.052417]  kthread+0x328/0x630
[   21.052486]  ret_from_fork+0x10/0x20
[   21.052538] 
[   21.052560] Allocated by task 283:
[   21.052588]  kasan_save_stack+0x3c/0x68
[   21.052640]  kasan_save_track+0x20/0x40
[   21.052678]  kasan_save_alloc_info+0x40/0x58
[   21.052720]  __kasan_kmalloc+0xd4/0xd8
[   21.052756]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.052799]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.052850]  kunit_try_run_case+0x170/0x3f0
[   21.052892]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.052938]  kthread+0x328/0x630
[   21.052977]  ret_from_fork+0x10/0x20
[   21.053013] 
[   21.053035] The buggy address belongs to the object at fff00000c59cb600
[   21.053035]  which belongs to the cache kmalloc-128 of size 128
[   21.053098] The buggy address is located 0 bytes to the right of
[   21.053098]  allocated 120-byte region [fff00000c59cb600, fff00000c59cb678)
[   21.053173] 
[   21.053196] The buggy address belongs to the physical page:
[   21.053608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.053910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.053968] page_type: f5(slab)
[   21.054314] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.054400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.054591] page dumped because: kasan: bad access detected
[   21.054779] 
[   21.055022] Memory state around the buggy address:
[   21.055083]  fff00000c59cb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.055250]  fff00000c59cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.055433] >fff00000c59cb600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.055500]                                                                 ^
[   21.055874]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.056043]  fff00000c59cb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.056133] ==================================================================
[   21.058712] ==================================================================
[   21.058816] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   21.058910] Write of size 8 at addr fff00000c59cb678 by task kunit_try_catch/283
[   21.059104] 
[   21.059142] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   21.059247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.059493] Hardware name: linux,dummy-virt (DT)
[   21.059547] Call trace:
[   21.059572]  show_stack+0x20/0x38 (C)
[   21.059627]  dump_stack_lvl+0x8c/0xd0
[   21.059722]  print_report+0x118/0x5d0
[   21.059809]  kasan_report+0xdc/0x128
[   21.059858]  kasan_check_range+0x100/0x1a8
[   21.060344]  __kasan_check_write+0x20/0x30
[   21.060433]  copy_to_kernel_nofault+0x8c/0x250
[   21.060486]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   21.060539]  kunit_try_run_case+0x170/0x3f0
[   21.060687]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.060763]  kthread+0x328/0x630
[   21.060988]  ret_from_fork+0x10/0x20
[   21.061231] 
[   21.061286] Allocated by task 283:
[   21.061540]  kasan_save_stack+0x3c/0x68
[   21.061610]  kasan_save_track+0x20/0x40
[   21.062034]  kasan_save_alloc_info+0x40/0x58
[   21.062358]  __kasan_kmalloc+0xd4/0xd8
[   21.062428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.062496]  copy_to_kernel_nofault_oob+0xc8/0x418
[   21.062585]  kunit_try_run_case+0x170/0x3f0
[   21.062675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.063166]  kthread+0x328/0x630
[   21.063355]  ret_from_fork+0x10/0x20
[   21.063671] 
[   21.063865] The buggy address belongs to the object at fff00000c59cb600
[   21.063865]  which belongs to the cache kmalloc-128 of size 128
[   21.064198] The buggy address is located 0 bytes to the right of
[   21.064198]  allocated 120-byte region [fff00000c59cb600, fff00000c59cb678)
[   21.064366] 
[   21.064435] The buggy address belongs to the physical page:
[   21.064549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   21.064674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.064820] page_type: f5(slab)
[   21.064910] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   21.065319] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.065445] page dumped because: kasan: bad access detected
[   21.065501] 
[   21.065521] Memory state around the buggy address:
[   21.065558]  fff00000c59cb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.065895]  fff00000c59cb580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.066068] >fff00000c59cb600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   21.066219]                                                                 ^
[   21.066269]  fff00000c59cb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.066615]  fff00000c59cb700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.067053] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   20.994330] ==================================================================
[   20.994391] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   20.994445] Read of size 1 at addr ffff80008010b7f8 by task kunit_try_catch/271
[   20.994732] 
[   20.994772] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.994886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.995058] Hardware name: linux,dummy-virt (DT)
[   20.995139] Call trace:
[   20.995166]  show_stack+0x20/0x38 (C)
[   20.995460]  dump_stack_lvl+0x8c/0xd0
[   20.995675]  print_report+0x310/0x5d0
[   20.995724]  kasan_report+0xdc/0x128
[   20.996050]  __asan_report_load1_noabort+0x20/0x30
[   20.996526]  vmalloc_oob+0x51c/0x5d0
[   20.996599]  kunit_try_run_case+0x170/0x3f0
[   20.996874]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.996954]  kthread+0x328/0x630
[   20.997194]  ret_from_fork+0x10/0x20
[   20.997345] 
[   20.997378] The buggy address ffff80008010b7f8 belongs to a vmalloc virtual mapping
[   20.997481] The buggy address belongs to the physical page:
[   20.997560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a3
[   20.997633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.998061] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.998175] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.998384] page dumped because: kasan: bad access detected
[   20.998510] 
[   20.998735] Memory state around the buggy address:
[   20.998820]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.998952]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.999002] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.999057]                                                                 ^
[   20.999319]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.999846]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.999936] ==================================================================
[   20.988685] ==================================================================
[   20.988758] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   20.989325] Read of size 1 at addr ffff80008010b7f3 by task kunit_try_catch/271
[   20.989487] 
[   20.989543] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.989637] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.989668] Hardware name: linux,dummy-virt (DT)
[   20.990042] Call trace:
[   20.990102]  show_stack+0x20/0x38 (C)
[   20.990442]  dump_stack_lvl+0x8c/0xd0
[   20.990563]  print_report+0x310/0x5d0
[   20.990627]  kasan_report+0xdc/0x128
[   20.990672]  __asan_report_load1_noabort+0x20/0x30
[   20.990745]  vmalloc_oob+0x578/0x5d0
[   20.990792]  kunit_try_run_case+0x170/0x3f0
[   20.990849]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.990915]  kthread+0x328/0x630
[   20.990981]  ret_from_fork+0x10/0x20
[   20.991041] 
[   20.991072] The buggy address ffff80008010b7f3 belongs to a vmalloc virtual mapping
[   20.991128] The buggy address belongs to the physical page:
[   20.991165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066a3
[   20.991241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.991313] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.991373] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.991418] page dumped because: kasan: bad access detected
[   20.991474] 
[   20.991503] Memory state around the buggy address:
[   20.991557]  ffff80008010b680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.991611]  ffff80008010b700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.991659] >ffff80008010b780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   20.991701]                                                              ^
[   20.991747]  ffff80008010b800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.991794]  ffff80008010b880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   20.991847] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   20.700994] ==================================================================
[   20.701051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.701101] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.701642] 
[   20.701709] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.701821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.701852] Hardware name: linux,dummy-virt (DT)
[   20.701886] Call trace:
[   20.702108]  show_stack+0x20/0x38 (C)
[   20.702201]  dump_stack_lvl+0x8c/0xd0
[   20.702308]  print_report+0x118/0x5d0
[   20.702428]  kasan_report+0xdc/0x128
[   20.702474]  __asan_report_load8_noabort+0x20/0x30
[   20.702527]  kasan_atomics_helper+0x3f58/0x4858
[   20.702624]  kasan_atomics+0x198/0x2e0
[   20.702857]  kunit_try_run_case+0x170/0x3f0
[   20.702942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.703000]  kthread+0x328/0x630
[   20.703046]  ret_from_fork+0x10/0x20
[   20.703095] 
[   20.703115] Allocated by task 267:
[   20.703145]  kasan_save_stack+0x3c/0x68
[   20.703211]  kasan_save_track+0x20/0x40
[   20.703251]  kasan_save_alloc_info+0x40/0x58
[   20.703389]  __kasan_kmalloc+0xd4/0xd8
[   20.703568]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.703609]  kasan_atomics+0xb8/0x2e0
[   20.703666]  kunit_try_run_case+0x170/0x3f0
[   20.703832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.703900]  kthread+0x328/0x630
[   20.703992]  ret_from_fork+0x10/0x20
[   20.704105] 
[   20.704183] The buggy address belongs to the object at fff00000c59c9e00
[   20.704183]  which belongs to the cache kmalloc-64 of size 64
[   20.704261] The buggy address is located 0 bytes to the right of
[   20.704261]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.704331] 
[   20.704354] The buggy address belongs to the physical page:
[   20.704387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.704444] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.704494] page_type: f5(slab)
[   20.705023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.705184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.705569] page dumped because: kasan: bad access detected
[   20.705616] 
[   20.705711] Memory state around the buggy address:
[   20.705961]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.706013]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.706057] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.706100]                                      ^
[   20.706134]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.706181]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.706232] ==================================================================
[   20.830159] ==================================================================
[   20.830233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.830413] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.830478] 
[   20.830510] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.830814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.830857] Hardware name: linux,dummy-virt (DT)
[   20.830892] Call trace:
[   20.831269]  show_stack+0x20/0x38 (C)
[   20.831471]  dump_stack_lvl+0x8c/0xd0
[   20.831634]  print_report+0x118/0x5d0
[   20.831695]  kasan_report+0xdc/0x128
[   20.831742]  kasan_check_range+0x100/0x1a8
[   20.831792]  __kasan_check_write+0x20/0x30
[   20.832171]  kasan_atomics_helper+0x1384/0x4858
[   20.832262]  kasan_atomics+0x198/0x2e0
[   20.832668]  kunit_try_run_case+0x170/0x3f0
[   20.832747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.833071]  kthread+0x328/0x630
[   20.833142]  ret_from_fork+0x10/0x20
[   20.834042] 
[   20.834588] Allocated by task 267:
[   20.834883]  kasan_save_stack+0x3c/0x68
[   20.835065]  kasan_save_track+0x20/0x40
[   20.835285]  kasan_save_alloc_info+0x40/0x58
[   20.835403]  __kasan_kmalloc+0xd4/0xd8
[   20.835645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.835841]  kasan_atomics+0xb8/0x2e0
[   20.836028]  kunit_try_run_case+0x170/0x3f0
[   20.836180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.836336]  kthread+0x328/0x630
[   20.836398]  ret_from_fork+0x10/0x20
[   20.836440] 
[   20.836462] The buggy address belongs to the object at fff00000c59c9e00
[   20.836462]  which belongs to the cache kmalloc-64 of size 64
[   20.836529] The buggy address is located 0 bytes to the right of
[   20.836529]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.836600] 
[   20.836640] The buggy address belongs to the physical page:
[   20.836674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.836730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.836781] page_type: f5(slab)
[   20.836821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.836885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.836932] page dumped because: kasan: bad access detected
[   20.836976] 
[   20.837015] Memory state around the buggy address:
[   20.837060]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.837107]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.837153] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.837214]                                      ^
[   20.837248]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.837307]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.837742] ==================================================================
[   20.963144] ==================================================================
[   20.963199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.963267] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.963320] 
[   20.963351] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.963562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.963602] Hardware name: linux,dummy-virt (DT)
[   20.963659] Call trace:
[   20.963686]  show_stack+0x20/0x38 (C)
[   20.963737]  dump_stack_lvl+0x8c/0xd0
[   20.963798]  print_report+0x118/0x5d0
[   20.963845]  kasan_report+0xdc/0x128
[   20.963902]  kasan_check_range+0x100/0x1a8
[   20.963952]  __kasan_check_write+0x20/0x30
[   20.964000]  kasan_atomics_helper+0x17ec/0x4858
[   20.964051]  kasan_atomics+0x198/0x2e0
[   20.964103]  kunit_try_run_case+0x170/0x3f0
[   20.964154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.964225]  kthread+0x328/0x630
[   20.964272]  ret_from_fork+0x10/0x20
[   20.964321] 
[   20.964351] Allocated by task 267:
[   20.964382]  kasan_save_stack+0x3c/0x68
[   20.964431]  kasan_save_track+0x20/0x40
[   20.964472]  kasan_save_alloc_info+0x40/0x58
[   20.964520]  __kasan_kmalloc+0xd4/0xd8
[   20.964559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.964603]  kasan_atomics+0xb8/0x2e0
[   20.964649]  kunit_try_run_case+0x170/0x3f0
[   20.964690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.964737]  kthread+0x328/0x630
[   20.964795]  ret_from_fork+0x10/0x20
[   20.964841] 
[   20.964867] The buggy address belongs to the object at fff00000c59c9e00
[   20.964867]  which belongs to the cache kmalloc-64 of size 64
[   20.964929] The buggy address is located 0 bytes to the right of
[   20.964929]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.965003] 
[   20.965024] The buggy address belongs to the physical page:
[   20.965068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.965140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.965191] page_type: f5(slab)
[   20.965240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.965293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.965841] page dumped because: kasan: bad access detected
[   20.966100] 
[   20.966129] Memory state around the buggy address:
[   20.966740]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.967225]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.967322] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.967396]                                      ^
[   20.967492]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967569]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.967924] ==================================================================
[   20.896888] ==================================================================
[   20.897444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.897525] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.897650] 
[   20.897719] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.898244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.898630] Hardware name: linux,dummy-virt (DT)
[   20.898709] Call trace:
[   20.898950]  show_stack+0x20/0x38 (C)
[   20.899391]  dump_stack_lvl+0x8c/0xd0
[   20.899620]  print_report+0x118/0x5d0
[   20.899737]  kasan_report+0xdc/0x128
[   20.899990]  __asan_report_load8_noabort+0x20/0x30
[   20.900137]  kasan_atomics_helper+0x3db0/0x4858
[   20.900296]  kasan_atomics+0x198/0x2e0
[   20.900349]  kunit_try_run_case+0x170/0x3f0
[   20.900906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.901171]  kthread+0x328/0x630
[   20.901394]  ret_from_fork+0x10/0x20
[   20.901691] 
[   20.901859] Allocated by task 267:
[   20.902083]  kasan_save_stack+0x3c/0x68
[   20.902318]  kasan_save_track+0x20/0x40
[   20.902702]  kasan_save_alloc_info+0x40/0x58
[   20.902831]  __kasan_kmalloc+0xd4/0xd8
[   20.902931]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.902972]  kasan_atomics+0xb8/0x2e0
[   20.903061]  kunit_try_run_case+0x170/0x3f0
[   20.903269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.903661]  kthread+0x328/0x630
[   20.903833]  ret_from_fork+0x10/0x20
[   20.904116] 
[   20.904334] The buggy address belongs to the object at fff00000c59c9e00
[   20.904334]  which belongs to the cache kmalloc-64 of size 64
[   20.904419] The buggy address is located 0 bytes to the right of
[   20.904419]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.904491] 
[   20.904748] The buggy address belongs to the physical page:
[   20.904860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.904921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.905005] page_type: f5(slab)
[   20.905052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.905119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.905165] page dumped because: kasan: bad access detected
[   20.905220] 
[   20.905240] Memory state around the buggy address:
[   20.905295]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.905597]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.905944] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.906016]                                      ^
[   20.906067]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.906122]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.906303] ==================================================================
[   20.952623] ==================================================================
[   20.952788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.953311] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.953399] 
[   20.953432] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.953516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.953544] Hardware name: linux,dummy-virt (DT)
[   20.953953] Call trace:
[   20.954313]  show_stack+0x20/0x38 (C)
[   20.954397]  dump_stack_lvl+0x8c/0xd0
[   20.954558]  print_report+0x118/0x5d0
[   20.954744]  kasan_report+0xdc/0x128
[   20.954813]  __asan_report_load8_noabort+0x20/0x30
[   20.955085]  kasan_atomics_helper+0x3e20/0x4858
[   20.955309]  kasan_atomics+0x198/0x2e0
[   20.955585]  kunit_try_run_case+0x170/0x3f0
[   20.955800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.955927]  kthread+0x328/0x630
[   20.956318]  ret_from_fork+0x10/0x20
[   20.956427] 
[   20.956637] Allocated by task 267:
[   20.956847]  kasan_save_stack+0x3c/0x68
[   20.956918]  kasan_save_track+0x20/0x40
[   20.957110]  kasan_save_alloc_info+0x40/0x58
[   20.957189]  __kasan_kmalloc+0xd4/0xd8
[   20.957245]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.957469]  kasan_atomics+0xb8/0x2e0
[   20.957679]  kunit_try_run_case+0x170/0x3f0
[   20.957920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.958080]  kthread+0x328/0x630
[   20.958562]  ret_from_fork+0x10/0x20
[   20.958876] 
[   20.958938] The buggy address belongs to the object at fff00000c59c9e00
[   20.958938]  which belongs to the cache kmalloc-64 of size 64
[   20.959020] The buggy address is located 0 bytes to the right of
[   20.959020]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.959333] 
[   20.959398] The buggy address belongs to the physical page:
[   20.959643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.959848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.959995] page_type: f5(slab)
[   20.960291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.960652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.960731] page dumped because: kasan: bad access detected
[   20.961106] 
[   20.961473] Memory state around the buggy address:
[   20.961632]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961724]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961780] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.961822]                                      ^
[   20.962031]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.962440]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.962631] ==================================================================
[   20.761599] ==================================================================
[   20.761740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.761787] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.761857] 
[   20.761925] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.762038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.762107] Hardware name: linux,dummy-virt (DT)
[   20.762141] Call trace:
[   20.762184]  show_stack+0x20/0x38 (C)
[   20.762247]  dump_stack_lvl+0x8c/0xd0
[   20.762294]  print_report+0x118/0x5d0
[   20.762341]  kasan_report+0xdc/0x128
[   20.762386]  kasan_check_range+0x100/0x1a8
[   20.762435]  __kasan_check_write+0x20/0x30
[   20.762516]  kasan_atomics_helper+0xff0/0x4858
[   20.762573]  kasan_atomics+0x198/0x2e0
[   20.762618]  kunit_try_run_case+0x170/0x3f0
[   20.762698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.762782]  kthread+0x328/0x630
[   20.762843]  ret_from_fork+0x10/0x20
[   20.762909] 
[   20.762967] Allocated by task 267:
[   20.762996]  kasan_save_stack+0x3c/0x68
[   20.763054]  kasan_save_track+0x20/0x40
[   20.763111]  kasan_save_alloc_info+0x40/0x58
[   20.763166]  __kasan_kmalloc+0xd4/0xd8
[   20.763211]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.763252]  kasan_atomics+0xb8/0x2e0
[   20.763289]  kunit_try_run_case+0x170/0x3f0
[   20.763328]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.763375]  kthread+0x328/0x630
[   20.763463]  ret_from_fork+0x10/0x20
[   20.763523] 
[   20.763562] The buggy address belongs to the object at fff00000c59c9e00
[   20.763562]  which belongs to the cache kmalloc-64 of size 64
[   20.763675] The buggy address is located 0 bytes to the right of
[   20.763675]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.763791] 
[   20.763815] The buggy address belongs to the physical page:
[   20.763855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.763919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.763971] page_type: f5(slab)
[   20.764010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.764063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.764409] page dumped because: kasan: bad access detected
[   20.764449] 
[   20.764468] Memory state around the buggy address:
[   20.764503]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.764549]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.764596] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.764709]                                      ^
[   20.764750]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.764805]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.764846] ==================================================================
[   20.778689] ==================================================================
[   20.778745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.778795] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.778848] 
[   20.778880] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.778991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.779022] Hardware name: linux,dummy-virt (DT)
[   20.779055] Call trace:
[   20.779080]  show_stack+0x20/0x38 (C)
[   20.779128]  dump_stack_lvl+0x8c/0xd0
[   20.779186]  print_report+0x118/0x5d0
[   20.779245]  kasan_report+0xdc/0x128
[   20.779291]  kasan_check_range+0x100/0x1a8
[   20.779341]  __kasan_check_write+0x20/0x30
[   20.779389]  kasan_atomics_helper+0x1128/0x4858
[   20.779437]  kasan_atomics+0x198/0x2e0
[   20.779482]  kunit_try_run_case+0x170/0x3f0
[   20.779531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.779586]  kthread+0x328/0x630
[   20.779643]  ret_from_fork+0x10/0x20
[   20.779690] 
[   20.779711] Allocated by task 267:
[   20.779751]  kasan_save_stack+0x3c/0x68
[   20.779803]  kasan_save_track+0x20/0x40
[   20.779841]  kasan_save_alloc_info+0x40/0x58
[   20.779882]  __kasan_kmalloc+0xd4/0xd8
[   20.779918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.779958]  kasan_atomics+0xb8/0x2e0
[   20.780002]  kunit_try_run_case+0x170/0x3f0
[   20.780044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.780093]  kthread+0x328/0x630
[   20.780131]  ret_from_fork+0x10/0x20
[   20.780167] 
[   20.780187] The buggy address belongs to the object at fff00000c59c9e00
[   20.780187]  which belongs to the cache kmalloc-64 of size 64
[   20.780607] The buggy address is located 0 bytes to the right of
[   20.780607]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.780694] 
[   20.780961] The buggy address belongs to the physical page:
[   20.781044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.781105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.781434] page_type: f5(slab)
[   20.781550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.781795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.781861] page dumped because: kasan: bad access detected
[   20.782103] 
[   20.782174] Memory state around the buggy address:
[   20.782519]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.782662]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.782719] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.782994]                                      ^
[   20.783103]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.783335]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.783587] ==================================================================
[   20.545195] ==================================================================
[   20.545263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.545339] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.545457] 
[   20.545488] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.545572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.545602] Hardware name: linux,dummy-virt (DT)
[   20.546239]  kasan_report+0xdc/0x128
[   20.547081]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.547257]  kthread+0x328/0x630
[   20.547384]  ret_from_fork+0x10/0x20
[   20.547620] 
[   20.547641] Allocated by task 267:
[   20.547691]  kasan_save_stack+0x3c/0x68
[   20.547735]  kasan_save_track+0x20/0x40
[   20.547821]  kasan_save_alloc_info+0x40/0x58
[   20.547911]  __kasan_kmalloc+0xd4/0xd8
[   20.547948]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.547989]  kasan_atomics+0xb8/0x2e0
[   20.548026]  kunit_try_run_case+0x170/0x3f0
[   20.548088]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.548241]  kthread+0x328/0x630
[   20.548278]  ret_from_fork+0x10/0x20
[   20.548317] 
[   20.548338] The buggy address belongs to the object at fff00000c59c9e00
[   20.548338]  which belongs to the cache kmalloc-64 of size 64
[   20.548408] The buggy address is located 0 bytes to the right of
[   20.548408]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.548525] 
[   20.548547] The buggy address belongs to the physical page:
[   20.548580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.548633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.549136] page_type: f5(slab)
[   20.549184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.549251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.549551] page dumped because: kasan: bad access detected
[   20.549588] 
[   20.549626] Memory state around the buggy address:
[   20.549692]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.549740]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.549804] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.549847]                                      ^
[   20.549882]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.549928]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.549969] ==================================================================
[   20.745848] ==================================================================
[   20.746056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.746252] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.746306] 
[   20.746338] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.746423] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.746453] Hardware name: linux,dummy-virt (DT)
[   20.746487] Call trace:
[   20.746509]  show_stack+0x20/0x38 (C)
[   20.746556]  dump_stack_lvl+0x8c/0xd0
[   20.746606]  print_report+0x118/0x5d0
[   20.746653]  kasan_report+0xdc/0x128
[   20.746699]  kasan_check_range+0x100/0x1a8
[   20.749361]  __kasan_check_write+0x20/0x30
[   20.750157]  kasan_atomics_helper+0xf20/0x4858
[   20.750406]  kasan_atomics+0x198/0x2e0
[   20.750708]  kunit_try_run_case+0x170/0x3f0
[   20.751553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.752381]  kthread+0x328/0x630
[   20.752641]  ret_from_fork+0x10/0x20
[   20.752830] 
[   20.752853] Allocated by task 267:
[   20.752963]  kasan_save_stack+0x3c/0x68
[   20.753008]  kasan_save_track+0x20/0x40
[   20.753046]  kasan_save_alloc_info+0x40/0x58
[   20.753088]  __kasan_kmalloc+0xd4/0xd8
[   20.754558]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.755029]  kasan_atomics+0xb8/0x2e0
[   20.755082]  kunit_try_run_case+0x170/0x3f0
[   20.756241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.756304]  kthread+0x328/0x630
[   20.756345]  ret_from_fork+0x10/0x20
[   20.756384] 
[   20.756406] The buggy address belongs to the object at fff00000c59c9e00
[   20.756406]  which belongs to the cache kmalloc-64 of size 64
[   20.756471] The buggy address is located 0 bytes to the right of
[   20.756471]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.756539] 
[   20.756561] The buggy address belongs to the physical page:
[   20.756595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.756650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.756702] page_type: f5(slab)
[   20.756742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.756796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.756841] page dumped because: kasan: bad access detected
[   20.756877] 
[   20.756897] Memory state around the buggy address:
[   20.756933]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.756982]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.757029] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.757116]                                      ^
[   20.757246]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.757364]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.757470] ==================================================================
[   20.784752] ==================================================================
[   20.784809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.785062] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.785224] 
[   20.785268] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.786988] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.787139] Hardware name: linux,dummy-virt (DT)
[   20.787312] Call trace:
[   20.787397]  show_stack+0x20/0x38 (C)
[   20.789351]  dump_stack_lvl+0x8c/0xd0
[   20.789425]  print_report+0x118/0x5d0
[   20.789472]  kasan_report+0xdc/0x128
[   20.789521]  kasan_check_range+0x100/0x1a8
[   20.790312]  __kasan_check_write+0x20/0x30
[   20.790384]  kasan_atomics_helper+0x1190/0x4858
[   20.791254]  kasan_atomics+0x198/0x2e0
[   20.791754]  kunit_try_run_case+0x170/0x3f0
[   20.791843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.791904]  kthread+0x328/0x630
[   20.792100]  ret_from_fork+0x10/0x20
[   20.792369] 
[   20.792677] Allocated by task 267:
[   20.792730]  kasan_save_stack+0x3c/0x68
[   20.792931]  kasan_save_track+0x20/0x40
[   20.793013]  kasan_save_alloc_info+0x40/0x58
[   20.793128]  __kasan_kmalloc+0xd4/0xd8
[   20.793185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.793467]  kasan_atomics+0xb8/0x2e0
[   20.793757]  kunit_try_run_case+0x170/0x3f0
[   20.794025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.794133]  kthread+0x328/0x630
[   20.794331]  ret_from_fork+0x10/0x20
[   20.794388] 
[   20.794411] The buggy address belongs to the object at fff00000c59c9e00
[   20.794411]  which belongs to the cache kmalloc-64 of size 64
[   20.794476] The buggy address is located 0 bytes to the right of
[   20.794476]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.794546] 
[   20.794568] The buggy address belongs to the physical page:
[   20.795265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.795357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.795411] page_type: f5(slab)
[   20.795477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.795544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.795598] page dumped because: kasan: bad access detected
[   20.795648] 
[   20.795678] Memory state around the buggy address:
[   20.795733]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.795782]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.795828] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.795872]                                      ^
[   20.795909]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.795962]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.796004] ==================================================================
[   20.808935] ==================================================================
[   20.809086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.809138] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.809213] 
[   20.809248] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.809638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.810021] Hardware name: linux,dummy-virt (DT)
[   20.810225] Call trace:
[   20.810467]  show_stack+0x20/0x38 (C)
[   20.810606]  dump_stack_lvl+0x8c/0xd0
[   20.810784]  print_report+0x118/0x5d0
[   20.811117]  kasan_report+0xdc/0x128
[   20.811482]  kasan_check_range+0x100/0x1a8
[   20.811665]  __kasan_check_write+0x20/0x30
[   20.811839]  kasan_atomics_helper+0x126c/0x4858
[   20.811931]  kasan_atomics+0x198/0x2e0
[   20.811980]  kunit_try_run_case+0x170/0x3f0
[   20.812286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.812771]  kthread+0x328/0x630
[   20.812836]  ret_from_fork+0x10/0x20
[   20.812969] 
[   20.812999] Allocated by task 267:
[   20.813061]  kasan_save_stack+0x3c/0x68
[   20.813107]  kasan_save_track+0x20/0x40
[   20.813145]  kasan_save_alloc_info+0x40/0x58
[   20.813195]  __kasan_kmalloc+0xd4/0xd8
[   20.813251]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.813293]  kasan_atomics+0xb8/0x2e0
[   20.813435]  kunit_try_run_case+0x170/0x3f0
[   20.813873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.813944]  kthread+0x328/0x630
[   20.813983]  ret_from_fork+0x10/0x20
[   20.814023] 
[   20.814044] The buggy address belongs to the object at fff00000c59c9e00
[   20.814044]  which belongs to the cache kmalloc-64 of size 64
[   20.814616] The buggy address is located 0 bytes to the right of
[   20.814616]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.815632] 
[   20.815682] The buggy address belongs to the physical page:
[   20.815730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.815799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.815871] page_type: f5(slab)
[   20.815944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.816187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.816343] page dumped because: kasan: bad access detected
[   20.816585] 
[   20.816613] Memory state around the buggy address:
[   20.816802]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.817249]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.817309] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.817465]                                      ^
[   20.817511]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.817558]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.817909] ==================================================================
[   20.945599] ==================================================================
[   20.945654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.945705] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.945758] 
[   20.946161] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.946278] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.946314] Hardware name: linux,dummy-virt (DT)
[   20.946542] Call trace:
[   20.946577]  show_stack+0x20/0x38 (C)
[   20.946631]  dump_stack_lvl+0x8c/0xd0
[   20.946847]  print_report+0x118/0x5d0
[   20.947078]  kasan_report+0xdc/0x128
[   20.947141]  kasan_check_range+0x100/0x1a8
[   20.947191]  __kasan_check_write+0x20/0x30
[   20.947458]  kasan_atomics_helper+0x175c/0x4858
[   20.947694]  kasan_atomics+0x198/0x2e0
[   20.947957]  kunit_try_run_case+0x170/0x3f0
[   20.948038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.948221]  kthread+0x328/0x630
[   20.948282]  ret_from_fork+0x10/0x20
[   20.948332] 
[   20.948621] Allocated by task 267:
[   20.948863]  kasan_save_stack+0x3c/0x68
[   20.948933]  kasan_save_track+0x20/0x40
[   20.949062]  kasan_save_alloc_info+0x40/0x58
[   20.949115]  __kasan_kmalloc+0xd4/0xd8
[   20.949151]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.949391]  kasan_atomics+0xb8/0x2e0
[   20.949652]  kunit_try_run_case+0x170/0x3f0
[   20.949854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.949949]  kthread+0x328/0x630
[   20.950351]  ret_from_fork+0x10/0x20
[   20.950479] 
[   20.950569] The buggy address belongs to the object at fff00000c59c9e00
[   20.950569]  which belongs to the cache kmalloc-64 of size 64
[   20.950676] The buggy address is located 0 bytes to the right of
[   20.950676]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.950861] 
[   20.950886] The buggy address belongs to the physical page:
[   20.950921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.951170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.951333] page_type: f5(slab)
[   20.951498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.951569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.951616] page dumped because: kasan: bad access detected
[   20.951652] 
[   20.951673] Memory state around the buggy address:
[   20.951718]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.951775]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.951831] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.951873]                                      ^
[   20.951910]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.951956]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.951997] ==================================================================
[   20.850618] ==================================================================
[   20.850776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.850980] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.851261] 
[   20.851305] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.851394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.851431] Hardware name: linux,dummy-virt (DT)
[   20.851464] Call trace:
[   20.851728]  show_stack+0x20/0x38 (C)
[   20.851808]  dump_stack_lvl+0x8c/0xd0
[   20.852036]  print_report+0x118/0x5d0
[   20.852101]  kasan_report+0xdc/0x128
[   20.852513]  kasan_check_range+0x100/0x1a8
[   20.852742]  __kasan_check_write+0x20/0x30
[   20.852805]  kasan_atomics_helper+0x1414/0x4858
[   20.852923]  kasan_atomics+0x198/0x2e0
[   20.852980]  kunit_try_run_case+0x170/0x3f0
[   20.853308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.853389]  kthread+0x328/0x630
[   20.853694]  ret_from_fork+0x10/0x20
[   20.853759] 
[   20.853790] Allocated by task 267:
[   20.853819]  kasan_save_stack+0x3c/0x68
[   20.854020]  kasan_save_track+0x20/0x40
[   20.854307]  kasan_save_alloc_info+0x40/0x58
[   20.854485]  __kasan_kmalloc+0xd4/0xd8
[   20.854872]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.855021]  kasan_atomics+0xb8/0x2e0
[   20.855187]  kunit_try_run_case+0x170/0x3f0
[   20.855873]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.855960]  kthread+0x328/0x630
[   20.856027]  ret_from_fork+0x10/0x20
[   20.856100] 
[   20.856169] The buggy address belongs to the object at fff00000c59c9e00
[   20.856169]  which belongs to the cache kmalloc-64 of size 64
[   20.856780] The buggy address is located 0 bytes to the right of
[   20.856780]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.856905] 
[   20.857067] The buggy address belongs to the physical page:
[   20.857727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.857811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.857865] page_type: f5(slab)
[   20.858078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.858425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.858478] page dumped because: kasan: bad access detected
[   20.858514] 
[   20.858535] Memory state around the buggy address:
[   20.858771]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.858845]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.858913] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.858965]                                      ^
[   20.859001]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.859057]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.859100] ==================================================================
[   20.770575] ==================================================================
[   20.770631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.770868] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.770942] 
[   20.771003] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.771094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.771141] Hardware name: linux,dummy-virt (DT)
[   20.771175] Call trace:
[   20.771228]  show_stack+0x20/0x38 (C)
[   20.771289]  dump_stack_lvl+0x8c/0xd0
[   20.771366]  print_report+0x118/0x5d0
[   20.771446]  kasan_report+0xdc/0x128
[   20.771513]  kasan_check_range+0x100/0x1a8
[   20.771562]  __kasan_check_write+0x20/0x30
[   20.771610]  kasan_atomics_helper+0x10c0/0x4858
[   20.771659]  kasan_atomics+0x198/0x2e0
[   20.771842]  kunit_try_run_case+0x170/0x3f0
[   20.771896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.772063]  kthread+0x328/0x630
[   20.772333]  ret_from_fork+0x10/0x20
[   20.772468] 
[   20.772545] Allocated by task 267:
[   20.772579]  kasan_save_stack+0x3c/0x68
[   20.772638]  kasan_save_track+0x20/0x40
[   20.772679]  kasan_save_alloc_info+0x40/0x58
[   20.772720]  __kasan_kmalloc+0xd4/0xd8
[   20.772769]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.772817]  kasan_atomics+0xb8/0x2e0
[   20.772856]  kunit_try_run_case+0x170/0x3f0
[   20.772898]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.772945]  kthread+0x328/0x630
[   20.772983]  ret_from_fork+0x10/0x20
[   20.773319] 
[   20.773362] The buggy address belongs to the object at fff00000c59c9e00
[   20.773362]  which belongs to the cache kmalloc-64 of size 64
[   20.773608] The buggy address is located 0 bytes to the right of
[   20.773608]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.773703] 
[   20.773728] The buggy address belongs to the physical page:
[   20.773761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.774192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.774546] page_type: f5(slab)
[   20.774830] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.775123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.775389] page dumped because: kasan: bad access detected
[   20.775677] 
[   20.775721] Memory state around the buggy address:
[   20.775787]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.776358]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.776477] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.776651]                                      ^
[   20.776996]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.777252]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.777322] ==================================================================
[   20.877559] ==================================================================
[   20.877614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.877663] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.877717] 
[   20.878215] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.878639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.878682] Hardware name: linux,dummy-virt (DT)
[   20.878753] Call trace:
[   20.878779]  show_stack+0x20/0x38 (C)
[   20.878919]  dump_stack_lvl+0x8c/0xd0
[   20.878978]  print_report+0x118/0x5d0
[   20.879350]  kasan_report+0xdc/0x128
[   20.879744]  kasan_check_range+0x100/0x1a8
[   20.880003]  __kasan_check_write+0x20/0x30
[   20.880087]  kasan_atomics_helper+0x154c/0x4858
[   20.880147]  kasan_atomics+0x198/0x2e0
[   20.880194]  kunit_try_run_case+0x170/0x3f0
[   20.880529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.880771]  kthread+0x328/0x630
[   20.881027]  ret_from_fork+0x10/0x20
[   20.881095] 
[   20.881217] Allocated by task 267:
[   20.881253]  kasan_save_stack+0x3c/0x68
[   20.881295]  kasan_save_track+0x20/0x40
[   20.881386]  kasan_save_alloc_info+0x40/0x58
[   20.881451]  __kasan_kmalloc+0xd4/0xd8
[   20.881491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.881548]  kasan_atomics+0xb8/0x2e0
[   20.881587]  kunit_try_run_case+0x170/0x3f0
[   20.882333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.882486]  kthread+0x328/0x630
[   20.882550]  ret_from_fork+0x10/0x20
[   20.883025] 
[   20.883095] The buggy address belongs to the object at fff00000c59c9e00
[   20.883095]  which belongs to the cache kmalloc-64 of size 64
[   20.883173] The buggy address is located 0 bytes to the right of
[   20.883173]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.883433] 
[   20.883459] The buggy address belongs to the physical page:
[   20.883598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.884192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.884337] page_type: f5(slab)
[   20.884378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.884607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.884727] page dumped because: kasan: bad access detected
[   20.884939] 
[   20.885119] Memory state around the buggy address:
[   20.885696]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.885966]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.886160] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.886343]                                      ^
[   20.886470]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.886852]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.886956] ==================================================================
[   20.690434] ==================================================================
[   20.690497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.690546] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.690598] 
[   20.690632] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.690717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.690747] Hardware name: linux,dummy-virt (DT)
[   20.690778] Call trace:
[   20.690803]  show_stack+0x20/0x38 (C)
[   20.690850]  dump_stack_lvl+0x8c/0xd0
[   20.690899]  print_report+0x118/0x5d0
[   20.690946]  kasan_report+0xdc/0x128
[   20.690992]  kasan_check_range+0x100/0x1a8
[   20.691042]  __kasan_check_read+0x20/0x30
[   20.691089]  kasan_atomics_helper+0xdd4/0x4858
[   20.691137]  kasan_atomics+0x198/0x2e0
[   20.691181]  kunit_try_run_case+0x170/0x3f0
[   20.691240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.693247]  kthread+0x328/0x630
[   20.694164]  ret_from_fork+0x10/0x20
[   20.694368] 
[   20.695059] Allocated by task 267:
[   20.695097]  kasan_save_stack+0x3c/0x68
[   20.695328]  kasan_save_track+0x20/0x40
[   20.695445]  kasan_save_alloc_info+0x40/0x58
[   20.695546]  __kasan_kmalloc+0xd4/0xd8
[   20.695624]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.695713]  kasan_atomics+0xb8/0x2e0
[   20.695764]  kunit_try_run_case+0x170/0x3f0
[   20.695817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.695913]  kthread+0x328/0x630
[   20.695950]  ret_from_fork+0x10/0x20
[   20.695989] 
[   20.696012] The buggy address belongs to the object at fff00000c59c9e00
[   20.696012]  which belongs to the cache kmalloc-64 of size 64
[   20.696073] The buggy address is located 0 bytes to the right of
[   20.696073]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.696175] 
[   20.696964] The buggy address belongs to the physical page:
[   20.697068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.697126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.697180] page_type: f5(slab)
[   20.697917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.698101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.698151] page dumped because: kasan: bad access detected
[   20.698186] 
[   20.698250] Memory state around the buggy address:
[   20.698354]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.698762]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.698813] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.698854]                                      ^
[   20.698892]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.698941]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.698984] ==================================================================
[   20.871681] ==================================================================
[   20.871765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.871817] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.871908] 
[   20.871942] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.872025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.872443] Hardware name: linux,dummy-virt (DT)
[   20.872615] Call trace:
[   20.872651]  show_stack+0x20/0x38 (C)
[   20.872850]  dump_stack_lvl+0x8c/0xd0
[   20.872903]  print_report+0x118/0x5d0
[   20.872949]  kasan_report+0xdc/0x128
[   20.873014]  kasan_check_range+0x100/0x1a8
[   20.873068]  __kasan_check_write+0x20/0x30
[   20.873141]  kasan_atomics_helper+0x14e4/0x4858
[   20.873624]  kasan_atomics+0x198/0x2e0
[   20.873816]  kunit_try_run_case+0x170/0x3f0
[   20.874057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.874124]  kthread+0x328/0x630
[   20.874170]  ret_from_fork+0x10/0x20
[   20.874232] 
[   20.874253] Allocated by task 267:
[   20.874285]  kasan_save_stack+0x3c/0x68
[   20.874489]  kasan_save_track+0x20/0x40
[   20.874660]  kasan_save_alloc_info+0x40/0x58
[   20.874727]  __kasan_kmalloc+0xd4/0xd8
[   20.874775]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.874841]  kasan_atomics+0xb8/0x2e0
[   20.874880]  kunit_try_run_case+0x170/0x3f0
[   20.874926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.874972]  kthread+0x328/0x630
[   20.875021]  ret_from_fork+0x10/0x20
[   20.875060] 
[   20.875082] The buggy address belongs to the object at fff00000c59c9e00
[   20.875082]  which belongs to the cache kmalloc-64 of size 64
[   20.875156] The buggy address is located 0 bytes to the right of
[   20.875156]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.875254] 
[   20.875277] The buggy address belongs to the physical page:
[   20.875319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.875375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.875427] page_type: f5(slab)
[   20.875468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.875523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.875570] page dumped because: kasan: bad access detected
[   20.875624] 
[   20.875653] Memory state around the buggy address:
[   20.875697]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.875743]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.875790] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.875840]                                      ^
[   20.875883]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.875929]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.875978] ==================================================================
[   20.860189] ==================================================================
[   20.860553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.860635] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.860823] 
[   20.861012] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.861110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.861276] Hardware name: linux,dummy-virt (DT)
[   20.861525] Call trace:
[   20.861585]  show_stack+0x20/0x38 (C)
[   20.861700]  dump_stack_lvl+0x8c/0xd0
[   20.861768]  print_report+0x118/0x5d0
[   20.862037]  kasan_report+0xdc/0x128
[   20.862412]  kasan_check_range+0x100/0x1a8
[   20.862537]  __kasan_check_write+0x20/0x30
[   20.862712]  kasan_atomics_helper+0x147c/0x4858
[   20.862975]  kasan_atomics+0x198/0x2e0
[   20.863141]  kunit_try_run_case+0x170/0x3f0
[   20.863358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.863752]  kthread+0x328/0x630
[   20.863823]  ret_from_fork+0x10/0x20
[   20.864176] 
[   20.864296] Allocated by task 267:
[   20.864463]  kasan_save_stack+0x3c/0x68
[   20.864599]  kasan_save_track+0x20/0x40
[   20.864640]  kasan_save_alloc_info+0x40/0x58
[   20.864681]  __kasan_kmalloc+0xd4/0xd8
[   20.864891]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.865394]  kasan_atomics+0xb8/0x2e0
[   20.865587]  kunit_try_run_case+0x170/0x3f0
[   20.866183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866540]  kthread+0x328/0x630
[   20.866737]  ret_from_fork+0x10/0x20
[   20.866854] 
[   20.866905] The buggy address belongs to the object at fff00000c59c9e00
[   20.866905]  which belongs to the cache kmalloc-64 of size 64
[   20.867327] The buggy address is located 0 bytes to the right of
[   20.867327]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.867585] 
[   20.867834] The buggy address belongs to the physical page:
[   20.868131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.868427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.868516] page_type: f5(slab)
[   20.868855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.869200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.869466] page dumped because: kasan: bad access detected
[   20.869619] 
[   20.869695] Memory state around the buggy address:
[   20.869742]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.869805]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.869852] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.869895]                                      ^
[   20.869929]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.869976]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.870016] ==================================================================
[   20.539346] ==================================================================
[   20.539581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.539829] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.539890] 
[   20.539955] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.540196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.540292] Hardware name: linux,dummy-virt (DT)
[   20.540340] Call trace:
[   20.540460]  show_stack+0x20/0x38 (C)
[   20.540514]  dump_stack_lvl+0x8c/0xd0
[   20.540572]  print_report+0x118/0x5d0
[   20.540687]  kasan_report+0xdc/0x128
[   20.540919]  kasan_check_range+0x100/0x1a8
[   20.541230]  __kasan_check_write+0x20/0x30
[   20.541284]  kasan_atomics_helper+0x99c/0x4858
[   20.541399]  kasan_atomics+0x198/0x2e0
[   20.541447]  kunit_try_run_case+0x170/0x3f0
[   20.541496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.541570]  kthread+0x328/0x630
[   20.541619]  ret_from_fork+0x10/0x20
[   20.541666] 
[   20.541686] Allocated by task 267:
[   20.541715]  kasan_save_stack+0x3c/0x68
[   20.541837]  kasan_save_track+0x20/0x40
[   20.541878]  kasan_save_alloc_info+0x40/0x58
[   20.541918]  __kasan_kmalloc+0xd4/0xd8
[   20.541957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.541996]  kasan_atomics+0xb8/0x2e0
[   20.542034]  kunit_try_run_case+0x170/0x3f0
[   20.542074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.542122]  kthread+0x328/0x630
[   20.542420]  ret_from_fork+0x10/0x20
[   20.542479] 
[   20.542501] The buggy address belongs to the object at fff00000c59c9e00
[   20.542501]  which belongs to the cache kmalloc-64 of size 64
[   20.542563] The buggy address is located 0 bytes to the right of
[   20.542563]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.542684] 
[   20.542739] The buggy address belongs to the physical page:
[   20.542778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.542874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.542923] page_type: f5(slab)
[   20.542963] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.543073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.543303] page dumped because: kasan: bad access detected
[   20.543450] 
[   20.543470] Memory state around the buggy address:
[   20.543530]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.543578]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.543624] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.543699]                                      ^
[   20.543794]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.543840]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.543902] ==================================================================
[   20.907298] ==================================================================
[   20.907489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.907560] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.907614] 
[   20.908081] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.908189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.908235] Hardware name: linux,dummy-virt (DT)
[   20.908628] Call trace:
[   20.908688]  show_stack+0x20/0x38 (C)
[   20.908775]  dump_stack_lvl+0x8c/0xd0
[   20.908830]  print_report+0x118/0x5d0
[   20.908936]  kasan_report+0xdc/0x128
[   20.908982]  kasan_check_range+0x100/0x1a8
[   20.909046]  __kasan_check_write+0x20/0x30
[   20.909097]  kasan_atomics_helper+0x1644/0x4858
[   20.909281]  kasan_atomics+0x198/0x2e0
[   20.909697]  kunit_try_run_case+0x170/0x3f0
[   20.909813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.909985]  kthread+0x328/0x630
[   20.910136]  ret_from_fork+0x10/0x20
[   20.910198] 
[   20.910234] Allocated by task 267:
[   20.910263]  kasan_save_stack+0x3c/0x68
[   20.910661]  kasan_save_track+0x20/0x40
[   20.910967]  kasan_save_alloc_info+0x40/0x58
[   20.911238]  __kasan_kmalloc+0xd4/0xd8
[   20.911427]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.911523]  kasan_atomics+0xb8/0x2e0
[   20.911561]  kunit_try_run_case+0x170/0x3f0
[   20.911827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.912283]  kthread+0x328/0x630
[   20.912535]  ret_from_fork+0x10/0x20
[   20.912635] 
[   20.912691] The buggy address belongs to the object at fff00000c59c9e00
[   20.912691]  which belongs to the cache kmalloc-64 of size 64
[   20.912983] The buggy address is located 0 bytes to the right of
[   20.912983]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.913061] 
[   20.913457] The buggy address belongs to the physical page:
[   20.913768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.913956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.914012] page_type: f5(slab)
[   20.914050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.914835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.915226] page dumped because: kasan: bad access detected
[   20.915293] 
[   20.915471] Memory state around the buggy address:
[   20.915682]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.915736]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.916145] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.916196]                                      ^
[   20.916256]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.916301]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.916354] ==================================================================
[   20.887756] ==================================================================
[   20.887817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.887872] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.887981] 
[   20.888016] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.888114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.888278] Hardware name: linux,dummy-virt (DT)
[   20.888316] Call trace:
[   20.888343]  show_stack+0x20/0x38 (C)
[   20.888561]  dump_stack_lvl+0x8c/0xd0
[   20.888652]  print_report+0x118/0x5d0
[   20.888904]  kasan_report+0xdc/0x128
[   20.889168]  kasan_check_range+0x100/0x1a8
[   20.889252]  __kasan_check_write+0x20/0x30
[   20.889303]  kasan_atomics_helper+0x15b4/0x4858
[   20.889926]  kasan_atomics+0x198/0x2e0
[   20.890094]  kunit_try_run_case+0x170/0x3f0
[   20.890170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.890243]  kthread+0x328/0x630
[   20.890289]  ret_from_fork+0x10/0x20
[   20.890953] 
[   20.891002] Allocated by task 267:
[   20.891192]  kasan_save_stack+0x3c/0x68
[   20.891358]  kasan_save_track+0x20/0x40
[   20.891455]  kasan_save_alloc_info+0x40/0x58
[   20.891588]  __kasan_kmalloc+0xd4/0xd8
[   20.891819]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.892225]  kasan_atomics+0xb8/0x2e0
[   20.892416]  kunit_try_run_case+0x170/0x3f0
[   20.892697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.893195]  kthread+0x328/0x630
[   20.893781]  ret_from_fork+0x10/0x20
[   20.893845] 
[   20.894003] The buggy address belongs to the object at fff00000c59c9e00
[   20.894003]  which belongs to the cache kmalloc-64 of size 64
[   20.894184] The buggy address is located 0 bytes to the right of
[   20.894184]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.894404] 
[   20.894432] The buggy address belongs to the physical page:
[   20.894925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.895174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.895443] page_type: f5(slab)
[   20.895617] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.895702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.895860] page dumped because: kasan: bad access detected
[   20.895906] 
[   20.895926] Memory state around the buggy address:
[   20.895964]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.896011]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.896059] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.896103]                                      ^
[   20.896338]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.896418]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.896469] ==================================================================
[   20.527881] ==================================================================
[   20.527928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.527993] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.528259] 
[   20.528407] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.528597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.528633] Hardware name: linux,dummy-virt (DT)
[   20.528667] Call trace:
[   20.528688]  show_stack+0x20/0x38 (C)
[   20.528746]  dump_stack_lvl+0x8c/0xd0
[   20.528989]  print_report+0x118/0x5d0
[   20.529043]  kasan_report+0xdc/0x128
[   20.529192]  __asan_report_load4_noabort+0x20/0x30
[   20.529282]  kasan_atomics_helper+0x42d8/0x4858
[   20.529402]  kasan_atomics+0x198/0x2e0
[   20.529448]  kunit_try_run_case+0x170/0x3f0
[   20.529499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.529557]  kthread+0x328/0x630
[   20.529644]  ret_from_fork+0x10/0x20
[   20.529692] 
[   20.529940] Allocated by task 267:
[   20.530089]  kasan_save_track+0x20/0x40
[   20.530348]  kasan_save_alloc_info+0x40/0x58
[   20.530400]  __kasan_kmalloc+0xd4/0xd8
[   20.530439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.530723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.531236] 
[   20.531335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.532286]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.533689] ==================================================================
[   20.757918] ==================================================================
[   20.758000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.758076] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.758129] 
[   20.758191] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.758290] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.758343] Hardware name: linux,dummy-virt (DT)
[   20.758378] Call trace:
[   20.758401]  show_stack+0x20/0x38 (C)
[   20.758450]  dump_stack_lvl+0x8c/0xd0
[   20.758515]  print_report+0x118/0x5d0
[   20.758590]  kasan_report+0xdc/0x128
[   20.758777]  kasan_check_range+0x100/0x1a8
[   20.758856]  __kasan_check_write+0x20/0x30
[   20.758955]  kasan_atomics_helper+0xf88/0x4858
[   20.759051]  kasan_atomics+0x198/0x2e0
[   20.759097]  kunit_try_run_case+0x170/0x3f0
[   20.759192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.759275]  kthread+0x328/0x630
[   20.759321]  ret_from_fork+0x10/0x20
[   20.759396] 
[   20.759436] Allocated by task 267:
[   20.759483]  kasan_save_stack+0x3c/0x68
[   20.759525]  kasan_save_track+0x20/0x40
[   20.759562]  kasan_save_alloc_info+0x40/0x58
[   20.759603]  __kasan_kmalloc+0xd4/0xd8
[   20.759914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.759963]  kasan_atomics+0xb8/0x2e0
[   20.760000]  kunit_try_run_case+0x170/0x3f0
[   20.760096]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.760154]  kthread+0x328/0x630
[   20.760193]  ret_from_fork+0x10/0x20
[   20.760244] 
[   20.760264] The buggy address belongs to the object at fff00000c59c9e00
[   20.760264]  which belongs to the cache kmalloc-64 of size 64
[   20.760494] The buggy address is located 0 bytes to the right of
[   20.760494]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.760562] 
[   20.760621] The buggy address belongs to the physical page:
[   20.760678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.760753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.760821] page_type: f5(slab)
[   20.760890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.760974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.761029] page dumped because: kasan: bad access detected
[   20.761075] 
[   20.761095] Memory state around the buggy address:
[   20.761129]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.761176]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.761232] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.761274]                                      ^
[   20.761307]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.761364]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.761406] ==================================================================
[   20.652631] ==================================================================
[   20.652690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.652740] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.652795] 
[   20.652826] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.653720] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.653984] Hardware name: linux,dummy-virt (DT)
[   20.654152] Call trace:
[   20.654326]  show_stack+0x20/0x38 (C)
[   20.654805]  dump_stack_lvl+0x8c/0xd0
[   20.654863]  print_report+0x118/0x5d0
[   20.655801]  kasan_report+0xdc/0x128
[   20.656161]  __asan_report_load4_noabort+0x20/0x30
[   20.656300]  kasan_atomics_helper+0x3dd8/0x4858
[   20.656350]  kasan_atomics+0x198/0x2e0
[   20.656398]  kunit_try_run_case+0x170/0x3f0
[   20.656449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.656505]  kthread+0x328/0x630
[   20.656553]  ret_from_fork+0x10/0x20
[   20.656951] 
[   20.657264] Allocated by task 267:
[   20.657302]  kasan_save_stack+0x3c/0x68
[   20.657347]  kasan_save_track+0x20/0x40
[   20.657384]  kasan_save_alloc_info+0x40/0x58
[   20.657433]  __kasan_kmalloc+0xd4/0xd8
[   20.657471]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.657511]  kasan_atomics+0xb8/0x2e0
[   20.658421]  kunit_try_run_case+0x170/0x3f0
[   20.658494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.658651]  kthread+0x328/0x630
[   20.658721]  ret_from_fork+0x10/0x20
[   20.659046] 
[   20.659072] The buggy address belongs to the object at fff00000c59c9e00
[   20.659072]  which belongs to the cache kmalloc-64 of size 64
[   20.659400] The buggy address is located 0 bytes to the right of
[   20.659400]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.659563] 
[   20.659587] The buggy address belongs to the physical page:
[   20.659780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.660030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.660502] page_type: f5(slab)
[   20.660699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.660953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.661077] page dumped because: kasan: bad access detected
[   20.661395] 
[   20.661574] Memory state around the buggy address:
[   20.661617]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.661732]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.661781] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.661824]                                      ^
[   20.662252]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.662355]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.662397] ==================================================================
[   20.818699] ==================================================================
[   20.818762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.819056] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.819295] 
[   20.819340] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.819428] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.819586] Hardware name: linux,dummy-virt (DT)
[   20.819623] Call trace:
[   20.819698]  show_stack+0x20/0x38 (C)
[   20.819887]  dump_stack_lvl+0x8c/0xd0
[   20.820099]  print_report+0x118/0x5d0
[   20.820310]  kasan_report+0xdc/0x128
[   20.820372]  kasan_check_range+0x100/0x1a8
[   20.820568]  __kasan_check_write+0x20/0x30
[   20.820695]  kasan_atomics_helper+0x12d8/0x4858
[   20.820859]  kasan_atomics+0x198/0x2e0
[   20.820913]  kunit_try_run_case+0x170/0x3f0
[   20.820964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.821019]  kthread+0x328/0x630
[   20.821066]  ret_from_fork+0x10/0x20
[   20.821113] 
[   20.821136] Allocated by task 267:
[   20.821165]  kasan_save_stack+0x3c/0x68
[   20.821573]  kasan_save_track+0x20/0x40
[   20.821867]  kasan_save_alloc_info+0x40/0x58
[   20.821984]  __kasan_kmalloc+0xd4/0xd8
[   20.822254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.822352]  kasan_atomics+0xb8/0x2e0
[   20.822451]  kunit_try_run_case+0x170/0x3f0
[   20.822498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.822544]  kthread+0x328/0x630
[   20.822603]  ret_from_fork+0x10/0x20
[   20.823128] 
[   20.823199] The buggy address belongs to the object at fff00000c59c9e00
[   20.823199]  which belongs to the cache kmalloc-64 of size 64
[   20.823439] The buggy address is located 0 bytes to the right of
[   20.823439]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.823517] 
[   20.823739] The buggy address belongs to the physical page:
[   20.824035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.824164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.824353] page_type: f5(slab)
[   20.824703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.824947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.825272] page dumped because: kasan: bad access detected
[   20.825810] 
[   20.827223] Memory state around the buggy address:
[   20.827762]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.827964]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.828156] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.828351]                                      ^
[   20.828397]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.828871]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.829169] ==================================================================
[   20.715515] ==================================================================
[   20.715696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.715751] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.715805] 
[   20.715837] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.715921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.716265] Hardware name: linux,dummy-virt (DT)
[   20.716506] Call trace:
[   20.716606]  show_stack+0x20/0x38 (C)
[   20.716658]  dump_stack_lvl+0x8c/0xd0
[   20.716815]  print_report+0x118/0x5d0
[   20.717048]  kasan_report+0xdc/0x128
[   20.717191]  __asan_report_store8_noabort+0x20/0x30
[   20.717255]  kasan_atomics_helper+0x3e5c/0x4858
[   20.717306]  kasan_atomics+0x198/0x2e0
[   20.717389]  kunit_try_run_case+0x170/0x3f0
[   20.717719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.717916]  kthread+0x328/0x630
[   20.717971]  ret_from_fork+0x10/0x20
[   20.718239] 
[   20.718665] Allocated by task 267:
[   20.718765]  kasan_save_stack+0x3c/0x68
[   20.719098]  kasan_save_track+0x20/0x40
[   20.719366]  kasan_save_alloc_info+0x40/0x58
[   20.719601]  __kasan_kmalloc+0xd4/0xd8
[   20.719725]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.720016]  kasan_atomics+0xb8/0x2e0
[   20.720305]  kunit_try_run_case+0x170/0x3f0
[   20.720509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.720598]  kthread+0x328/0x630
[   20.720638]  ret_from_fork+0x10/0x20
[   20.720677] 
[   20.720744] The buggy address belongs to the object at fff00000c59c9e00
[   20.720744]  which belongs to the cache kmalloc-64 of size 64
[   20.721018] The buggy address is located 0 bytes to the right of
[   20.721018]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.721092] 
[   20.721119] The buggy address belongs to the physical page:
[   20.721186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.721275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.721377] page_type: f5(slab)
[   20.721419] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.721529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.722072] page dumped because: kasan: bad access detected
[   20.722113] 
[   20.722133] Memory state around the buggy address:
[   20.722169]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.722227]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.722633] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.722696]                                      ^
[   20.722799]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.722846]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.723146] ==================================================================
[   20.707652] ==================================================================
[   20.707807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.708043] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.708195] 
[   20.708290] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.708375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.708411] Hardware name: linux,dummy-virt (DT)
[   20.708580] Call trace:
[   20.708687]  show_stack+0x20/0x38 (C)
[   20.708865]  dump_stack_lvl+0x8c/0xd0
[   20.708948]  print_report+0x118/0x5d0
[   20.708993]  kasan_report+0xdc/0x128
[   20.709039]  kasan_check_range+0x100/0x1a8
[   20.709088]  __kasan_check_write+0x20/0x30
[   20.709137]  kasan_atomics_helper+0xe44/0x4858
[   20.709190]  kasan_atomics+0x198/0x2e0
[   20.709619]  kunit_try_run_case+0x170/0x3f0
[   20.709825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.709885]  kthread+0x328/0x630
[   20.710430]  ret_from_fork+0x10/0x20
[   20.710629] 
[   20.710650] Allocated by task 267:
[   20.710679]  kasan_save_stack+0x3c/0x68
[   20.710723]  kasan_save_track+0x20/0x40
[   20.710761]  kasan_save_alloc_info+0x40/0x58
[   20.711083]  __kasan_kmalloc+0xd4/0xd8
[   20.711129]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.711349]  kasan_atomics+0xb8/0x2e0
[   20.711393]  kunit_try_run_case+0x170/0x3f0
[   20.711436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.711485]  kthread+0x328/0x630
[   20.711802]  ret_from_fork+0x10/0x20
[   20.711845] 
[   20.711867] The buggy address belongs to the object at fff00000c59c9e00
[   20.711867]  which belongs to the cache kmalloc-64 of size 64
[   20.712214] The buggy address is located 0 bytes to the right of
[   20.712214]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.712285] 
[   20.712309] The buggy address belongs to the physical page:
[   20.712354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.712411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.712824] page_type: f5(slab)
[   20.712866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.713299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.713377] page dumped because: kasan: bad access detected
[   20.713413] 
[   20.713435] Memory state around the buggy address:
[   20.713470]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.713665]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.713854] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.713898]                                      ^
[   20.713944]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.714236]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.714513] ==================================================================
[   20.924361] ==================================================================
[   20.924412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.924459] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.924519] 
[   20.924549] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.924633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.924673] Hardware name: linux,dummy-virt (DT)
[   20.924716] Call trace:
[   20.924748]  show_stack+0x20/0x38 (C)
[   20.924797]  dump_stack_lvl+0x8c/0xd0
[   20.924848]  print_report+0x118/0x5d0
[   20.924898]  kasan_report+0xdc/0x128
[   20.924945]  kasan_check_range+0x100/0x1a8
[   20.924994]  __kasan_check_write+0x20/0x30
[   20.925041]  kasan_atomics_helper+0x16d0/0x4858
[   20.925095]  kasan_atomics+0x198/0x2e0
[   20.925139]  kunit_try_run_case+0x170/0x3f0
[   20.925189]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.925728]  kthread+0x328/0x630
[   20.925830]  ret_from_fork+0x10/0x20
[   20.925894] 
[   20.925914] Allocated by task 267:
[   20.925945]  kasan_save_stack+0x3c/0x68
[   20.925985]  kasan_save_track+0x20/0x40
[   20.926515]  kasan_save_alloc_info+0x40/0x58
[   20.926593]  __kasan_kmalloc+0xd4/0xd8
[   20.926670]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.926983]  kasan_atomics+0xb8/0x2e0
[   20.927106]  kunit_try_run_case+0x170/0x3f0
[   20.927176]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.927236]  kthread+0x328/0x630
[   20.927586]  ret_from_fork+0x10/0x20
[   20.927960] 
[   20.928079] The buggy address belongs to the object at fff00000c59c9e00
[   20.928079]  which belongs to the cache kmalloc-64 of size 64
[   20.928556] The buggy address is located 0 bytes to the right of
[   20.928556]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.928983] 
[   20.929359] The buggy address belongs to the physical page:
[   20.929436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.929514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.929849] page_type: f5(slab)
[   20.929901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.930094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.930309] page dumped because: kasan: bad access detected
[   20.930429] 
[   20.930621] Memory state around the buggy address:
[   20.930715]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.930766]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.931198] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.931449]                                      ^
[   20.931604]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.931934]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.932194] ==================================================================
[   20.764952] ==================================================================
[   20.765063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.765176] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.765242] 
[   20.765271] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.765364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.765394] Hardware name: linux,dummy-virt (DT)
[   20.765426] Call trace:
[   20.765450]  show_stack+0x20/0x38 (C)
[   20.765497]  dump_stack_lvl+0x8c/0xd0
[   20.765581]  print_report+0x118/0x5d0
[   20.765689]  kasan_report+0xdc/0x128
[   20.765765]  kasan_check_range+0x100/0x1a8
[   20.765852]  __kasan_check_write+0x20/0x30
[   20.765951]  kasan_atomics_helper+0x1058/0x4858
[   20.766002]  kasan_atomics+0x198/0x2e0
[   20.766071]  kunit_try_run_case+0x170/0x3f0
[   20.766120]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.766175]  kthread+0x328/0x630
[   20.766232]  ret_from_fork+0x10/0x20
[   20.766279] 
[   20.766300] Allocated by task 267:
[   20.766329]  kasan_save_stack+0x3c/0x68
[   20.766368]  kasan_save_track+0x20/0x40
[   20.766406]  kasan_save_alloc_info+0x40/0x58
[   20.766669]  __kasan_kmalloc+0xd4/0xd8
[   20.766782]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.766894]  kasan_atomics+0xb8/0x2e0
[   20.766971]  kunit_try_run_case+0x170/0x3f0
[   20.767101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.767498]  kthread+0x328/0x630
[   20.767574]  ret_from_fork+0x10/0x20
[   20.767723] 
[   20.767752] The buggy address belongs to the object at fff00000c59c9e00
[   20.767752]  which belongs to the cache kmalloc-64 of size 64
[   20.767815] The buggy address is located 0 bytes to the right of
[   20.767815]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.767916] 
[   20.767949] The buggy address belongs to the physical page:
[   20.767996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.768060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.768110] page_type: f5(slab)
[   20.768148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.768364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.768660] page dumped because: kasan: bad access detected
[   20.768697] 
[   20.768764] Memory state around the buggy address:
[   20.768839]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.768950]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.769016] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.769419]                                      ^
[   20.769498]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769607]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.769648] ==================================================================
[   20.664370] ==================================================================
[   20.664425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.664476] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.664529] 
[   20.664561] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.664646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.666105] Hardware name: linux,dummy-virt (DT)
[   20.666297] Call trace:
[   20.666328]  show_stack+0x20/0x38 (C)
[   20.666798]  dump_stack_lvl+0x8c/0xd0
[   20.666865]  print_report+0x118/0x5d0
[   20.667282]  kasan_report+0xdc/0x128
[   20.667343]  kasan_check_range+0x100/0x1a8
[   20.667392]  __kasan_check_write+0x20/0x30
[   20.667997]  kasan_atomics_helper+0xd3c/0x4858
[   20.668219]  kasan_atomics+0x198/0x2e0
[   20.668270]  kunit_try_run_case+0x170/0x3f0
[   20.668823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.669425]  kthread+0x328/0x630
[   20.670002]  ret_from_fork+0x10/0x20
[   20.670072] 
[   20.670146] Allocated by task 267:
[   20.670235]  kasan_save_stack+0x3c/0x68
[   20.670309]  kasan_save_track+0x20/0x40
[   20.670648]  kasan_save_alloc_info+0x40/0x58
[   20.670736]  __kasan_kmalloc+0xd4/0xd8
[   20.671321]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.671378]  kasan_atomics+0xb8/0x2e0
[   20.671418]  kunit_try_run_case+0x170/0x3f0
[   20.671798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.672161]  kthread+0x328/0x630
[   20.672496]  ret_from_fork+0x10/0x20
[   20.672615] 
[   20.672819] The buggy address belongs to the object at fff00000c59c9e00
[   20.672819]  which belongs to the cache kmalloc-64 of size 64
[   20.673301] The buggy address is located 0 bytes to the right of
[   20.673301]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.673698] 
[   20.673727] The buggy address belongs to the physical page:
[   20.673880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.673940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.674263] page_type: f5(slab)
[   20.674311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.674365] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.674932] page dumped because: kasan: bad access detected
[   20.674982] 
[   20.675003] Memory state around the buggy address:
[   20.675040]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.675086]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.675133] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.675175]                                      ^
[   20.676154]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.676447]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.677023] ==================================================================
[   20.550984] ==================================================================
[   20.551101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.551148] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.551214] 
[   20.551250] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.551606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.551639] Hardware name: linux,dummy-virt (DT)
[   20.551673] Call trace:
[   20.551696]  show_stack+0x20/0x38 (C)
[   20.551747]  dump_stack_lvl+0x8c/0xd0
[   20.551807]  print_report+0x118/0x5d0
[   20.551855]  kasan_report+0xdc/0x128
[   20.551901]  kasan_check_range+0x100/0x1a8
[   20.552056]  __kasan_check_write+0x20/0x30
[   20.552313]  kasan_atomics_helper+0xa6c/0x4858
[   20.552408]  kasan_atomics+0x198/0x2e0
[   20.552455]  kunit_try_run_case+0x170/0x3f0
[   20.552505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.552801]  kthread+0x328/0x630
[   20.552856]  ret_from_fork+0x10/0x20
[   20.553016] 
[   20.553036] Allocated by task 267:
[   20.553124]  kasan_save_stack+0x3c/0x68
[   20.553172]  kasan_save_track+0x20/0x40
[   20.553227]  kasan_save_alloc_info+0x40/0x58
[   20.553358]  __kasan_kmalloc+0xd4/0xd8
[   20.553397]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.553439]  kasan_atomics+0xb8/0x2e0
[   20.553475]  kunit_try_run_case+0x170/0x3f0
[   20.553517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.553762]  kthread+0x328/0x630
[   20.553941]  ret_from_fork+0x10/0x20
[   20.553987] 
[   20.554008] The buggy address belongs to the object at fff00000c59c9e00
[   20.554008]  which belongs to the cache kmalloc-64 of size 64
[   20.554071] The buggy address is located 0 bytes to the right of
[   20.554071]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.554143] 
[   20.554165] The buggy address belongs to the physical page:
[   20.554197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.554423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.554492] page_type: f5(slab)
[   20.554532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.554586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.554630] page dumped because: kasan: bad access detected
[   20.554666] 
[   20.554696] Memory state around the buggy address:
[   20.554730]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.554776]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.554949] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.555005]                                      ^
[   20.555040]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.555086]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.555697] Write of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.556993]  kasan_atomics+0x198/0x2e0
[   20.557256] 
[   20.557278] Allocated by task 267:
[   20.557306]  kasan_save_stack+0x3c/0x68
[   20.557463]  kasan_save_track+0x20/0x40
[   20.557539]  kasan_save_alloc_info+0x40/0x58
[   20.557699]  __kasan_kmalloc+0xd4/0xd8
[   20.557951]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.557999]  kasan_atomics+0xb8/0x2e0
[   20.558062]  kunit_try_run_case+0x170/0x3f0
[   20.558105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.558156]  kthread+0x328/0x630
[   20.558193]  ret_from_fork+0x10/0x20
[   20.558242] 
[   20.558265] The buggy address belongs to the object at fff00000c59c9e00
[   20.558265]  which belongs to the cache kmalloc-64 of size 64
[   20.558327] The buggy address is located 0 bytes to the right of
[   20.558327]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.558697] 
[   20.558718] The buggy address belongs to the physical page:
[   20.558780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.559155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.559222] page_type: f5(slab)
[   20.559296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.559383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.559585] page dumped because: kasan: bad access detected
[   20.559713] 
[   20.559812]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.561922] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.562264]  show_stack+0x20/0x38 (C)
[   20.563801]  kthread+0x328/0x630
[   20.564150]  kasan_save_stack+0x3c/0x68
[   20.564539]  kasan_save_track+0x20/0x40
[   20.565824]  kunit_try_run_case+0x170/0x3f0
[   20.567114] The buggy address is located 0 bytes to the right of
[   20.567114]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.570122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.572456] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.575587] ==================================================================
[   20.724134] ==================================================================
[   20.724188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.724256] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.724770] 
[   20.724892] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.724980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.725011] Hardware name: linux,dummy-virt (DT)
[   20.725045] Call trace:
[   20.725693]  show_stack+0x20/0x38 (C)
[   20.725958]  dump_stack_lvl+0x8c/0xd0
[   20.726412]  print_report+0x118/0x5d0
[   20.726513]  kasan_report+0xdc/0x128
[   20.726651]  kasan_check_range+0x100/0x1a8
[   20.726718]  __kasan_check_write+0x20/0x30
[   20.726828]  kasan_atomics_helper+0xeb8/0x4858
[   20.727275]  kasan_atomics+0x198/0x2e0
[   20.727325]  kunit_try_run_case+0x170/0x3f0
[   20.728112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.728932]  kthread+0x328/0x630
[   20.729616]  ret_from_fork+0x10/0x20
[   20.730221] 
[   20.730296] Allocated by task 267:
[   20.730884]  kasan_save_stack+0x3c/0x68
[   20.731097]  kasan_save_track+0x20/0x40
[   20.731421]  kasan_save_alloc_info+0x40/0x58
[   20.732145]  __kasan_kmalloc+0xd4/0xd8
[   20.732910]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.733094]  kasan_atomics+0xb8/0x2e0
[   20.733166]  kunit_try_run_case+0x170/0x3f0
[   20.734028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.734388]  kthread+0x328/0x630
[   20.734516]  ret_from_fork+0x10/0x20
[   20.734862] 
[   20.735115] The buggy address belongs to the object at fff00000c59c9e00
[   20.735115]  which belongs to the cache kmalloc-64 of size 64
[   20.735660] The buggy address is located 0 bytes to the right of
[   20.735660]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.736433] 
[   20.736488] The buggy address belongs to the physical page:
[   20.737112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.737624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.737983] page_type: f5(slab)
[   20.738050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.738579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.739101] page dumped because: kasan: bad access detected
[   20.739148] 
[   20.739415] Memory state around the buggy address:
[   20.740087]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.740393]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.741484] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.741582]                                      ^
[   20.741650]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.741697]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.741739] ==================================================================
[   20.797125] ==================================================================
[   20.797214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.797692] Write of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.797843] 
[   20.797907] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.798033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.798326] Hardware name: linux,dummy-virt (DT)
[   20.798560] Call trace:
[   20.798708]  show_stack+0x20/0x38 (C)
[   20.799139]  dump_stack_lvl+0x8c/0xd0
[   20.799315]  print_report+0x118/0x5d0
[   20.799395]  kasan_report+0xdc/0x128
[   20.799632]  kasan_check_range+0x100/0x1a8
[   20.799810]  __kasan_check_write+0x20/0x30
[   20.800012]  kasan_atomics_helper+0x11f8/0x4858
[   20.800300]  kasan_atomics+0x198/0x2e0
[   20.800445]  kunit_try_run_case+0x170/0x3f0
[   20.800500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.800909]  kthread+0x328/0x630
[   20.801354]  ret_from_fork+0x10/0x20
[   20.801516] 
[   20.801566] Allocated by task 267:
[   20.801636]  kasan_save_stack+0x3c/0x68
[   20.801868]  kasan_save_track+0x20/0x40
[   20.802111]  kasan_save_alloc_info+0x40/0x58
[   20.802224]  __kasan_kmalloc+0xd4/0xd8
[   20.802469]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.802650]  kasan_atomics+0xb8/0x2e0
[   20.802848]  kunit_try_run_case+0x170/0x3f0
[   20.802929]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.803089]  kthread+0x328/0x630
[   20.803129]  ret_from_fork+0x10/0x20
[   20.803527] 
[   20.803572] The buggy address belongs to the object at fff00000c59c9e00
[   20.803572]  which belongs to the cache kmalloc-64 of size 64
[   20.804001] The buggy address is located 0 bytes to the right of
[   20.804001]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.804438] 
[   20.804498] The buggy address belongs to the physical page:
[   20.804546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.804843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.805228] page_type: f5(slab)
[   20.805642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.805717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.805765] page dumped because: kasan: bad access detected
[   20.805801] 
[   20.806066] Memory state around the buggy address:
[   20.806449]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.806612]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.806688] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.806734]                                      ^
[   20.806803]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.806859]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.806913] ==================================================================
[   20.933393] ==================================================================
[   20.933492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.933554] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.933607] 
[   20.933638] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.934102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.934162] Hardware name: linux,dummy-virt (DT)
[   20.934427] Call trace:
[   20.934454]  show_stack+0x20/0x38 (C)
[   20.934825]  dump_stack_lvl+0x8c/0xd0
[   20.935095]  print_report+0x118/0x5d0
[   20.935414]  kasan_report+0xdc/0x128
[   20.935698]  __asan_report_load8_noabort+0x20/0x30
[   20.936152]  kasan_atomics_helper+0x3e10/0x4858
[   20.936245]  kasan_atomics+0x198/0x2e0
[   20.936514]  kunit_try_run_case+0x170/0x3f0
[   20.936682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.937129]  kthread+0x328/0x630
[   20.937282]  ret_from_fork+0x10/0x20
[   20.937552] 
[   20.937609] Allocated by task 267:
[   20.937799]  kasan_save_stack+0x3c/0x68
[   20.938010]  kasan_save_track+0x20/0x40
[   20.938089]  kasan_save_alloc_info+0x40/0x58
[   20.938366]  __kasan_kmalloc+0xd4/0xd8
[   20.938507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.938748]  kasan_atomics+0xb8/0x2e0
[   20.938819]  kunit_try_run_case+0x170/0x3f0
[   20.938890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.939135]  kthread+0x328/0x630
[   20.939418]  ret_from_fork+0x10/0x20
[   20.939685] 
[   20.940013] The buggy address belongs to the object at fff00000c59c9e00
[   20.940013]  which belongs to the cache kmalloc-64 of size 64
[   20.940150] The buggy address is located 0 bytes to the right of
[   20.940150]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.940681] 
[   20.940838] The buggy address belongs to the physical page:
[   20.941075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.941374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.941565] page_type: f5(slab)
[   20.941826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.942103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.942167] page dumped because: kasan: bad access detected
[   20.942482] 
[   20.942789] Memory state around the buggy address:
[   20.942855]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.943018]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.943088] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.943375]                                      ^
[   20.943663]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.943914]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.944006] ==================================================================
[   20.918237] ==================================================================
[   20.918295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.918669] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.918739] 
[   20.919082] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.919186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.919226] Hardware name: linux,dummy-virt (DT)
[   20.919261] Call trace:
[   20.919530]  show_stack+0x20/0x38 (C)
[   20.919603]  dump_stack_lvl+0x8c/0xd0
[   20.919703]  print_report+0x118/0x5d0
[   20.919811]  kasan_report+0xdc/0x128
[   20.919908]  __asan_report_load8_noabort+0x20/0x30
[   20.919970]  kasan_atomics_helper+0x3df4/0x4858
[   20.920312]  kasan_atomics+0x198/0x2e0
[   20.920503]  kunit_try_run_case+0x170/0x3f0
[   20.920573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.920787]  kthread+0x328/0x630
[   20.921154]  ret_from_fork+0x10/0x20
[   20.921233] 
[   20.921568] Allocated by task 267:
[   20.921641]  kasan_save_stack+0x3c/0x68
[   20.921807]  kasan_save_track+0x20/0x40
[   20.921876]  kasan_save_alloc_info+0x40/0x58
[   20.922092]  __kasan_kmalloc+0xd4/0xd8
[   20.922153]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.922535]  kasan_atomics+0xb8/0x2e0
[   20.922761]  kunit_try_run_case+0x170/0x3f0
[   20.922979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.923115]  kthread+0x328/0x630
[   20.923156]  ret_from_fork+0x10/0x20
[   20.923193] 
[   20.923237] The buggy address belongs to the object at fff00000c59c9e00
[   20.923237]  which belongs to the cache kmalloc-64 of size 64
[   20.923302] The buggy address is located 0 bytes to the right of
[   20.923302]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.923371] 
[   20.923402] The buggy address belongs to the physical page:
[   20.923445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.923502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.923554] page_type: f5(slab)
[   20.923594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.923674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.923728] page dumped because: kasan: bad access detected
[   20.923762] 
[   20.923784] Memory state around the buggy address:
[   20.923826]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.923891]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.923939] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.923983]                                      ^
[   20.924020]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.924066]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.924108] ==================================================================
[   20.838358] ==================================================================
[   20.838412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.838667] Read of size 8 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.838754] 
[   20.838856] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.838944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.839189] Hardware name: linux,dummy-virt (DT)
[   20.839249] Call trace:
[   20.839274]  show_stack+0x20/0x38 (C)
[   20.839571]  dump_stack_lvl+0x8c/0xd0
[   20.839795]  print_report+0x118/0x5d0
[   20.839857]  kasan_report+0xdc/0x128
[   20.839965]  __asan_report_load8_noabort+0x20/0x30
[   20.840282]  kasan_atomics_helper+0x3f04/0x4858
[   20.840347]  kasan_atomics+0x198/0x2e0
[   20.840648]  kunit_try_run_case+0x170/0x3f0
[   20.840866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.840950]  kthread+0x328/0x630
[   20.841002]  ret_from_fork+0x10/0x20
[   20.841268] 
[   20.841303] Allocated by task 267:
[   20.841767]  kasan_save_stack+0x3c/0x68
[   20.841891]  kasan_save_track+0x20/0x40
[   20.841955]  kasan_save_alloc_info+0x40/0x58
[   20.842258]  __kasan_kmalloc+0xd4/0xd8
[   20.842301]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.842350]  kasan_atomics+0xb8/0x2e0
[   20.842387]  kunit_try_run_case+0x170/0x3f0
[   20.843073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.843371]  kthread+0x328/0x630
[   20.843819]  ret_from_fork+0x10/0x20
[   20.844098] 
[   20.844167] The buggy address belongs to the object at fff00000c59c9e00
[   20.844167]  which belongs to the cache kmalloc-64 of size 64
[   20.844445] The buggy address is located 0 bytes to the right of
[   20.844445]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.844804] 
[   20.845258] The buggy address belongs to the physical page:
[   20.845426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.845489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.845689] page_type: f5(slab)
[   20.846284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.846731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.846838] page dumped because: kasan: bad access detected
[   20.847019] 
[   20.847197] Memory state around the buggy address:
[   20.847459]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.847539]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.847950] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.848288]                                      ^
[   20.848715]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.848768]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.849404] ==================================================================
[   20.678591] ==================================================================
[   20.678654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.678716] Read of size 4 at addr fff00000c59c9e30 by task kunit_try_catch/267
[   20.678771] 
[   20.678804] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.678889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.678917] Hardware name: linux,dummy-virt (DT)
[   20.679849] Call trace:
[   20.679888]  show_stack+0x20/0x38 (C)
[   20.680048]  dump_stack_lvl+0x8c/0xd0
[   20.680134]  print_report+0x118/0x5d0
[   20.680342]  kasan_report+0xdc/0x128
[   20.680697]  __asan_report_load4_noabort+0x20/0x30
[   20.680857]  kasan_atomics_helper+0x3e04/0x4858
[   20.680909]  kasan_atomics+0x198/0x2e0
[   20.681375]  kunit_try_run_case+0x170/0x3f0
[   20.681938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.682359]  kthread+0x328/0x630
[   20.682789]  ret_from_fork+0x10/0x20
[   20.682996] 
[   20.683019] Allocated by task 267:
[   20.683049]  kasan_save_stack+0x3c/0x68
[   20.683458]  kasan_save_track+0x20/0x40
[   20.683538]  kasan_save_alloc_info+0x40/0x58
[   20.683877]  __kasan_kmalloc+0xd4/0xd8
[   20.683919]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.683960]  kasan_atomics+0xb8/0x2e0
[   20.683998]  kunit_try_run_case+0x170/0x3f0
[   20.684461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.684525]  kthread+0x328/0x630
[   20.684804]  ret_from_fork+0x10/0x20
[   20.685123] 
[   20.685214] The buggy address belongs to the object at fff00000c59c9e00
[   20.685214]  which belongs to the cache kmalloc-64 of size 64
[   20.685283] The buggy address is located 0 bytes to the right of
[   20.685283]  allocated 48-byte region [fff00000c59c9e00, fff00000c59c9e30)
[   20.685362] 
[   20.685974] The buggy address belongs to the physical page:
[   20.686017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.686079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.686133] page_type: f5(slab)
[   20.686173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.686808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.687320] page dumped because: kasan: bad access detected
[   20.687365] 
[   20.687697] Memory state around the buggy address:
[   20.687737]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.688082]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.688330] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.688494]                                      ^
[   20.688597]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.689019]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.689071] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   20.279733] ==================================================================
[   20.279788] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   20.279843] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.279896] 
[   20.279929] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.280012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.280040] Hardware name: linux,dummy-virt (DT)
[   20.280073] Call trace:
[   20.280098]  show_stack+0x20/0x38 (C)
[   20.280145]  dump_stack_lvl+0x8c/0xd0
[   20.280196]  print_report+0x118/0x5d0
[   20.280259]  kasan_report+0xdc/0x128
[   20.280306]  kasan_check_range+0x100/0x1a8
[   20.280355]  __kasan_check_write+0x20/0x30
[   20.281818]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0
[   20.281948]  kasan_bitops_generic+0x11c/0x1c8
[   20.282002]  kunit_try_run_case+0x170/0x3f0
[   20.282053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.285947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.295648] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.303678] The buggy address is located 8 bytes inside of
[   20.303678]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.316020]  ret_from_fork+0x10/0x20
[   20.322718] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
[   20.327042]  kasan_save_stack+0x3c/0x68
[   20.328924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.330427]                       ^
[   20.332177] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.333027]  kunit_try_run_case+0x170/0x3f0
[   20.333249] 
[   20.333853]  __kasan_kmalloc+0xd4/0xd8
[   20.334157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.335507] 
[   20.335669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.336530] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.337531]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.352809] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.358487]  kasan_save_track+0x20/0x40
[   20.361964]  ret_from_fork+0x10/0x20
[   20.363194] 
[   20.363272] The buggy address belongs to the physical page:
[   20.363750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.364514] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.364715] 
[   20.365109] Memory state around the buggy address:
[   20.365158]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.365453]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.365509] >fff00000c59c9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.365553]                                      ^
[   20.365835]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.369482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   20.372340]  __asan_report_store4_noabort+0x20/0x30
[   20.373361]  kthread+0x328/0x630
[   20.374986]  kthread+0x328/0x630
[   20.375912] The buggy address belongs to the physical page:
[   20.376453] page_type: f5(slab)
[   20.376693] page dumped because: kasan: bad access detected
[   20.377532]  fff00000c59c9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.377762]  fff00000c59c9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.378854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   20.379574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.380958]  print_report+0x118/0x5d0
[   20.381888]  kthread+0x328/0x630
[   20.382449]  kasan_save_alloc_info+0x40/0x58
[   20.383482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.384700] The buggy address belongs to the physical page:
[   20.384864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059c9
[   20.386544] page dumped because: kasan: bad access detected
[   20.386813] 
[   20.387300]  fff00000c59c9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.388486]  fff00000c59c9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.389229] ==================================================================
[   20.270828] ==================================================================
[   20.270882] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   20.270934] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.270987] 
[   20.271019] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.271101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.271135] Hardware name: linux,dummy-virt (DT)
[   20.271167] Call trace:
[   20.271190]  show_stack+0x20/0x38 (C)
[   20.272123]  dump_stack_lvl+0x8c/0xd0
[   20.272220]  print_report+0x118/0x5d0
[   20.272530]  kasan_report+0xdc/0x128
[   20.272751]  __asan_report_load8_noabort+0x20/0x30
[   20.272808]  kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   20.272864]  kasan_bitops_generic+0x11c/0x1c8
[   20.272914]  kunit_try_run_case+0x170/0x3f0
[   20.272964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.273540]  kthread+0x328/0x630
[   20.273844]  ret_from_fork+0x10/0x20
[   20.273899] 
[   20.273920] Allocated by task 263:
[   20.273949]  kasan_save_stack+0x3c/0x68
[   20.273999]  kasan_save_track+0x20/0x40
[   20.274037]  kasan_save_alloc_info+0x40/0x58
[   20.274079]  __kasan_kmalloc+0xd4/0xd8
[   20.274386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.274615]  kasan_bitops_generic+0xa0/0x1c8
[   20.274658]  kunit_try_run_case+0x170/0x3f0
[   20.274698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.274746]  kthread+0x328/0x630
[   20.274784]  ret_from_fork+0x10/0x20
[   20.274821] 
[   20.275676] The buggy address is located 8 bytes inside of
[   20.275676]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.276306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.276513] page_type: f5(slab)
[   20.276826] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.277121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.277273] page dumped because: kasan: bad access detected
[   20.277310] 
[   20.277583] Memory state around the buggy address:
[   20.277740]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.277792]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.277980] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.278636]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.278772]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.278815] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   20.175159] ==================================================================
[   20.175353] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.175430] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.175492] 
[   20.175617] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.175706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.175745] Hardware name: linux,dummy-virt (DT)
[   20.175842] Call trace:
[   20.175869]  show_stack+0x20/0x38 (C)
[   20.175919]  dump_stack_lvl+0x8c/0xd0
[   20.176144]  print_report+0x118/0x5d0
[   20.176232]  kasan_report+0xdc/0x128
[   20.176437]  kasan_check_range+0x100/0x1a8
[   20.176505]  __kasan_check_write+0x20/0x30
[   20.176570]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   20.176741]  kasan_bitops_generic+0x110/0x1c8
[   20.176789]  kunit_try_run_case+0x170/0x3f0
[   20.176841]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.177147]  kthread+0x328/0x630
[   20.177605]  ret_from_fork+0x10/0x20
[   20.177920] 
[   20.177991] Allocated by task 263:
[   20.178057]  kasan_save_stack+0x3c/0x68
[   20.178234]  kasan_save_track+0x20/0x40
[   20.178410]  kasan_save_alloc_info+0x40/0x58
[   20.178512]  __kasan_kmalloc+0xd4/0xd8
[   20.178580]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.178623]  kasan_bitops_generic+0xa0/0x1c8
[   20.178984]  kunit_try_run_case+0x170/0x3f0
[   20.179232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.179610]  kthread+0x328/0x630
[   20.179738]  ret_from_fork+0x10/0x20
[   20.179845] 
[   20.179969] The buggy address belongs to the object at fff00000c45d8b80
[   20.179969]  which belongs to the cache kmalloc-16 of size 16
[   20.180161] The buggy address is located 8 bytes inside of
[   20.180161]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.180328] 
[   20.180370] The buggy address belongs to the physical page:
[   20.180447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.180579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.180640] page_type: f5(slab)
[   20.180892] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.181339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.181405] page dumped because: kasan: bad access detected
[   20.181526] 
[   20.181574] Memory state around the buggy address:
[   20.181667]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.181763]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.181829] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.181948]                       ^
[   20.182006]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.182099]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.182143] ==================================================================
[   20.202661] ==================================================================
[   20.202714] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0
[   20.202786] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.203277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.203610]  print_report+0x118/0x5d0
[   20.204095]  kasan_bitops_generic+0x110/0x1c8
[   20.204810]  kasan_save_stack+0x3c/0x68
[   20.205607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.205990] The buggy address is located 8 bytes inside of
[   20.205990]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.206925] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.207015] page dumped because: kasan: bad access detected
[   20.207530]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.207919]                       ^
[   20.208072]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.208246]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.210111] ==================================================================
[   20.190003] ==================================================================
[   20.190058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   20.190111] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.190166] 
[   20.190196] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.190296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.190693] Hardware name: linux,dummy-virt (DT)
[   20.190746] Call trace:
[   20.190809]  show_stack+0x20/0x38 (C)
[   20.190929]  dump_stack_lvl+0x8c/0xd0
[   20.190982]  print_report+0x118/0x5d0
[   20.191130]  kasan_report+0xdc/0x128
[   20.191189]  kasan_check_range+0x100/0x1a8
[   20.191250]  __kasan_check_write+0x20/0x30
[   20.191583]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   20.191651]  kasan_bitops_generic+0x110/0x1c8
[   20.191703]  kunit_try_run_case+0x170/0x3f0
[   20.191763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.191847]  kthread+0x328/0x630
[   20.191912]  ret_from_fork+0x10/0x20
[   20.191979] 
[   20.192054] Allocated by task 263:
[   20.192092]  kasan_save_stack+0x3c/0x68
[   20.192136]  kasan_save_track+0x20/0x40
[   20.192330]  kasan_save_alloc_info+0x40/0x58
[   20.192391]  __kasan_kmalloc+0xd4/0xd8
[   20.192428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.192718]  kasan_bitops_generic+0xa0/0x1c8
[   20.192857]  kunit_try_run_case+0x170/0x3f0
[   20.192922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.192989]  kthread+0x328/0x630
[   20.193035]  ret_from_fork+0x10/0x20
[   20.193291] 
[   20.193329] The buggy address belongs to the object at fff00000c45d8b80
[   20.193329]  which belongs to the cache kmalloc-16 of size 16
[   20.193593] The buggy address is located 8 bytes inside of
[   20.193593]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.193721] 
[   20.193779] The buggy address belongs to the physical page:
[   20.193878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.193962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.194162] page_type: f5(slab)
[   20.194219] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.194482] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.194558] page dumped because: kasan: bad access detected
[   20.194736] 
[   20.194895] Memory state around the buggy address:
[   20.194985]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.195112]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.195183] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.195304]                       ^
[   20.196517]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.196574]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.197136] ==================================================================
[   20.160029] ==================================================================
[   20.160091] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.160146] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.160200] 
[   20.160252] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.160430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.160477] Hardware name: linux,dummy-virt (DT)
[   20.160511] Call trace:
[   20.160536]  show_stack+0x20/0x38 (C)
[   20.160853]  dump_stack_lvl+0x8c/0xd0
[   20.161312]  print_report+0x118/0x5d0
[   20.161397]  kasan_report+0xdc/0x128
[   20.161778]  kasan_check_range+0x100/0x1a8
[   20.161879]  __kasan_check_write+0x20/0x30
[   20.161955]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   20.162388]  kasan_bitops_generic+0x110/0x1c8
[   20.162570]  kunit_try_run_case+0x170/0x3f0
[   20.162648]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.162789]  kthread+0x328/0x630
[   20.162873]  ret_from_fork+0x10/0x20
[   20.163339] 
[   20.163415] Allocated by task 263:
[   20.163539]  kasan_save_stack+0x3c/0x68
[   20.163612]  kasan_save_track+0x20/0x40
[   20.163654]  kasan_save_alloc_info+0x40/0x58
[   20.163986]  __kasan_kmalloc+0xd4/0xd8
[   20.164063]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.164222]  kasan_bitops_generic+0xa0/0x1c8
[   20.164283]  kunit_try_run_case+0x170/0x3f0
[   20.164415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.164738]  kthread+0x328/0x630
[   20.164838]  ret_from_fork+0x10/0x20
[   20.164878] 
[   20.164900] The buggy address belongs to the object at fff00000c45d8b80
[   20.164900]  which belongs to the cache kmalloc-16 of size 16
[   20.164964] The buggy address is located 8 bytes inside of
[   20.164964]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.165053] 
[   20.165075] The buggy address belongs to the physical page:
[   20.165112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.165176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.165241] page_type: f5(slab)
[   20.165295] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.165689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.165747] page dumped because: kasan: bad access detected
[   20.165782] 
[   20.165936] Memory state around the buggy address:
[   20.166134]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.166305]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.166385] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.166509]                       ^
[   20.166556]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.166611]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.166756] ==================================================================
[   20.167960] ==================================================================
[   20.168183] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.168427] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.168482] 
[   20.168678] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.168775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.168824] Hardware name: linux,dummy-virt (DT)
[   20.168883] Call trace:
[   20.168909]  show_stack+0x20/0x38 (C)
[   20.168964]  dump_stack_lvl+0x8c/0xd0
[   20.169378]  print_report+0x118/0x5d0
[   20.169496]  kasan_report+0xdc/0x128
[   20.169575]  __asan_report_load8_noabort+0x20/0x30
[   20.169718]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   20.169795]  kasan_bitops_generic+0x110/0x1c8
[   20.169984]  kunit_try_run_case+0x170/0x3f0
[   20.170060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.170119]  kthread+0x328/0x630
[   20.170486]  ret_from_fork+0x10/0x20
[   20.170576] 
[   20.170685] Allocated by task 263:
[   20.170767]  kasan_save_stack+0x3c/0x68
[   20.170871]  kasan_save_track+0x20/0x40
[   20.170912]  kasan_save_alloc_info+0x40/0x58
[   20.170953]  __kasan_kmalloc+0xd4/0xd8
[   20.170990]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.171029]  kasan_bitops_generic+0xa0/0x1c8
[   20.171079]  kunit_try_run_case+0x170/0x3f0
[   20.171129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.171188]  kthread+0x328/0x630
[   20.171238]  ret_from_fork+0x10/0x20
[   20.171287] 
[   20.171332] The buggy address belongs to the object at fff00000c45d8b80
[   20.171332]  which belongs to the cache kmalloc-16 of size 16
[   20.171431] The buggy address is located 8 bytes inside of
[   20.171431]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.171499] 
[   20.171529] The buggy address belongs to the physical page:
[   20.171569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.171624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.171684] page_type: f5(slab)
[   20.171724] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.171780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.171835] page dumped because: kasan: bad access detected
[   20.171869] 
[   20.171890] Memory state around the buggy address:
[   20.171934]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.171989]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.172045] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.172097]                       ^
[   20.172128]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.172173]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.172250] ==================================================================
[   20.183876] ==================================================================
[   20.183941] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   20.184304] Read of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.184375] 
[   20.184425] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.184517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.184659] Hardware name: linux,dummy-virt (DT)
[   20.184787] Call trace:
[   20.184906]  show_stack+0x20/0x38 (C)
[   20.184966]  dump_stack_lvl+0x8c/0xd0
[   20.185050]  print_report+0x118/0x5d0
[   20.185100]  kasan_report+0xdc/0x128
[   20.185148]  __asan_report_load8_noabort+0x20/0x30
[   20.185223]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   20.185278]  kasan_bitops_generic+0x110/0x1c8
[   20.185325]  kunit_try_run_case+0x170/0x3f0
[   20.185386]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.185451]  kthread+0x328/0x630
[   20.185497]  ret_from_fork+0x10/0x20
[   20.185548] 
[   20.185569] Allocated by task 263:
[   20.185598]  kasan_save_stack+0x3c/0x68
[   20.185648]  kasan_save_track+0x20/0x40
[   20.185686]  kasan_save_alloc_info+0x40/0x58
[   20.185727]  __kasan_kmalloc+0xd4/0xd8
[   20.185770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.185809]  kasan_bitops_generic+0xa0/0x1c8
[   20.185854]  kunit_try_run_case+0x170/0x3f0
[   20.185905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.185951]  kthread+0x328/0x630
[   20.185997]  ret_from_fork+0x10/0x20
[   20.186046] 
[   20.186069] The buggy address belongs to the object at fff00000c45d8b80
[   20.186069]  which belongs to the cache kmalloc-16 of size 16
[   20.186140] The buggy address is located 8 bytes inside of
[   20.186140]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.186405] 
[   20.186818] The buggy address belongs to the physical page:
[   20.186864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.186921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.187201] page_type: f5(slab)
[   20.187609] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.187674] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.188016] page dumped because: kasan: bad access detected
[   20.188134] 
[   20.188174] Memory state around the buggy address:
[   20.188288]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.188601]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.188776] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.188851]                       ^
[   20.188966]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.189036]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.189314] ==================================================================
[   20.198253] ==================================================================
[   20.198337] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
[   20.198472] Write of size 8 at addr fff00000c45d8b88 by task kunit_try_catch/263
[   20.198531] 
[   20.198564] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.198690] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.198721] Hardware name: linux,dummy-virt (DT)
[   20.198752] Call trace:
[   20.198788]  show_stack+0x20/0x38 (C)
[   20.198840]  dump_stack_lvl+0x8c/0xd0
[   20.198891]  print_report+0x118/0x5d0
[   20.198943]  kasan_report+0xdc/0x128
[   20.199001]  kasan_check_range+0x100/0x1a8
[   20.199061]  __kasan_check_write+0x20/0x30
[   20.199111]  kasan_bitops_modify.constprop.0+0x320/0xbc0
[   20.199172]  kasan_bitops_generic+0x110/0x1c8
[   20.199232]  kunit_try_run_case+0x170/0x3f0
[   20.199282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.199353]  kthread+0x328/0x630
[   20.199430]  ret_from_fork+0x10/0x20
[   20.199482] 
[   20.199502] Allocated by task 263:
[   20.199531]  kasan_save_stack+0x3c/0x68
[   20.199570]  kasan_save_track+0x20/0x40
[   20.199609]  kasan_save_alloc_info+0x40/0x58
[   20.199649]  __kasan_kmalloc+0xd4/0xd8
[   20.199685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.199735]  kasan_bitops_generic+0xa0/0x1c8
[   20.199787]  kunit_try_run_case+0x170/0x3f0
[   20.199830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.199877]  kthread+0x328/0x630
[   20.199918]  ret_from_fork+0x10/0x20
[   20.199957] 
[   20.199978] The buggy address belongs to the object at fff00000c45d8b80
[   20.199978]  which belongs to the cache kmalloc-16 of size 16
[   20.200038] The buggy address is located 8 bytes inside of
[   20.200038]  allocated 9-byte region [fff00000c45d8b80, fff00000c45d8b89)
[   20.200102] 
[   20.200138] The buggy address belongs to the physical page:
[   20.200173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   20.200240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.200541] page_type: f5(slab)
[   20.200601] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   20.200657] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   20.200702] page dumped because: kasan: bad access detected
[   20.200737] 
[   20.201373] Memory state around the buggy address:
[   20.201440]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.201524]  fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   20.201756] >fff00000c45d8b80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.201805]                       ^
[   20.201976]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.202060]  fff00000c45d8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.202188] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   20.146906] ==================================================================
[   20.146966] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   20.147016] Read of size 1 at addr fff00000c59caad0 by task kunit_try_catch/261
[   20.147068] 
[   20.147491] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.147806] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.147879] Hardware name: linux,dummy-virt (DT)
[   20.147916] Call trace:
[   20.148079]  show_stack+0x20/0x38 (C)
[   20.148143]  dump_stack_lvl+0x8c/0xd0
[   20.148195]  print_report+0x118/0x5d0
[   20.148504]  kasan_report+0xdc/0x128
[   20.148596]  __asan_report_load1_noabort+0x20/0x30
[   20.148732]  strnlen+0x80/0x88
[   20.148799]  kasan_strings+0x478/0xb00
[   20.148861]  kunit_try_run_case+0x170/0x3f0
[   20.148921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.148978]  kthread+0x328/0x630
[   20.149027]  ret_from_fork+0x10/0x20
[   20.149319] 
[   20.149487] Allocated by task 261:
[   20.149789]  kasan_save_stack+0x3c/0x68
[   20.149857]  kasan_save_track+0x20/0x40
[   20.149987]  kasan_save_alloc_info+0x40/0x58
[   20.150066]  __kasan_kmalloc+0xd4/0xd8
[   20.150225]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.150291]  kasan_strings+0xc8/0xb00
[   20.150585]  kunit_try_run_case+0x170/0x3f0
[   20.150801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.150880]  kthread+0x328/0x630
[   20.150971]  ret_from_fork+0x10/0x20
[   20.151013] 
[   20.151035] Freed by task 261:
[   20.151064]  kasan_save_stack+0x3c/0x68
[   20.151103]  kasan_save_track+0x20/0x40
[   20.151152]  kasan_save_free_info+0x4c/0x78
[   20.151199]  __kasan_slab_free+0x6c/0x98
[   20.151249]  kfree+0x214/0x3c8
[   20.151296]  kasan_strings+0x24c/0xb00
[   20.151335]  kunit_try_run_case+0x170/0x3f0
[   20.151377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.151433]  kthread+0x328/0x630
[   20.151479]  ret_from_fork+0x10/0x20
[   20.151532] 
[   20.151554] The buggy address belongs to the object at fff00000c59caac0
[   20.151554]  which belongs to the cache kmalloc-32 of size 32
[   20.151617] The buggy address is located 16 bytes inside of
[   20.151617]  freed 32-byte region [fff00000c59caac0, fff00000c59caae0)
[   20.151689] 
[   20.151736] The buggy address belongs to the physical page:
[   20.151789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca
[   20.151844] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.151894] page_type: f5(slab)
[   20.151944] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.152006] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.152059] page dumped because: kasan: bad access detected
[   20.152094] 
[   20.152124] Memory state around the buggy address:
[   20.152159]  fff00000c59ca980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.152217]  fff00000c59caa00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.152272] >fff00000c59caa80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.152314]                                                  ^
[   20.152367]  fff00000c59cab00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.152427]  fff00000c59cab80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.152467] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   20.138359] ==================================================================
[   20.138434] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   20.138483] Read of size 1 at addr fff00000c59caad0 by task kunit_try_catch/261
[   20.138698] 
[   20.138872] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.138970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.139027] Hardware name: linux,dummy-virt (DT)
[   20.139100] Call trace:
[   20.139126]  show_stack+0x20/0x38 (C)
[   20.139178]  dump_stack_lvl+0x8c/0xd0
[   20.139240]  print_report+0x118/0x5d0
[   20.139288]  kasan_report+0xdc/0x128
[   20.139335]  __asan_report_load1_noabort+0x20/0x30
[   20.139402]  strlen+0xa8/0xb0
[   20.139459]  kasan_strings+0x418/0xb00
[   20.139510]  kunit_try_run_case+0x170/0x3f0
[   20.139563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.139619]  kthread+0x328/0x630
[   20.139675]  ret_from_fork+0x10/0x20
[   20.139726] 
[   20.139761] Allocated by task 261:
[   20.139800]  kasan_save_stack+0x3c/0x68
[   20.139843]  kasan_save_track+0x20/0x40
[   20.139881]  kasan_save_alloc_info+0x40/0x58
[   20.139924]  __kasan_kmalloc+0xd4/0xd8
[   20.139970]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.140011]  kasan_strings+0xc8/0xb00
[   20.140052]  kunit_try_run_case+0x170/0x3f0
[   20.140093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.140140]  kthread+0x328/0x630
[   20.140184]  ret_from_fork+0x10/0x20
[   20.140453] 
[   20.140479] Freed by task 261:
[   20.140508]  kasan_save_stack+0x3c/0x68
[   20.140715]  kasan_save_track+0x20/0x40
[   20.141068]  kasan_save_free_info+0x4c/0x78
[   20.141180]  __kasan_slab_free+0x6c/0x98
[   20.141404]  kfree+0x214/0x3c8
[   20.141755]  kasan_strings+0x24c/0xb00
[   20.141810]  kunit_try_run_case+0x170/0x3f0
[   20.141853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.142245]  kthread+0x328/0x630
[   20.142799]  ret_from_fork+0x10/0x20
[   20.143185] 
[   20.143242] The buggy address belongs to the object at fff00000c59caac0
[   20.143242]  which belongs to the cache kmalloc-32 of size 32
[   20.143401] The buggy address is located 16 bytes inside of
[   20.143401]  freed 32-byte region [fff00000c59caac0, fff00000c59caae0)
[   20.143716] 
[   20.143883] The buggy address belongs to the physical page:
[   20.144014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca
[   20.144086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.144158] page_type: f5(slab)
[   20.144199] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.144531] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.144670] page dumped because: kasan: bad access detected
[   20.144747] 
[   20.144780] Memory state around the buggy address:
[   20.145103]  fff00000c59ca980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.145190]  fff00000c59caa00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.145251] >fff00000c59caa80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.145565]                                                  ^
[   20.145668]  fff00000c59cab00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.145752]  fff00000c59cab80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.145796] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   20.129168] ==================================================================
[   20.129237] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   20.129296] Read of size 1 at addr fff00000c59caad0 by task kunit_try_catch/261
[   20.129538] 
[   20.129576] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.129869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.129983] Hardware name: linux,dummy-virt (DT)
[   20.130029] Call trace:
[   20.130071]  show_stack+0x20/0x38 (C)
[   20.130182]  dump_stack_lvl+0x8c/0xd0
[   20.130279]  print_report+0x118/0x5d0
[   20.130423]  kasan_report+0xdc/0x128
[   20.130489]  __asan_report_load1_noabort+0x20/0x30
[   20.130569]  kasan_strings+0x95c/0xb00
[   20.130953]  kunit_try_run_case+0x170/0x3f0
[   20.131068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.131164]  kthread+0x328/0x630
[   20.131332]  ret_from_fork+0x10/0x20
[   20.131442] 
[   20.131601] Allocated by task 261:
[   20.131633]  kasan_save_stack+0x3c/0x68
[   20.131705]  kasan_save_track+0x20/0x40
[   20.132050]  kasan_save_alloc_info+0x40/0x58
[   20.132121]  __kasan_kmalloc+0xd4/0xd8
[   20.132249]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.132326]  kasan_strings+0xc8/0xb00
[   20.132384]  kunit_try_run_case+0x170/0x3f0
[   20.132685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.132771]  kthread+0x328/0x630
[   20.133097]  ret_from_fork+0x10/0x20
[   20.133173] 
[   20.133396] Freed by task 261:
[   20.133541]  kasan_save_stack+0x3c/0x68
[   20.133614]  kasan_save_track+0x20/0x40
[   20.133715]  kasan_save_free_info+0x4c/0x78
[   20.133774]  __kasan_slab_free+0x6c/0x98
[   20.133814]  kfree+0x214/0x3c8
[   20.133849]  kasan_strings+0x24c/0xb00
[   20.133889]  kunit_try_run_case+0x170/0x3f0
[   20.133930]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.133978]  kthread+0x328/0x630
[   20.134016]  ret_from_fork+0x10/0x20
[   20.134234] 
[   20.134390] The buggy address belongs to the object at fff00000c59caac0
[   20.134390]  which belongs to the cache kmalloc-32 of size 32
[   20.134543] The buggy address is located 16 bytes inside of
[   20.134543]  freed 32-byte region [fff00000c59caac0, fff00000c59caae0)
[   20.134637] 
[   20.134734] The buggy address belongs to the physical page:
[   20.134804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca
[   20.134968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.135058] page_type: f5(slab)
[   20.135100] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.135167] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.135367] page dumped because: kasan: bad access detected
[   20.135622] 
[   20.135692] Memory state around the buggy address:
[   20.135759]  fff00000c59ca980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.135914]  fff00000c59caa00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.135981] >fff00000c59caa80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.136024]                                                  ^
[   20.136073]  fff00000c59cab00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.136489]  fff00000c59cab80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.136551] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   20.119253] ==================================================================
[   20.119312] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   20.119366] Read of size 1 at addr fff00000c59caad0 by task kunit_try_catch/261
[   20.119678] 
[   20.119887] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.120118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.120496] Hardware name: linux,dummy-virt (DT)
[   20.120576] Call trace:
[   20.120651]  show_stack+0x20/0x38 (C)
[   20.120729]  dump_stack_lvl+0x8c/0xd0
[   20.120795]  print_report+0x118/0x5d0
[   20.120850]  kasan_report+0xdc/0x128
[   20.120897]  __asan_report_load1_noabort+0x20/0x30
[   20.120950]  strcmp+0xc0/0xc8
[   20.120995]  kasan_strings+0x340/0xb00
[   20.121042]  kunit_try_run_case+0x170/0x3f0
[   20.121391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.121508]  kthread+0x328/0x630
[   20.122305]  ret_from_fork+0x10/0x20
[   20.122555] 
[   20.122579] Allocated by task 261:
[   20.122732]  kasan_save_stack+0x3c/0x68
[   20.123088]  kasan_save_track+0x20/0x40
[   20.123311]  kasan_save_alloc_info+0x40/0x58
[   20.123428]  __kasan_kmalloc+0xd4/0xd8
[   20.123535]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.123679]  kasan_strings+0xc8/0xb00
[   20.123734]  kunit_try_run_case+0x170/0x3f0
[   20.123786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.124098]  kthread+0x328/0x630
[   20.124171]  ret_from_fork+0x10/0x20
[   20.124302] 
[   20.124364] Freed by task 261:
[   20.124421]  kasan_save_stack+0x3c/0x68
[   20.124465]  kasan_save_track+0x20/0x40
[   20.124824]  kasan_save_free_info+0x4c/0x78
[   20.124896]  __kasan_slab_free+0x6c/0x98
[   20.125040]  kfree+0x214/0x3c8
[   20.125096]  kasan_strings+0x24c/0xb00
[   20.125303]  kunit_try_run_case+0x170/0x3f0
[   20.125515]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.125610]  kthread+0x328/0x630
[   20.125701]  ret_from_fork+0x10/0x20
[   20.125759] 
[   20.125797] The buggy address belongs to the object at fff00000c59caac0
[   20.125797]  which belongs to the cache kmalloc-32 of size 32
[   20.125905] The buggy address is located 16 bytes inside of
[   20.125905]  freed 32-byte region [fff00000c59caac0, fff00000c59caae0)
[   20.125972] 
[   20.125994] The buggy address belongs to the physical page:
[   20.126327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca
[   20.126426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.126643] page_type: f5(slab)
[   20.126827] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.126912] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.126986] page dumped because: kasan: bad access detected
[   20.127268] 
[   20.127304] Memory state around the buggy address:
[   20.127502]  fff00000c59ca980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.127679]  fff00000c59caa00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   20.127813] >fff00000c59caa80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.127876]                                                  ^
[   20.127987]  fff00000c59cab00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.128039]  fff00000c59cab80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   20.128106] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   20.099531] ==================================================================
[   20.099596] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   20.099735] Read of size 1 at addr fff00000c59ca918 by task kunit_try_catch/259
[   20.099796] 
[   20.099832] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.100316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.100360] Hardware name: linux,dummy-virt (DT)
[   20.100394] Call trace:
[   20.100468]  show_stack+0x20/0x38 (C)
[   20.100555]  dump_stack_lvl+0x8c/0xd0
[   20.100608]  print_report+0x118/0x5d0
[   20.100808]  kasan_report+0xdc/0x128
[   20.101014]  __asan_report_load1_noabort+0x20/0x30
[   20.101122]  memcmp+0x198/0x1d8
[   20.101172]  kasan_memcmp+0x16c/0x300
[   20.101236]  kunit_try_run_case+0x170/0x3f0
[   20.101287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.101695]  kthread+0x328/0x630
[   20.101760]  ret_from_fork+0x10/0x20
[   20.101811] 
[   20.101832] Allocated by task 259:
[   20.102339]  kasan_save_stack+0x3c/0x68
[   20.102461]  kasan_save_track+0x20/0x40
[   20.102551]  kasan_save_alloc_info+0x40/0x58
[   20.102641]  __kasan_kmalloc+0xd4/0xd8
[   20.102771]  __kmalloc_cache_noprof+0x16c/0x3c0
[   20.102838]  kasan_memcmp+0xbc/0x300
[   20.103030]  kunit_try_run_case+0x170/0x3f0
[   20.103261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.103401]  kthread+0x328/0x630
[   20.103534]  ret_from_fork+0x10/0x20
[   20.103658] 
[   20.103690] The buggy address belongs to the object at fff00000c59ca900
[   20.103690]  which belongs to the cache kmalloc-32 of size 32
[   20.103794] The buggy address is located 0 bytes to the right of
[   20.103794]  allocated 24-byte region [fff00000c59ca900, fff00000c59ca918)
[   20.104356] 
[   20.104415] The buggy address belongs to the physical page:
[   20.104510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ca
[   20.104610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.104675] page_type: f5(slab)
[   20.104733] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   20.104789] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   20.104844] page dumped because: kasan: bad access detected
[   20.104887] 
[   20.104914] Memory state around the buggy address:
[   20.104958]  fff00000c59ca800: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc
[   20.105014]  fff00000c59ca880: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   20.105061] >fff00000c59ca900: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.105106]                             ^
[   20.105139]  fff00000c59ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.105185]  fff00000c59caa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.105236] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   20.075873] ==================================================================
[   20.075934] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   20.075991] Read of size 1 at addr ffff8000809d7b4a by task kunit_try_catch/255
[   20.076052] 
[   20.076084] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.076186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.076232] Hardware name: linux,dummy-virt (DT)
[   20.076265] Call trace:
[   20.076288]  show_stack+0x20/0x38 (C)
[   20.076799]  dump_stack_lvl+0x8c/0xd0
[   20.076902]  print_report+0x310/0x5d0
[   20.077012]  kasan_report+0xdc/0x128
[   20.077065]  __asan_report_load1_noabort+0x20/0x30
[   20.077145]  kasan_alloca_oob_right+0x2dc/0x340
[   20.077273]  kunit_try_run_case+0x170/0x3f0
[   20.077403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.077480]  kthread+0x328/0x630
[   20.077599]  ret_from_fork+0x10/0x20
[   20.077651] 
[   20.077697] The buggy address belongs to stack of task kunit_try_catch/255
[   20.077763] 
[   20.077783] The buggy address ffff8000809d7b4a belongs to a vmalloc virtual mapping
[   20.078007] The buggy address belongs to the physical page:
[   20.078080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106627
[   20.078186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.078296] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.078435] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.078504] page dumped because: kasan: bad access detected
[   20.078616] 
[   20.078655] Memory state around the buggy address:
[   20.078741]  ffff8000809d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.078795]  ffff8000809d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.079051] >ffff8000809d7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   20.079128]                                               ^
[   20.079229]  ffff8000809d7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.079301]  ffff8000809d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.079531] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   20.064600] ==================================================================
[   20.064743] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   20.064806] Read of size 1 at addr ffff8000809d7b5f by task kunit_try_catch/253
[   20.064858] 
[   20.064968] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.065435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.065632] Hardware name: linux,dummy-virt (DT)
[   20.065671] Call trace:
[   20.065958]  show_stack+0x20/0x38 (C)
[   20.066094]  dump_stack_lvl+0x8c/0xd0
[   20.066161]  print_report+0x310/0x5d0
[   20.066301]  kasan_report+0xdc/0x128
[   20.066400]  __asan_report_load1_noabort+0x20/0x30
[   20.066498]  kasan_alloca_oob_left+0x2b8/0x310
[   20.066669]  kunit_try_run_case+0x170/0x3f0
[   20.066742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.066956]  kthread+0x328/0x630
[   20.067114]  ret_from_fork+0x10/0x20
[   20.067337] 
[   20.067408] The buggy address belongs to stack of task kunit_try_catch/253
[   20.067510] 
[   20.067680] The buggy address ffff8000809d7b5f belongs to a vmalloc virtual mapping
[   20.067849] The buggy address belongs to the physical page:
[   20.067906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106627
[   20.068039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.068136] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.068455] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.068543] page dumped because: kasan: bad access detected
[   20.068673] 
[   20.068714] Memory state around the buggy address:
[   20.068792]  ffff8000809d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.068901]  ffff8000809d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.069015] >ffff8000809d7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   20.069067]                                                     ^
[   20.069304]  ffff8000809d7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   20.069609]  ffff8000809d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.069774] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   20.049103] ==================================================================
[   20.049297] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   20.049388] Read of size 1 at addr ffff8000809d7c2a by task kunit_try_catch/251
[   20.049441] 
[   20.049628] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.049817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.049898] Hardware name: linux,dummy-virt (DT)
[   20.050052] Call trace:
[   20.050131]  show_stack+0x20/0x38 (C)
[   20.050213]  dump_stack_lvl+0x8c/0xd0
[   20.050288]  print_report+0x310/0x5d0
[   20.050570]  kasan_report+0xdc/0x128
[   20.050744]  __asan_report_load1_noabort+0x20/0x30
[   20.050822]  kasan_stack_oob+0x238/0x270
[   20.050925]  kunit_try_run_case+0x170/0x3f0
[   20.050996]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.051300]  kthread+0x328/0x630
[   20.051438]  ret_from_fork+0x10/0x20
[   20.051559] 
[   20.051699] The buggy address belongs to stack of task kunit_try_catch/251
[   20.052090]  and is located at offset 138 in frame:
[   20.052251]  kasan_stack_oob+0x0/0x270
[   20.054673] 
[   20.054876] This frame has 4 objects:
[   20.055278]  [48, 49) '__assertion'
[   20.055328]  [64, 72) 'array'
[   20.055361]  [96, 112) '__assertion'
[   20.055631]  [128, 138) 'stack_array'
[   20.055803] 
[   20.055866] The buggy address ffff8000809d7c2a belongs to a vmalloc virtual mapping
[   20.055988] The buggy address belongs to the physical page:
[   20.056036] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106627
[   20.056094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.056526] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   20.056641] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.056730] page dumped because: kasan: bad access detected
[   20.056788] 
[   20.056941] Memory state around the buggy address:
[   20.057082]  ffff8000809d7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.057150]  ffff8000809d7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   20.057254] >ffff8000809d7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   20.057324]                                   ^
[   20.057473]  ffff8000809d7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   20.057553]  ffff8000809d7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   20.057769] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   20.028930] ==================================================================
[   20.028999] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   20.029059] Read of size 1 at addr ffff977f49c035ad by task kunit_try_catch/247
[   20.029112] 
[   20.029169] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.029273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.029302] Hardware name: linux,dummy-virt (DT)
[   20.029333] Call trace:
[   20.029353]  show_stack+0x20/0x38 (C)
[   20.029403]  dump_stack_lvl+0x8c/0xd0
[   20.029451]  print_report+0x310/0x5d0
[   20.029496]  kasan_report+0xdc/0x128
[   20.029541]  __asan_report_load1_noabort+0x20/0x30
[   20.029624]  kasan_global_oob_right+0x230/0x270
[   20.030185]  kunit_try_run_case+0x170/0x3f0
[   20.030396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.030453]  kthread+0x328/0x630
[   20.030821]  ret_from_fork+0x10/0x20
[   20.030977] 
[   20.031116] The buggy address belongs to the variable:
[   20.031293]  global_array+0xd/0x40
[   20.031362] 
[   20.031468] The buggy address ffff977f49c035ad belongs to a vmalloc virtual mapping
[   20.031667] The buggy address belongs to the physical page:
[   20.031723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c03
[   20.031789] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   20.031857] raw: 03fffe0000002000 ffffc1ffc01f00c8 ffffc1ffc01f00c8 0000000000000000
[   20.031908] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   20.031949] page dumped because: kasan: bad access detected
[   20.031982] 
[   20.032000] Memory state around the buggy address:
[   20.032040]  ffff977f49c03480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.032085]  ffff977f49c03500: 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9
[   20.032134] >ffff977f49c03580: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   20.032174]                                   ^
[   20.032224]  ffff977f49c03600: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   20.032268]  ffff977f49c03680: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
[   20.032307] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   19.997109] ==================================================================
[   19.997504] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.997721] Free of addr fff00000c59cb201 by task kunit_try_catch/243
[   19.997765] 
[   19.998247] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.998409] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.998577] Hardware name: linux,dummy-virt (DT)
[   19.998613] Call trace:
[   19.998636]  show_stack+0x20/0x38 (C)
[   19.998691]  dump_stack_lvl+0x8c/0xd0
[   19.998747]  print_report+0x118/0x5d0
[   19.998792]  kasan_report_invalid_free+0xc0/0xe8
[   19.998842]  check_slab_allocation+0xfc/0x108
[   19.998895]  __kasan_mempool_poison_object+0x78/0x150
[   19.998947]  mempool_free+0x28c/0x328
[   19.999004]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   19.999074]  mempool_kmalloc_invalid_free+0xc0/0x118
[   19.999141]  kunit_try_run_case+0x170/0x3f0
[   19.999191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.999259]  kthread+0x328/0x630
[   19.999305]  ret_from_fork+0x10/0x20
[   19.999353] 
[   19.999387] Allocated by task 243:
[   19.999423]  kasan_save_stack+0x3c/0x68
[   19.999480]  kasan_save_track+0x20/0x40
[   19.999516]  kasan_save_alloc_info+0x40/0x58
[   19.999564]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.999617]  remove_element+0x130/0x1f8
[   19.999668]  mempool_alloc_preallocated+0x58/0xc0
[   19.999720]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   19.999766]  mempool_kmalloc_invalid_free+0xc0/0x118
[   19.999807]  kunit_try_run_case+0x170/0x3f0
[   19.999853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.999899]  kthread+0x328/0x630
[   19.999953]  ret_from_fork+0x10/0x20
[   19.999988] 
[   20.000006] The buggy address belongs to the object at fff00000c59cb200
[   20.000006]  which belongs to the cache kmalloc-128 of size 128
[   20.000066] The buggy address is located 1 bytes inside of
[   20.000066]  128-byte region [fff00000c59cb200, fff00000c59cb280)
[   20.000129] 
[   20.000149] The buggy address belongs to the physical page:
[   20.000610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059cb
[   20.000689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.001038] page_type: f5(slab)
[   20.001172] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   20.001259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   20.001488] page dumped because: kasan: bad access detected
[   20.001663] 
[   20.001722] Memory state around the buggy address:
[   20.001826]  fff00000c59cb100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   20.002021]  fff00000c59cb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.002079] >fff00000c59cb200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.002363]                    ^
[   20.002445]  fff00000c59cb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.002744]  fff00000c59cb300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.002914] ==================================================================
[   20.010921] ==================================================================
[   20.011159] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.011433] Free of addr fff00000c793c001 by task kunit_try_catch/245
[   20.011499] 
[   20.011883] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   20.011991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.012348] Hardware name: linux,dummy-virt (DT)
[   20.012438] Call trace:
[   20.012462]  show_stack+0x20/0x38 (C)
[   20.012526]  dump_stack_lvl+0x8c/0xd0
[   20.012632]  print_report+0x118/0x5d0
[   20.012696]  kasan_report_invalid_free+0xc0/0xe8
[   20.012758]  __kasan_mempool_poison_object+0xfc/0x150
[   20.013052]  mempool_free+0x28c/0x328
[   20.013145]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   20.013216]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   20.013271]  kunit_try_run_case+0x170/0x3f0
[   20.013325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.013379]  kthread+0x328/0x630
[   20.013674]  ret_from_fork+0x10/0x20
[   20.013863] 
[   20.013969] The buggy address belongs to the physical page:
[   20.014028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793c
[   20.014159] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   20.014240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   20.014295] page_type: f8(unknown)
[   20.014510] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.014737] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.014854] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   20.014925] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   20.014992] head: 0bfffe0000000002 ffffc1ffc31e4f01 00000000ffffffff 00000000ffffffff
[   20.015416] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   20.015513] page dumped because: kasan: bad access detected
[   20.015813] 
[   20.015857] Memory state around the buggy address:
[   20.015948]  fff00000c793bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.016013]  fff00000c793bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   20.016090] >fff00000c793c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.016476]                    ^
[   20.016521]  fff00000c793c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.016582]  fff00000c793c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   20.016902] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   19.933026] ==================================================================
[   19.934252] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.934416] Free of addr fff00000c59e4e00 by task kunit_try_catch/237
[   19.934467] 
[   19.934499] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.934582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.935388] Hardware name: linux,dummy-virt (DT)
[   19.935821] Call trace:
[   19.935999]  show_stack+0x20/0x38 (C)
[   19.936434]  dump_stack_lvl+0x8c/0xd0
[   19.936896]  print_report+0x118/0x5d0
[   19.936953]  kasan_report_invalid_free+0xc0/0xe8
[   19.937004]  check_slab_allocation+0xd4/0x108
[   19.937903]  __kasan_mempool_poison_object+0x78/0x150
[   19.937968]  mempool_free+0x28c/0x328
[   19.938545]  mempool_double_free_helper+0x150/0x2e8
[   19.939176]  mempool_kmalloc_double_free+0xc0/0x118
[   19.939505]  kunit_try_run_case+0x170/0x3f0
[   19.940064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.940567]  kthread+0x328/0x630
[   19.940921]  ret_from_fork+0x10/0x20
[   19.941221] 
[   19.941240] Allocated by task 237:
[   19.941272]  kasan_save_stack+0x3c/0x68
[   19.942169]  kasan_save_track+0x20/0x40
[   19.942393]  kasan_save_alloc_info+0x40/0x58
[   19.942436]  __kasan_mempool_unpoison_object+0x11c/0x180
[   19.942480]  remove_element+0x130/0x1f8
[   19.943125]  mempool_alloc_preallocated+0x58/0xc0
[   19.943459]  mempool_double_free_helper+0x94/0x2e8
[   19.943998]  mempool_kmalloc_double_free+0xc0/0x118
[   19.944466]  kunit_try_run_case+0x170/0x3f0
[   19.944518]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.945194]  kthread+0x328/0x630
[   19.945909]  ret_from_fork+0x10/0x20
[   19.946014] 
[   19.946037] Freed by task 237:
[   19.946399]  kasan_save_stack+0x3c/0x68
[   19.946730]  kasan_save_track+0x20/0x40
[   19.946947]  kasan_save_free_info+0x4c/0x78
[   19.947808]  __kasan_mempool_poison_object+0xc0/0x150
[   19.948511]  mempool_free+0x28c/0x328
[   19.948747]  mempool_double_free_helper+0x100/0x2e8
[   19.948839]  mempool_kmalloc_double_free+0xc0/0x118
[   19.949038]  kunit_try_run_case+0x170/0x3f0
[   19.949078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.949879]  kthread+0x328/0x630
[   19.950033]  ret_from_fork+0x10/0x20
[   19.950088] 
[   19.950110] The buggy address belongs to the object at fff00000c59e4e00
[   19.950110]  which belongs to the cache kmalloc-128 of size 128
[   19.951175] The buggy address is located 0 bytes inside of
[   19.951175]  128-byte region [fff00000c59e4e00, fff00000c59e4e80)
[   19.951507] 
[   19.951543] The buggy address belongs to the physical page:
[   19.951614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   19.951671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.951722] page_type: f5(slab)
[   19.952976] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.953967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.954328] page dumped because: kasan: bad access detected
[   19.954435] 
[   19.954821] Memory state around the buggy address:
[   19.955047]  fff00000c59e4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.955540]  fff00000c59e4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.956200] >fff00000c59e4e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.956363]                    ^
[   19.956752]  fff00000c59e4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.958078]  fff00000c59e4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.958633] ==================================================================
[   19.973039] ==================================================================
[   19.973099] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.973166] Free of addr fff00000c7938000 by task kunit_try_catch/239
[   19.973630] 
[   19.973963] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.974476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.974581] Hardware name: linux,dummy-virt (DT)
[   19.974679] Call trace:
[   19.974892]  show_stack+0x20/0x38 (C)
[   19.974976]  dump_stack_lvl+0x8c/0xd0
[   19.975153]  print_report+0x118/0x5d0
[   19.975221]  kasan_report_invalid_free+0xc0/0xe8
[   19.975411]  __kasan_mempool_poison_object+0x14c/0x150
[   19.975610]  mempool_free+0x28c/0x328
[   19.975681]  mempool_double_free_helper+0x150/0x2e8
[   19.975974]  mempool_kmalloc_large_double_free+0xc0/0x118
[   19.976315]  kunit_try_run_case+0x170/0x3f0
[   19.976662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.976797]  kthread+0x328/0x630
[   19.976893]  ret_from_fork+0x10/0x20
[   19.977348] 
[   19.977440] The buggy address belongs to the physical page:
[   19.977529] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938
[   19.977854] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.978022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.978218] page_type: f8(unknown)
[   19.978262] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.978624] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.978724] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.978797] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.979024] head: 0bfffe0000000002 ffffc1ffc31e4e01 00000000ffffffff 00000000ffffffff
[   19.979238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.979375] page dumped because: kasan: bad access detected
[   19.979460] 
[   19.979487] Memory state around the buggy address:
[   19.979806]  fff00000c7937f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.979887]  fff00000c7937f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.980045] >fff00000c7938000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.980098]                    ^
[   19.980151]  fff00000c7938080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.980454]  fff00000c7938100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.980618] ==================================================================
[   19.987098] ==================================================================
[   19.987156] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   19.987224] Free of addr fff00000c793c000 by task kunit_try_catch/241
[   19.987319] 
[   19.987353] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.987581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.987701] Hardware name: linux,dummy-virt (DT)
[   19.987739] Call trace:
[   19.987849]  show_stack+0x20/0x38 (C)
[   19.987914]  dump_stack_lvl+0x8c/0xd0
[   19.987963]  print_report+0x118/0x5d0
[   19.988238]  kasan_report_invalid_free+0xc0/0xe8
[   19.988375]  __kasan_mempool_poison_pages+0xe0/0xe8
[   19.988443]  mempool_free+0x24c/0x328
[   19.988531]  mempool_double_free_helper+0x150/0x2e8
[   19.988585]  mempool_page_alloc_double_free+0xbc/0x118
[   19.988636]  kunit_try_run_case+0x170/0x3f0
[   19.988894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.988960]  kthread+0x328/0x630
[   19.989008]  ret_from_fork+0x10/0x20
[   19.989053] 
[   19.989073] The buggy address belongs to the physical page:
[   19.989104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10793c
[   19.989159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.989232] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.989283] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.989401] page dumped because: kasan: bad access detected
[   19.989441] 
[   19.989459] Memory state around the buggy address:
[   19.989492]  fff00000c793bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989536]  fff00000c793bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989580] >fff00000c793c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989646]                    ^
[   19.989675]  fff00000c793c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989717]  fff00000c793c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.989757] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   19.917614] ==================================================================
[   19.917678] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.917983] Read of size 1 at addr fff00000c7938000 by task kunit_try_catch/235
[   19.918116] 
[   19.918162] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.918391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.918421] Hardware name: linux,dummy-virt (DT)
[   19.918622] Call trace:
[   19.918797]  show_stack+0x20/0x38 (C)
[   19.918913]  dump_stack_lvl+0x8c/0xd0
[   19.919086]  print_report+0x118/0x5d0
[   19.919194]  kasan_report+0xdc/0x128
[   19.919255]  __asan_report_load1_noabort+0x20/0x30
[   19.919330]  mempool_uaf_helper+0x314/0x340
[   19.919751]  mempool_page_alloc_uaf+0xc0/0x118
[   19.919815]  kunit_try_run_case+0x170/0x3f0
[   19.920087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.920289]  kthread+0x328/0x630
[   19.920393]  ret_from_fork+0x10/0x20
[   19.920471] 
[   19.920663] The buggy address belongs to the physical page:
[   19.920705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938
[   19.920762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.920967] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.921043] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.921130] page dumped because: kasan: bad access detected
[   19.921164] 
[   19.921183] Memory state around the buggy address:
[   19.921235]  fff00000c7937f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.921290]  fff00000c7937f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.921659] >fff00000c7938000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.921716]                    ^
[   19.921745]  fff00000c7938080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.921924]  fff00000c7938100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.922181] ==================================================================
[   19.879020] ==================================================================
[   19.879358] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   19.879548] Read of size 1 at addr fff00000c7938000 by task kunit_try_catch/231
[   19.879622] 
[   19.879687] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.880083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.880229] Hardware name: linux,dummy-virt (DT)
[   19.880294] Call trace:
[   19.880317]  show_stack+0x20/0x38 (C)
[   19.880376]  dump_stack_lvl+0x8c/0xd0
[   19.880546]  print_report+0x118/0x5d0
[   19.880662]  kasan_report+0xdc/0x128
[   19.880800]  __asan_report_load1_noabort+0x20/0x30
[   19.880931]  mempool_uaf_helper+0x314/0x340
[   19.880983]  mempool_kmalloc_large_uaf+0xc4/0x120
[   19.881059]  kunit_try_run_case+0x170/0x3f0
[   19.881340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.881545]  kthread+0x328/0x630
[   19.881687]  ret_from_fork+0x10/0x20
[   19.881843] 
[   19.881950] The buggy address belongs to the physical page:
[   19.882004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107938
[   19.882261] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.882450] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   19.882549] page_type: f8(unknown)
[   19.882587] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.883017] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.883098] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   19.883259] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   19.883359] head: 0bfffe0000000002 ffffc1ffc31e4e01 00000000ffffffff 00000000ffffffff
[   19.883554] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   19.883663] page dumped because: kasan: bad access detected
[   19.883717] 
[   19.883737] Memory state around the buggy address:
[   19.883770]  fff00000c7937f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.883887]  fff00000c7937f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.884068] >fff00000c7938000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.884157]                    ^
[   19.884195]  fff00000c7938080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.884317]  fff00000c7938100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.884360] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   19.224275] ==================================================================
[   19.224359] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   19.224441] Read of size 1 at addr fff00000c664e000 by task kunit_try_catch/217
[   19.224495] 
[   19.224539] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.224626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.224653] Hardware name: linux,dummy-virt (DT)
[   19.224690] Call trace:
[   19.224714]  show_stack+0x20/0x38 (C)
[   19.224765]  dump_stack_lvl+0x8c/0xd0
[   19.224819]  print_report+0x118/0x5d0
[   19.224863]  kasan_report+0xdc/0x128
[   19.224908]  __kasan_check_byte+0x54/0x70
[   19.224954]  kmem_cache_destroy+0x34/0x218
[   19.225001]  kmem_cache_double_destroy+0x174/0x300
[   19.225054]  kunit_try_run_case+0x170/0x3f0
[   19.225106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.225159]  kthread+0x328/0x630
[   19.225219]  ret_from_fork+0x10/0x20
[   19.225268] 
[   19.225286] Allocated by task 217:
[   19.225317]  kasan_save_stack+0x3c/0x68
[   19.225360]  kasan_save_track+0x20/0x40
[   19.225396]  kasan_save_alloc_info+0x40/0x58
[   19.225436]  __kasan_slab_alloc+0xa8/0xb0
[   19.225473]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.225512]  __kmem_cache_create_args+0x178/0x280
[   19.225551]  kmem_cache_double_destroy+0xc0/0x300
[   19.225594]  kunit_try_run_case+0x170/0x3f0
[   19.225634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.225678]  kthread+0x328/0x630
[   19.225714]  ret_from_fork+0x10/0x20
[   19.225748] 
[   19.225767] Freed by task 217:
[   19.225793]  kasan_save_stack+0x3c/0x68
[   19.225829]  kasan_save_track+0x20/0x40
[   19.225864]  kasan_save_free_info+0x4c/0x78
[   19.225903]  __kasan_slab_free+0x6c/0x98
[   19.225940]  kmem_cache_free+0x260/0x468
[   19.225974]  slab_kmem_cache_release+0x38/0x50
[   19.226014]  kmem_cache_release+0x1c/0x30
[   19.226054]  kobject_put+0x17c/0x420
[   19.226091]  sysfs_slab_release+0x1c/0x30
[   19.226129]  kmem_cache_destroy+0x118/0x218
[   19.226165]  kmem_cache_double_destroy+0x128/0x300
[   19.226221]  kunit_try_run_case+0x170/0x3f0
[   19.226260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.226305]  kthread+0x328/0x630
[   19.226341]  ret_from_fork+0x10/0x20
[   19.226375] 
[   19.226396] The buggy address belongs to the object at fff00000c664e000
[   19.226396]  which belongs to the cache kmem_cache of size 208
[   19.226458] The buggy address is located 0 bytes inside of
[   19.226458]  freed 208-byte region [fff00000c664e000, fff00000c664e0d0)
[   19.226522] 
[   19.226545] The buggy address belongs to the physical page:
[   19.226580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664e
[   19.226636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.226691] page_type: f5(slab)
[   19.226732] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   19.226785] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   19.226828] page dumped because: kasan: bad access detected
[   19.226860] 
[   19.226878] Memory state around the buggy address:
[   19.226911]  fff00000c664df00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[   19.226956]  fff00000c664df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.227000] >fff00000c664e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.227039]                    ^
[   19.227066]  fff00000c664e080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   19.227110]  fff00000c664e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.227151] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   19.141912] ==================================================================
[   19.141997] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   19.142074] Read of size 1 at addr fff00000c6643000 by task kunit_try_catch/215
[   19.142126] 
[   19.142169] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   19.142277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.142305] Hardware name: linux,dummy-virt (DT)
[   19.142339] Call trace:
[   19.142363]  show_stack+0x20/0x38 (C)
[   19.142414]  dump_stack_lvl+0x8c/0xd0
[   19.142465]  print_report+0x118/0x5d0
[   19.142511]  kasan_report+0xdc/0x128
[   19.142555]  __asan_report_load1_noabort+0x20/0x30
[   19.142606]  kmem_cache_rcu_uaf+0x388/0x468
[   19.142657]  kunit_try_run_case+0x170/0x3f0
[   19.142709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.142764]  kthread+0x328/0x630
[   19.142811]  ret_from_fork+0x10/0x20
[   19.142860] 
[   19.142879] Allocated by task 215:
[   19.142909]  kasan_save_stack+0x3c/0x68
[   19.142949]  kasan_save_track+0x20/0x40
[   19.142985]  kasan_save_alloc_info+0x40/0x58
[   19.143024]  __kasan_slab_alloc+0xa8/0xb0
[   19.143059]  kmem_cache_alloc_noprof+0x10c/0x398
[   19.143101]  kmem_cache_rcu_uaf+0x12c/0x468
[   19.143141]  kunit_try_run_case+0x170/0x3f0
[   19.143179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.143236]  kthread+0x328/0x630
[   19.143270]  ret_from_fork+0x10/0x20
[   19.143306] 
[   19.143324] Freed by task 0:
[   19.143349]  kasan_save_stack+0x3c/0x68
[   19.143385]  kasan_save_track+0x20/0x40
[   19.143419]  kasan_save_free_info+0x4c/0x78
[   19.143458]  __kasan_slab_free+0x6c/0x98
[   19.143494]  slab_free_after_rcu_debug+0xd4/0x2f8
[   19.143531]  rcu_core+0x9f4/0x1e20
[   19.143568]  rcu_core_si+0x18/0x30
[   19.143600]  handle_softirqs+0x374/0xb28
[   19.143638]  __do_softirq+0x1c/0x28
[   19.143671] 
[   19.143689] Last potentially related work creation:
[   19.143717]  kasan_save_stack+0x3c/0x68
[   19.143752]  kasan_record_aux_stack+0xb4/0xc8
[   19.143791]  kmem_cache_free+0x120/0x468
[   19.143826]  kmem_cache_rcu_uaf+0x16c/0x468
[   19.143866]  kunit_try_run_case+0x170/0x3f0
[   19.143903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.143948]  kthread+0x328/0x630
[   19.143984]  ret_from_fork+0x10/0x20
[   19.144020] 
[   19.144037] The buggy address belongs to the object at fff00000c6643000
[   19.144037]  which belongs to the cache test_cache of size 200
[   19.144098] The buggy address is located 0 bytes inside of
[   19.144098]  freed 200-byte region [fff00000c6643000, fff00000c66430c8)
[   19.144162] 
[   19.144183] The buggy address belongs to the physical page:
[   19.144231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106643
[   19.144287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.144340] page_type: f5(slab)
[   19.144382] raw: 0bfffe0000000000 fff00000c3e4fdc0 dead000000000122 0000000000000000
[   19.144433] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   19.144476] page dumped because: kasan: bad access detected
[   19.144508] 
[   19.144525] Memory state around the buggy address:
[   19.144559]  fff00000c6642f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.144604]  fff00000c6642f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   19.144646] >fff00000c6643000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.144687]                    ^
[   19.144713]  fff00000c6643080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   19.144758]  fff00000c6643100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.144800] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   18.739074] ==================================================================
[   18.739472] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   18.739553] Free of addr fff00000c59ec001 by task kunit_try_catch/213
[   18.739788] 
[   18.739906] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.740114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.740149] Hardware name: linux,dummy-virt (DT)
[   18.740183] Call trace:
[   18.740219]  show_stack+0x20/0x38 (C)
[   18.740274]  dump_stack_lvl+0x8c/0xd0
[   18.740475]  print_report+0x118/0x5d0
[   18.740536]  kasan_report_invalid_free+0xc0/0xe8
[   18.740785]  check_slab_allocation+0xfc/0x108
[   18.741309]  __kasan_slab_pre_free+0x2c/0x48
[   18.741429]  kmem_cache_free+0xf0/0x468
[   18.741732]  kmem_cache_invalid_free+0x184/0x3c8
[   18.741969]  kunit_try_run_case+0x170/0x3f0
[   18.742031]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.742086]  kthread+0x328/0x630
[   18.742149]  ret_from_fork+0x10/0x20
[   18.742199] 
[   18.742231] Allocated by task 213:
[   18.742258]  kasan_save_stack+0x3c/0x68
[   18.742300]  kasan_save_track+0x20/0x40
[   18.742336]  kasan_save_alloc_info+0x40/0x58
[   18.742374]  __kasan_slab_alloc+0xa8/0xb0
[   18.742412]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.742470]  kmem_cache_invalid_free+0x12c/0x3c8
[   18.742511]  kunit_try_run_case+0x170/0x3f0
[   18.742560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.742612]  kthread+0x328/0x630
[   18.742655]  ret_from_fork+0x10/0x20
[   18.742698] 
[   18.742716] The buggy address belongs to the object at fff00000c59ec000
[   18.742716]  which belongs to the cache test_cache of size 200
[   18.742787] The buggy address is located 1 bytes inside of
[   18.742787]  200-byte region [fff00000c59ec000, fff00000c59ec0c8)
[   18.742850] 
[   18.742880] The buggy address belongs to the physical page:
[   18.742933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ec
[   18.743005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.743062] page_type: f5(slab)
[   18.743116] raw: 0bfffe0000000000 fff00000c1c3ab40 dead000000000122 0000000000000000
[   18.743178] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.743241] page dumped because: kasan: bad access detected
[   18.743279] 
[   18.743313] Memory state around the buggy address:
[   18.743355]  fff00000c59ebf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.743411]  fff00000c59ebf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.743455] >fff00000c59ec000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.743507]                    ^
[   18.743541]  fff00000c59ec080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.743593]  fff00000c59ec100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.743642] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   18.707577] ==================================================================
[   18.707680] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   18.707773] Free of addr fff00000c59ea000 by task kunit_try_catch/211
[   18.707856] 
[   18.707935] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.708022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.708050] Hardware name: linux,dummy-virt (DT)
[   18.708116] Call trace:
[   18.708139]  show_stack+0x20/0x38 (C)
[   18.708190]  dump_stack_lvl+0x8c/0xd0
[   18.708263]  print_report+0x118/0x5d0
[   18.708397]  kasan_report_invalid_free+0xc0/0xe8
[   18.708475]  check_slab_allocation+0xd4/0x108
[   18.708642]  __kasan_slab_pre_free+0x2c/0x48
[   18.708781]  kmem_cache_free+0xf0/0x468
[   18.708868]  kmem_cache_double_free+0x190/0x3c8
[   18.708921]  kunit_try_run_case+0x170/0x3f0
[   18.708972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.709035]  kthread+0x328/0x630
[   18.709101]  ret_from_fork+0x10/0x20
[   18.709168] 
[   18.709270] Allocated by task 211:
[   18.709360]  kasan_save_stack+0x3c/0x68
[   18.709414]  kasan_save_track+0x20/0x40
[   18.709449]  kasan_save_alloc_info+0x40/0x58
[   18.709510]  __kasan_slab_alloc+0xa8/0xb0
[   18.709546]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.709585]  kmem_cache_double_free+0x12c/0x3c8
[   18.709666]  kunit_try_run_case+0x170/0x3f0
[   18.709851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.710010]  kthread+0x328/0x630
[   18.710068]  ret_from_fork+0x10/0x20
[   18.710194] 
[   18.710294] Freed by task 211:
[   18.710359]  kasan_save_stack+0x3c/0x68
[   18.710492]  kasan_save_track+0x20/0x40
[   18.710566]  kasan_save_free_info+0x4c/0x78
[   18.710606]  __kasan_slab_free+0x6c/0x98
[   18.710993]  kmem_cache_free+0x260/0x468
[   18.711062]  kmem_cache_double_free+0x140/0x3c8
[   18.711313]  kunit_try_run_case+0x170/0x3f0
[   18.711392]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.711462]  kthread+0x328/0x630
[   18.711498]  ret_from_fork+0x10/0x20
[   18.711534] 
[   18.711554] The buggy address belongs to the object at fff00000c59ea000
[   18.711554]  which belongs to the cache test_cache of size 200
[   18.711631] The buggy address is located 0 bytes inside of
[   18.711631]  200-byte region [fff00000c59ea000, fff00000c59ea0c8)
[   18.711702] 
[   18.711724] The buggy address belongs to the physical page:
[   18.711757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059ea
[   18.711959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.712176] page_type: f5(slab)
[   18.712252] raw: 0bfffe0000000000 fff00000c1c3aa00 dead000000000122 0000000000000000
[   18.712464] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.712699] page dumped because: kasan: bad access detected
[   18.712798] 
[   18.712867] Memory state around the buggy address:
[   18.712935]  fff00000c59e9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.713108]  fff00000c59e9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.713304] >fff00000c59ea000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.713478]                    ^
[   18.713677]  fff00000c59ea080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   18.713827]  fff00000c59ea100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.713916] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   18.478772] ==================================================================
[   18.478834] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   18.478894] Read of size 1 at addr fff00000c59e80c8 by task kunit_try_catch/209
[   18.478945] 
[   18.478981] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.479065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.479092] Hardware name: linux,dummy-virt (DT)
[   18.479123] Call trace:
[   18.479147]  show_stack+0x20/0x38 (C)
[   18.479572]  dump_stack_lvl+0x8c/0xd0
[   18.479642]  print_report+0x118/0x5d0
[   18.479690]  kasan_report+0xdc/0x128
[   18.480248]  __asan_report_load1_noabort+0x20/0x30
[   18.480302]  kmem_cache_oob+0x344/0x430
[   18.480384]  kunit_try_run_case+0x170/0x3f0
[   18.480435]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.480491]  kthread+0x328/0x630
[   18.480563]  ret_from_fork+0x10/0x20
[   18.481739] 
[   18.481770] Allocated by task 209:
[   18.481802]  kasan_save_stack+0x3c/0x68
[   18.481848]  kasan_save_track+0x20/0x40
[   18.481886]  kasan_save_alloc_info+0x40/0x58
[   18.481926]  __kasan_slab_alloc+0xa8/0xb0
[   18.481963]  kmem_cache_alloc_noprof+0x10c/0x398
[   18.482002]  kmem_cache_oob+0x12c/0x430
[   18.482040]  kunit_try_run_case+0x170/0x3f0
[   18.482079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.482126]  kthread+0x328/0x630
[   18.482160]  ret_from_fork+0x10/0x20
[   18.482196] 
[   18.482229] The buggy address belongs to the object at fff00000c59e8000
[   18.482229]  which belongs to the cache test_cache of size 200
[   18.482290] The buggy address is located 0 bytes to the right of
[   18.482290]  allocated 200-byte region [fff00000c59e8000, fff00000c59e80c8)
[   18.482369] 
[   18.482388] The buggy address belongs to the physical page:
[   18.482523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e8
[   18.482617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.482744] page_type: f5(slab)
[   18.482834] raw: 0bfffe0000000000 fff00000c1c3a8c0 dead000000000122 0000000000000000
[   18.482922] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   18.483044] page dumped because: kasan: bad access detected
[   18.483124] 
[   18.483228] Memory state around the buggy address:
[   18.483328]  fff00000c59e7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.483461]  fff00000c59e8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.483536] >fff00000c59e8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   18.483578]                                               ^
[   18.483845]  fff00000c59e8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.484000]  fff00000c59e8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.484102] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   18.424808] ==================================================================
[   18.425070] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   18.425138] Read of size 8 at addr fff00000c59da2c0 by task kunit_try_catch/202
[   18.425690] 
[   18.425983] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.426348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.426386] Hardware name: linux,dummy-virt (DT)
[   18.426454] Call trace:
[   18.426798]  show_stack+0x20/0x38 (C)
[   18.427149]  dump_stack_lvl+0x8c/0xd0
[   18.427500]  print_report+0x118/0x5d0
[   18.427879]  kasan_report+0xdc/0x128
[   18.427982]  __asan_report_load8_noabort+0x20/0x30
[   18.428321]  workqueue_uaf+0x480/0x4a8
[   18.428549]  kunit_try_run_case+0x170/0x3f0
[   18.428862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.429142]  kthread+0x328/0x630
[   18.429391]  ret_from_fork+0x10/0x20
[   18.429784] 
[   18.429807] Allocated by task 202:
[   18.429837]  kasan_save_stack+0x3c/0x68
[   18.429877]  kasan_save_track+0x20/0x40
[   18.429912]  kasan_save_alloc_info+0x40/0x58
[   18.429952]  __kasan_kmalloc+0xd4/0xd8
[   18.430673]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.431076]  workqueue_uaf+0x13c/0x4a8
[   18.431139]  kunit_try_run_case+0x170/0x3f0
[   18.431180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.431317]  kthread+0x328/0x630
[   18.431455]  ret_from_fork+0x10/0x20
[   18.431670] 
[   18.431691] Freed by task 9:
[   18.431756]  kasan_save_stack+0x3c/0x68
[   18.431797]  kasan_save_track+0x20/0x40
[   18.431839]  kasan_save_free_info+0x4c/0x78
[   18.431876]  __kasan_slab_free+0x6c/0x98
[   18.431913]  kfree+0x214/0x3c8
[   18.431943]  workqueue_uaf_work+0x18/0x30
[   18.432433]  process_one_work+0x530/0xf98
[   18.432531]  worker_thread+0x618/0xf38
[   18.432881]  kthread+0x328/0x630
[   18.432994]  ret_from_fork+0x10/0x20
[   18.433225] 
[   18.433265] Last potentially related work creation:
[   18.433294]  kasan_save_stack+0x3c/0x68
[   18.433338]  kasan_record_aux_stack+0xb4/0xc8
[   18.433386]  __queue_work+0x65c/0x1008
[   18.433445]  queue_work_on+0xbc/0xf8
[   18.433480]  workqueue_uaf+0x210/0x4a8
[   18.433707]  kunit_try_run_case+0x170/0x3f0
[   18.433884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.433977]  kthread+0x328/0x630
[   18.434021]  ret_from_fork+0x10/0x20
[   18.434273] 
[   18.434444] The buggy address belongs to the object at fff00000c59da2c0
[   18.434444]  which belongs to the cache kmalloc-32 of size 32
[   18.434791] The buggy address is located 0 bytes inside of
[   18.434791]  freed 32-byte region [fff00000c59da2c0, fff00000c59da2e0)
[   18.434983] 
[   18.435057] The buggy address belongs to the physical page:
[   18.435091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059da
[   18.435244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.435326] page_type: f5(slab)
[   18.435364] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.435417] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.435460] page dumped because: kasan: bad access detected
[   18.435492] 
[   18.436419] Memory state around the buggy address:
[   18.436555]  fff00000c59da180: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.436768]  fff00000c59da200: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   18.436939] >fff00000c59da280: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc
[   18.437179]                                            ^
[   18.437302]  fff00000c59da300: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.437349]  fff00000c59da380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.437390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   18.386869] ==================================================================
[   18.387008] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   18.387083] Read of size 4 at addr fff00000c59da0c0 by task swapper/0/0
[   18.387131] 
[   18.387169] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.388544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.388639] Hardware name: linux,dummy-virt (DT)
[   18.388673] Call trace:
[   18.388695]  show_stack+0x20/0x38 (C)
[   18.388752]  dump_stack_lvl+0x8c/0xd0
[   18.388801]  print_report+0x118/0x5d0
[   18.388846]  kasan_report+0xdc/0x128
[   18.388888]  __asan_report_load4_noabort+0x20/0x30
[   18.388939]  rcu_uaf_reclaim+0x64/0x70
[   18.390234]  rcu_core+0x9f4/0x1e20
[   18.390300]  rcu_core_si+0x18/0x30
[   18.390345]  handle_softirqs+0x374/0xb28
[   18.390421]  __do_softirq+0x1c/0x28
[   18.390463]  ____do_softirq+0x18/0x30
[   18.390523]  call_on_irq_stack+0x24/0x30
[   18.390568]  do_softirq_own_stack+0x24/0x38
[   18.390615]  __irq_exit_rcu+0x1fc/0x318
[   18.390659]  irq_exit_rcu+0x1c/0x80
[   18.390702]  el1_interrupt+0x38/0x58
[   18.390747]  el1h_64_irq_handler+0x18/0x28
[   18.390792]  el1h_64_irq+0x6c/0x70
[   18.390888]  arch_local_irq_enable+0x4/0x8 (P)
[   18.390941]  do_idle+0x384/0x4e8
[   18.390986]  cpu_startup_entry+0x68/0x80
[   18.391032]  rest_init+0x160/0x188
[   18.391559]  start_kernel+0x308/0x3d0
[   18.391703]  __primary_switched+0x8c/0xa0
[   18.391826] 
[   18.391888] Allocated by task 200:
[   18.391976]  kasan_save_stack+0x3c/0x68
[   18.392046]  kasan_save_track+0x20/0x40
[   18.392086]  kasan_save_alloc_info+0x40/0x58
[   18.392125]  __kasan_kmalloc+0xd4/0xd8
[   18.392306]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.392353]  rcu_uaf+0xb0/0x2d8
[   18.392586]  kunit_try_run_case+0x170/0x3f0
[   18.392637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.392693]  kthread+0x328/0x630
[   18.392852]  ret_from_fork+0x10/0x20
[   18.393002] 
[   18.393038] Freed by task 0:
[   18.393073]  kasan_save_stack+0x3c/0x68
[   18.393135]  kasan_save_track+0x20/0x40
[   18.393180]  kasan_save_free_info+0x4c/0x78
[   18.393237]  __kasan_slab_free+0x6c/0x98
[   18.393285]  kfree+0x214/0x3c8
[   18.393439]  rcu_uaf_reclaim+0x28/0x70
[   18.393493]  rcu_core+0x9f4/0x1e20
[   18.393533]  rcu_core_si+0x18/0x30
[   18.393566]  handle_softirqs+0x374/0xb28
[   18.393603]  __do_softirq+0x1c/0x28
[   18.394023] 
[   18.394128] Last potentially related work creation:
[   18.394174]  kasan_save_stack+0x3c/0x68
[   18.394234]  kasan_record_aux_stack+0xb4/0xc8
[   18.394275]  __call_rcu_common.constprop.0+0x74/0x8c8
[   18.394316]  call_rcu+0x18/0x30
[   18.394349]  rcu_uaf+0x14c/0x2d8
[   18.395242]  kunit_try_run_case+0x170/0x3f0
[   18.395762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.396406]  kthread+0x328/0x630
[   18.396751]  ret_from_fork+0x10/0x20
[   18.397331] 
[   18.397607] The buggy address belongs to the object at fff00000c59da0c0
[   18.397607]  which belongs to the cache kmalloc-32 of size 32
[   18.397711] The buggy address is located 0 bytes inside of
[   18.397711]  freed 32-byte region [fff00000c59da0c0, fff00000c59da0e0)
[   18.397775] 
[   18.398050] The buggy address belongs to the physical page:
[   18.398142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059da
[   18.398216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.398418] page_type: f5(slab)
[   18.398910] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.399082] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.399414] page dumped because: kasan: bad access detected
[   18.399572] 
[   18.399669] Memory state around the buggy address:
[   18.399705]  fff00000c59d9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.399973]  fff00000c59da000: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   18.400030] >fff00000c59da080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.400071]                                            ^
[   18.400606]  fff00000c59da100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.400769]  fff00000c59da180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.400876] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   18.152934] ==================================================================
[   18.152997] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   18.153169] Read of size 1 at addr fff00000c59e4300 by task kunit_try_catch/198
[   18.153236] 
[   18.153454] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.153592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.153825] Hardware name: linux,dummy-virt (DT)
[   18.153955] Call trace:
[   18.154026]  show_stack+0x20/0x38 (C)
[   18.154094]  dump_stack_lvl+0x8c/0xd0
[   18.154365]  print_report+0x118/0x5d0
[   18.154576]  kasan_report+0xdc/0x128
[   18.154666]  __asan_report_load1_noabort+0x20/0x30
[   18.154827]  ksize_uaf+0x598/0x5f8
[   18.154916]  kunit_try_run_case+0x170/0x3f0
[   18.155052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.155105]  kthread+0x328/0x630
[   18.155311]  ret_from_fork+0x10/0x20
[   18.155477] 
[   18.155626] Allocated by task 198:
[   18.155683]  kasan_save_stack+0x3c/0x68
[   18.155815]  kasan_save_track+0x20/0x40
[   18.155897]  kasan_save_alloc_info+0x40/0x58
[   18.156012]  __kasan_kmalloc+0xd4/0xd8
[   18.156169]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.156408]  ksize_uaf+0xb8/0x5f8
[   18.156531]  kunit_try_run_case+0x170/0x3f0
[   18.156637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.156732]  kthread+0x328/0x630
[   18.156869]  ret_from_fork+0x10/0x20
[   18.156931] 
[   18.157120] Freed by task 198:
[   18.157217]  kasan_save_stack+0x3c/0x68
[   18.157438]  kasan_save_track+0x20/0x40
[   18.157566]  kasan_save_free_info+0x4c/0x78
[   18.157648]  __kasan_slab_free+0x6c/0x98
[   18.157825]  kfree+0x214/0x3c8
[   18.157858]  ksize_uaf+0x11c/0x5f8
[   18.157908]  kunit_try_run_case+0x170/0x3f0
[   18.157961]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.158145]  kthread+0x328/0x630
[   18.158646]  ret_from_fork+0x10/0x20
[   18.158709] 
[   18.158774] The buggy address belongs to the object at fff00000c59e4300
[   18.158774]  which belongs to the cache kmalloc-128 of size 128
[   18.158840] The buggy address is located 0 bytes inside of
[   18.158840]  freed 128-byte region [fff00000c59e4300, fff00000c59e4380)
[   18.159282] 
[   18.159362] The buggy address belongs to the physical page:
[   18.159635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   18.159736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.159959] page_type: f5(slab)
[   18.160025] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.160446] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.160522] page dumped because: kasan: bad access detected
[   18.160619] 
[   18.160721] Memory state around the buggy address:
[   18.160829]  fff00000c59e4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.160905]  fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.161050] >fff00000c59e4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.161139]                    ^
[   18.161393]  fff00000c59e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.161567]  fff00000c59e4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.161703] ==================================================================
[   18.162925] ==================================================================
[   18.162997] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   18.163062] Read of size 1 at addr fff00000c59e4378 by task kunit_try_catch/198
[   18.163115] 
[   18.163152] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.163250] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.163276] Hardware name: linux,dummy-virt (DT)
[   18.163316] Call trace:
[   18.163340]  show_stack+0x20/0x38 (C)
[   18.163386]  dump_stack_lvl+0x8c/0xd0
[   18.163433]  print_report+0x118/0x5d0
[   18.163485]  kasan_report+0xdc/0x128
[   18.163537]  __asan_report_load1_noabort+0x20/0x30
[   18.163586]  ksize_uaf+0x544/0x5f8
[   18.163633]  kunit_try_run_case+0x170/0x3f0
[   18.163679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.163737]  kthread+0x328/0x630
[   18.163793]  ret_from_fork+0x10/0x20
[   18.163843] 
[   18.163862] Allocated by task 198:
[   18.163891]  kasan_save_stack+0x3c/0x68
[   18.163929]  kasan_save_track+0x20/0x40
[   18.163966]  kasan_save_alloc_info+0x40/0x58
[   18.164005]  __kasan_kmalloc+0xd4/0xd8
[   18.164049]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.164097]  ksize_uaf+0xb8/0x5f8
[   18.164146]  kunit_try_run_case+0x170/0x3f0
[   18.164195]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.164641]  kthread+0x328/0x630
[   18.164705]  ret_from_fork+0x10/0x20
[   18.164775] 
[   18.164797] Freed by task 198:
[   18.165279]  kasan_save_stack+0x3c/0x68
[   18.165362]  kasan_save_track+0x20/0x40
[   18.165647]  kasan_save_free_info+0x4c/0x78
[   18.165819]  __kasan_slab_free+0x6c/0x98
[   18.166024]  kfree+0x214/0x3c8
[   18.166222]  ksize_uaf+0x11c/0x5f8
[   18.166474]  kunit_try_run_case+0x170/0x3f0
[   18.166569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.166768]  kthread+0x328/0x630
[   18.167075]  ret_from_fork+0x10/0x20
[   18.167373] 
[   18.167512] The buggy address belongs to the object at fff00000c59e4300
[   18.167512]  which belongs to the cache kmalloc-128 of size 128
[   18.167914] The buggy address is located 120 bytes inside of
[   18.167914]  freed 128-byte region [fff00000c59e4300, fff00000c59e4380)
[   18.168154] 
[   18.168252] The buggy address belongs to the physical page:
[   18.168424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   18.168620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.168796] page_type: f5(slab)
[   18.168892] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.169029] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.169074] page dumped because: kasan: bad access detected
[   18.169153] 
[   18.169351] Memory state around the buggy address:
[   18.169538]  fff00000c59e4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.169771]  fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169902] >fff00000c59e4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.169988]                                                                 ^
[   18.170057]  fff00000c59e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.170230]  fff00000c59e4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.170447] ==================================================================
[   18.143533] ==================================================================
[   18.143892] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   18.143964] Read of size 1 at addr fff00000c59e4300 by task kunit_try_catch/198
[   18.144399] 
[   18.144495] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.144639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.144667] Hardware name: linux,dummy-virt (DT)
[   18.144726] Call trace:
[   18.144765]  show_stack+0x20/0x38 (C)
[   18.145026]  dump_stack_lvl+0x8c/0xd0
[   18.145256]  print_report+0x118/0x5d0
[   18.145317]  kasan_report+0xdc/0x128
[   18.145401]  __kasan_check_byte+0x54/0x70
[   18.145520]  ksize+0x30/0x88
[   18.145596]  ksize_uaf+0x168/0x5f8
[   18.145653]  kunit_try_run_case+0x170/0x3f0
[   18.145703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.145755]  kthread+0x328/0x630
[   18.145915]  ret_from_fork+0x10/0x20
[   18.146291] 
[   18.146378] Allocated by task 198:
[   18.146456]  kasan_save_stack+0x3c/0x68
[   18.146610]  kasan_save_track+0x20/0x40
[   18.146697]  kasan_save_alloc_info+0x40/0x58
[   18.146813]  __kasan_kmalloc+0xd4/0xd8
[   18.146885]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.146943]  ksize_uaf+0xb8/0x5f8
[   18.147141]  kunit_try_run_case+0x170/0x3f0
[   18.147470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.147605]  kthread+0x328/0x630
[   18.147701]  ret_from_fork+0x10/0x20
[   18.147821] 
[   18.147887] Freed by task 198:
[   18.147933]  kasan_save_stack+0x3c/0x68
[   18.148002]  kasan_save_track+0x20/0x40
[   18.148242]  kasan_save_free_info+0x4c/0x78
[   18.148281]  __kasan_slab_free+0x6c/0x98
[   18.148465]  kfree+0x214/0x3c8
[   18.148509]  ksize_uaf+0x11c/0x5f8
[   18.148554]  kunit_try_run_case+0x170/0x3f0
[   18.148596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.148642]  kthread+0x328/0x630
[   18.148679]  ret_from_fork+0x10/0x20
[   18.148716] 
[   18.148735] The buggy address belongs to the object at fff00000c59e4300
[   18.148735]  which belongs to the cache kmalloc-128 of size 128
[   18.148807] The buggy address is located 0 bytes inside of
[   18.148807]  freed 128-byte region [fff00000c59e4300, fff00000c59e4380)
[   18.148872] 
[   18.148901] The buggy address belongs to the physical page:
[   18.148955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   18.149021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.149083] page_type: f5(slab)
[   18.149131] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.149193] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.149273] page dumped because: kasan: bad access detected
[   18.149318] 
[   18.149551] Memory state around the buggy address:
[   18.149620]  fff00000c59e4200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.149869]  fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.150070] >fff00000c59e4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.150386]                    ^
[   18.150706]  fff00000c59e4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.151042]  fff00000c59e4400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.151157] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   18.118598] ==================================================================
[   18.118682] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   18.118736] Read of size 1 at addr fff00000c59e4278 by task kunit_try_catch/196
[   18.118936] 
[   18.119023] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.119120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.119251] Hardware name: linux,dummy-virt (DT)
[   18.119370] Call trace:
[   18.119397]  show_stack+0x20/0x38 (C)
[   18.119474]  dump_stack_lvl+0x8c/0xd0
[   18.119583]  print_report+0x118/0x5d0
[   18.119641]  kasan_report+0xdc/0x128
[   18.119687]  __asan_report_load1_noabort+0x20/0x30
[   18.119756]  ksize_unpoisons_memory+0x618/0x740
[   18.119810]  kunit_try_run_case+0x170/0x3f0
[   18.120201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.120295]  kthread+0x328/0x630
[   18.120404]  ret_from_fork+0x10/0x20
[   18.120500] 
[   18.120539] Allocated by task 196:
[   18.120764]  kasan_save_stack+0x3c/0x68
[   18.121012]  kasan_save_track+0x20/0x40
[   18.121085]  kasan_save_alloc_info+0x40/0x58
[   18.121138]  __kasan_kmalloc+0xd4/0xd8
[   18.121175]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.121383]  ksize_unpoisons_memory+0xc0/0x740
[   18.121543]  kunit_try_run_case+0x170/0x3f0
[   18.121589]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.122104]  kthread+0x328/0x630
[   18.122221]  ret_from_fork+0x10/0x20
[   18.122308] 
[   18.122327] The buggy address belongs to the object at fff00000c59e4200
[   18.122327]  which belongs to the cache kmalloc-128 of size 128
[   18.122718] The buggy address is located 5 bytes to the right of
[   18.122718]  allocated 115-byte region [fff00000c59e4200, fff00000c59e4273)
[   18.122923] 
[   18.122982] The buggy address belongs to the physical page:
[   18.123116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   18.123192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.123427] page_type: f5(slab)
[   18.123530] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.123596] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.123772] page dumped because: kasan: bad access detected
[   18.123806] 
[   18.123825] Memory state around the buggy address:
[   18.123858]  fff00000c59e4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.123903]  fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.123949] >fff00000c59e4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.124000]                                                                 ^
[   18.124042]  fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.124094]  fff00000c59e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.124144] ==================================================================
[   18.110283] ==================================================================
[   18.110508] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   18.110712] Read of size 1 at addr fff00000c59e4273 by task kunit_try_catch/196
[   18.110779] 
[   18.110987] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.111086] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.111114] Hardware name: linux,dummy-virt (DT)
[   18.111150] Call trace:
[   18.111468]  show_stack+0x20/0x38 (C)
[   18.111554]  dump_stack_lvl+0x8c/0xd0
[   18.111767]  print_report+0x118/0x5d0
[   18.111924]  kasan_report+0xdc/0x128
[   18.112009]  __asan_report_load1_noabort+0x20/0x30
[   18.112062]  ksize_unpoisons_memory+0x628/0x740
[   18.112164]  kunit_try_run_case+0x170/0x3f0
[   18.112249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.112473]  kthread+0x328/0x630
[   18.112537]  ret_from_fork+0x10/0x20
[   18.112794] 
[   18.112827] Allocated by task 196:
[   18.112874]  kasan_save_stack+0x3c/0x68
[   18.112972]  kasan_save_track+0x20/0x40
[   18.113008]  kasan_save_alloc_info+0x40/0x58
[   18.113248]  __kasan_kmalloc+0xd4/0xd8
[   18.113302]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.113553]  ksize_unpoisons_memory+0xc0/0x740
[   18.113729]  kunit_try_run_case+0x170/0x3f0
[   18.113850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.113984]  kthread+0x328/0x630
[   18.114043]  ret_from_fork+0x10/0x20
[   18.114100] 
[   18.114119] The buggy address belongs to the object at fff00000c59e4200
[   18.114119]  which belongs to the cache kmalloc-128 of size 128
[   18.114181] The buggy address is located 0 bytes to the right of
[   18.114181]  allocated 115-byte region [fff00000c59e4200, fff00000c59e4273)
[   18.114572] 
[   18.114627] The buggy address belongs to the physical page:
[   18.114664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   18.115148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.115272] page_type: f5(slab)
[   18.115359] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.115466] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.115589] page dumped because: kasan: bad access detected
[   18.115642] 
[   18.115716] Memory state around the buggy address:
[   18.115882]  fff00000c59e4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.115987]  fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.116180] >fff00000c59e4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.116352]                                                              ^
[   18.116533]  fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.116582]  fff00000c59e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.116805] ==================================================================
[   18.125049] ==================================================================
[   18.125284] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   18.125359] Read of size 1 at addr fff00000c59e427f by task kunit_try_catch/196
[   18.125693] 
[   18.125748] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.125866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.126013] Hardware name: linux,dummy-virt (DT)
[   18.126078] Call trace:
[   18.126099]  show_stack+0x20/0x38 (C)
[   18.126367]  dump_stack_lvl+0x8c/0xd0
[   18.126541]  print_report+0x118/0x5d0
[   18.126703]  kasan_report+0xdc/0x128
[   18.126802]  __asan_report_load1_noabort+0x20/0x30
[   18.126956]  ksize_unpoisons_memory+0x690/0x740
[   18.127097]  kunit_try_run_case+0x170/0x3f0
[   18.127167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.127572]  kthread+0x328/0x630
[   18.127754]  ret_from_fork+0x10/0x20
[   18.127882] 
[   18.128009] Allocated by task 196:
[   18.128036]  kasan_save_stack+0x3c/0x68
[   18.128262]  kasan_save_track+0x20/0x40
[   18.128516]  kasan_save_alloc_info+0x40/0x58
[   18.128596]  __kasan_kmalloc+0xd4/0xd8
[   18.128650]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.129433]  ksize_unpoisons_memory+0xc0/0x740
[   18.129504]  kunit_try_run_case+0x170/0x3f0
[   18.129573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.129668]  kthread+0x328/0x630
[   18.129933]  ret_from_fork+0x10/0x20
[   18.130524] 
[   18.130560] The buggy address belongs to the object at fff00000c59e4200
[   18.130560]  which belongs to the cache kmalloc-128 of size 128
[   18.130954] The buggy address is located 12 bytes to the right of
[   18.130954]  allocated 115-byte region [fff00000c59e4200, fff00000c59e4273)
[   18.131193] 
[   18.131254] The buggy address belongs to the physical page:
[   18.131610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   18.131807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.132091] page_type: f5(slab)
[   18.132164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.132253] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.132305] page dumped because: kasan: bad access detected
[   18.132339] 
[   18.132356] Memory state around the buggy address:
[   18.132389]  fff00000c59e4100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.132434]  fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132481] >fff00000c59e4200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.132527]                                                                 ^
[   18.132569]  fff00000c59e4280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132624]  fff00000c59e4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.132672] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   18.090882] ==================================================================
[   18.091370] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   18.091522] Free of addr fff00000c45d8b60 by task kunit_try_catch/194
[   18.091718] 
[   18.091761] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.092088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.092127] Hardware name: linux,dummy-virt (DT)
[   18.092404] Call trace:
[   18.092442]  show_stack+0x20/0x38 (C)
[   18.092496]  dump_stack_lvl+0x8c/0xd0
[   18.092571]  print_report+0x118/0x5d0
[   18.092617]  kasan_report_invalid_free+0xc0/0xe8
[   18.092829]  check_slab_allocation+0xd4/0x108
[   18.092890]  __kasan_slab_pre_free+0x2c/0x48
[   18.092968]  kfree+0xe8/0x3c8
[   18.093094]  kfree_sensitive+0x3c/0xb0
[   18.093160]  kmalloc_double_kzfree+0x168/0x308
[   18.093247]  kunit_try_run_case+0x170/0x3f0
[   18.093487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.093673]  kthread+0x328/0x630
[   18.093837]  ret_from_fork+0x10/0x20
[   18.093886] 
[   18.094081] Allocated by task 194:
[   18.094240]  kasan_save_stack+0x3c/0x68
[   18.094566]  kasan_save_track+0x20/0x40
[   18.094615]  kasan_save_alloc_info+0x40/0x58
[   18.095094]  __kasan_kmalloc+0xd4/0xd8
[   18.095198]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.095345]  kmalloc_double_kzfree+0xb8/0x308
[   18.095597]  kunit_try_run_case+0x170/0x3f0
[   18.095806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.095968]  kthread+0x328/0x630
[   18.096038]  ret_from_fork+0x10/0x20
[   18.096328] 
[   18.096480] Freed by task 194:
[   18.096520]  kasan_save_stack+0x3c/0x68
[   18.096695]  kasan_save_track+0x20/0x40
[   18.096940]  kasan_save_free_info+0x4c/0x78
[   18.097031]  __kasan_slab_free+0x6c/0x98
[   18.097234]  kfree+0x214/0x3c8
[   18.097384]  kfree_sensitive+0x80/0xb0
[   18.097514]  kmalloc_double_kzfree+0x11c/0x308
[   18.097611]  kunit_try_run_case+0x170/0x3f0
[   18.097678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.097724]  kthread+0x328/0x630
[   18.098003]  ret_from_fork+0x10/0x20
[   18.098211] 
[   18.098275] The buggy address belongs to the object at fff00000c45d8b60
[   18.098275]  which belongs to the cache kmalloc-16 of size 16
[   18.098342] The buggy address is located 0 bytes inside of
[   18.098342]  16-byte region [fff00000c45d8b60, fff00000c45d8b70)
[   18.098620] 
[   18.098669] The buggy address belongs to the physical page:
[   18.098814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   18.098873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.099248] page_type: f5(slab)
[   18.099553] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.099828] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.100038] page dumped because: kasan: bad access detected
[   18.100127] 
[   18.100305] Memory state around the buggy address:
[   18.100576]  fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc
[   18.100776]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.100977] >fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.101049]                                                        ^
[   18.101321]  fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.101519]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.101698] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   18.083258] ==================================================================
[   18.083427] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   18.083489] Read of size 1 at addr fff00000c45d8b60 by task kunit_try_catch/194
[   18.083541] 
[   18.083572] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.083686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.083716] Hardware name: linux,dummy-virt (DT)
[   18.083754] Call trace:
[   18.083777]  show_stack+0x20/0x38 (C)
[   18.083835]  dump_stack_lvl+0x8c/0xd0
[   18.083883]  print_report+0x118/0x5d0
[   18.083928]  kasan_report+0xdc/0x128
[   18.083972]  __kasan_check_byte+0x54/0x70
[   18.084018]  kfree_sensitive+0x30/0xb0
[   18.084085]  kmalloc_double_kzfree+0x168/0x308
[   18.084134]  kunit_try_run_case+0x170/0x3f0
[   18.084190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.084269]  kthread+0x328/0x630
[   18.084315]  ret_from_fork+0x10/0x20
[   18.084361] 
[   18.084380] Allocated by task 194:
[   18.084406]  kasan_save_stack+0x3c/0x68
[   18.084443]  kasan_save_track+0x20/0x40
[   18.084480]  kasan_save_alloc_info+0x40/0x58
[   18.084517]  __kasan_kmalloc+0xd4/0xd8
[   18.084564]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.084602]  kmalloc_double_kzfree+0xb8/0x308
[   18.084642]  kunit_try_run_case+0x170/0x3f0
[   18.084681]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.084732]  kthread+0x328/0x630
[   18.084776]  ret_from_fork+0x10/0x20
[   18.084810] 
[   18.084828] Freed by task 194:
[   18.084862]  kasan_save_stack+0x3c/0x68
[   18.084905]  kasan_save_track+0x20/0x40
[   18.084942]  kasan_save_free_info+0x4c/0x78
[   18.084986]  __kasan_slab_free+0x6c/0x98
[   18.085028]  kfree+0x214/0x3c8
[   18.085061]  kfree_sensitive+0x80/0xb0
[   18.085103]  kmalloc_double_kzfree+0x11c/0x308
[   18.085145]  kunit_try_run_case+0x170/0x3f0
[   18.085183]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.085946]  kthread+0x328/0x630
[   18.086035]  ret_from_fork+0x10/0x20
[   18.086122] 
[   18.086225] The buggy address belongs to the object at fff00000c45d8b60
[   18.086225]  which belongs to the cache kmalloc-16 of size 16
[   18.086304] The buggy address is located 0 bytes inside of
[   18.086304]  freed 16-byte region [fff00000c45d8b60, fff00000c45d8b70)
[   18.086677] 
[   18.086872] The buggy address belongs to the physical page:
[   18.087010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   18.087194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.087258] page_type: f5(slab)
[   18.087635] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.087731] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.087881] page dumped because: kasan: bad access detected
[   18.087952] 
[   18.088028] Memory state around the buggy address:
[   18.088355]  fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc
[   18.088521]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.088597] >fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.088738]                                                        ^
[   18.088827]  fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.088925]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.089138] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   18.052987] ==================================================================
[   18.053226] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   18.053737] Read of size 1 at addr fff00000c59d5fa8 by task kunit_try_catch/190
[   18.054075] 
[   18.054113] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.054217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.054243] Hardware name: linux,dummy-virt (DT)
[   18.054276] Call trace:
[   18.054297]  show_stack+0x20/0x38 (C)
[   18.054390]  dump_stack_lvl+0x8c/0xd0
[   18.054442]  print_report+0x118/0x5d0
[   18.054488]  kasan_report+0xdc/0x128
[   18.054541]  __asan_report_load1_noabort+0x20/0x30
[   18.054599]  kmalloc_uaf2+0x3f4/0x468
[   18.054646]  kunit_try_run_case+0x170/0x3f0
[   18.054704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.054759]  kthread+0x328/0x630
[   18.054804]  ret_from_fork+0x10/0x20
[   18.054853] 
[   18.054871] Allocated by task 190:
[   18.054899]  kasan_save_stack+0x3c/0x68
[   18.054938]  kasan_save_track+0x20/0x40
[   18.054974]  kasan_save_alloc_info+0x40/0x58
[   18.055016]  __kasan_kmalloc+0xd4/0xd8
[   18.055062]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.055110]  kmalloc_uaf2+0xc4/0x468
[   18.055157]  kunit_try_run_case+0x170/0x3f0
[   18.055194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.055525]  kthread+0x328/0x630
[   18.055657]  ret_from_fork+0x10/0x20
[   18.056255] 
[   18.056638] Freed by task 190:
[   18.056804]  kasan_save_stack+0x3c/0x68
[   18.057114]  kasan_save_track+0x20/0x40
[   18.057297]  kasan_save_free_info+0x4c/0x78
[   18.057692]  __kasan_slab_free+0x6c/0x98
[   18.057895]  kfree+0x214/0x3c8
[   18.057942]  kmalloc_uaf2+0x134/0x468
[   18.058166]  kunit_try_run_case+0x170/0x3f0
[   18.058275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.058352]  kthread+0x328/0x630
[   18.058730]  ret_from_fork+0x10/0x20
[   18.058797] 
[   18.058919] The buggy address belongs to the object at fff00000c59d5f80
[   18.058919]  which belongs to the cache kmalloc-64 of size 64
[   18.059004] The buggy address is located 40 bytes inside of
[   18.059004]  freed 64-byte region [fff00000c59d5f80, fff00000c59d5fc0)
[   18.059384] 
[   18.059421] The buggy address belongs to the physical page:
[   18.059609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d5
[   18.059824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.059998] page_type: f5(slab)
[   18.060040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.060562] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000
[   18.060644] page dumped because: kasan: bad access detected
[   18.060679] 
[   18.060835] Memory state around the buggy address:
[   18.061057]  fff00000c59d5e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.061163]  fff00000c59d5f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.061224] >fff00000c59d5f80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.061658]                                   ^
[   18.061730]  fff00000c59d6000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.061786]  fff00000c59d6080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.061826] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   18.034739] ==================================================================
[   18.034803] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   18.034858] Write of size 33 at addr fff00000c59d5e80 by task kunit_try_catch/188
[   18.035170] 
[   18.035233] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.035318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.035346] Hardware name: linux,dummy-virt (DT)
[   18.035387] Call trace:
[   18.035410]  show_stack+0x20/0x38 (C)
[   18.035473]  dump_stack_lvl+0x8c/0xd0
[   18.035523]  print_report+0x118/0x5d0
[   18.035568]  kasan_report+0xdc/0x128
[   18.035611]  kasan_check_range+0x100/0x1a8
[   18.035667]  __asan_memset+0x34/0x78
[   18.035724]  kmalloc_uaf_memset+0x170/0x310
[   18.035774]  kunit_try_run_case+0x170/0x3f0
[   18.035832]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.035899]  kthread+0x328/0x630
[   18.035944]  ret_from_fork+0x10/0x20
[   18.035993] 
[   18.036011] Allocated by task 188:
[   18.036039]  kasan_save_stack+0x3c/0x68
[   18.036085]  kasan_save_track+0x20/0x40
[   18.036123]  kasan_save_alloc_info+0x40/0x58
[   18.036161]  __kasan_kmalloc+0xd4/0xd8
[   18.036196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.037239]  kmalloc_uaf_memset+0xb8/0x310
[   18.037286]  kunit_try_run_case+0x170/0x3f0
[   18.037339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.037756]  kthread+0x328/0x630
[   18.037824]  ret_from_fork+0x10/0x20
[   18.038020] 
[   18.038146] Freed by task 188:
[   18.038185]  kasan_save_stack+0x3c/0x68
[   18.038234]  kasan_save_track+0x20/0x40
[   18.038289]  kasan_save_free_info+0x4c/0x78
[   18.038327]  __kasan_slab_free+0x6c/0x98
[   18.038636]  kfree+0x214/0x3c8
[   18.038946]  kmalloc_uaf_memset+0x11c/0x310
[   18.039062]  kunit_try_run_case+0x170/0x3f0
[   18.039234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.039331]  kthread+0x328/0x630
[   18.039415]  ret_from_fork+0x10/0x20
[   18.039577] 
[   18.039917] The buggy address belongs to the object at fff00000c59d5e80
[   18.039917]  which belongs to the cache kmalloc-64 of size 64
[   18.040036] The buggy address is located 0 bytes inside of
[   18.040036]  freed 64-byte region [fff00000c59d5e80, fff00000c59d5ec0)
[   18.040239] 
[   18.040373] The buggy address belongs to the physical page:
[   18.040453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d5
[   18.040611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.040664] page_type: f5(slab)
[   18.040703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.040822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.041247] page dumped because: kasan: bad access detected
[   18.041356] 
[   18.041453] Memory state around the buggy address:
[   18.041562]  fff00000c59d5d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.041998]  fff00000c59d5e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.042126] >fff00000c59d5e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.042266]                    ^
[   18.042371]  fff00000c59d5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.042448]  fff00000c59d5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.042607] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   18.010073] ==================================================================
[   18.010371] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   18.010454] Read of size 1 at addr fff00000c45d8b48 by task kunit_try_catch/186
[   18.010795] 
[   18.010926] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   18.011026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.011072] Hardware name: linux,dummy-virt (DT)
[   18.011119] Call trace:
[   18.011579]  show_stack+0x20/0x38 (C)
[   18.011723]  dump_stack_lvl+0x8c/0xd0
[   18.011776]  print_report+0x118/0x5d0
[   18.012138]  kasan_report+0xdc/0x128
[   18.012409]  __asan_report_load1_noabort+0x20/0x30
[   18.012576]  kmalloc_uaf+0x300/0x338
[   18.012664]  kunit_try_run_case+0x170/0x3f0
[   18.012758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.013009]  kthread+0x328/0x630
[   18.013432]  ret_from_fork+0x10/0x20
[   18.013602] 
[   18.013677] Allocated by task 186:
[   18.013705]  kasan_save_stack+0x3c/0x68
[   18.013748]  kasan_save_track+0x20/0x40
[   18.013789]  kasan_save_alloc_info+0x40/0x58
[   18.013829]  __kasan_kmalloc+0xd4/0xd8
[   18.014044]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.014331]  kmalloc_uaf+0xb8/0x338
[   18.014464]  kunit_try_run_case+0x170/0x3f0
[   18.014557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.014923]  kthread+0x328/0x630
[   18.015132]  ret_from_fork+0x10/0x20
[   18.015200] 
[   18.015603] Freed by task 186:
[   18.015634]  kasan_save_stack+0x3c/0x68
[   18.015803]  kasan_save_track+0x20/0x40
[   18.016062]  kasan_save_free_info+0x4c/0x78
[   18.016144]  __kasan_slab_free+0x6c/0x98
[   18.016509]  kfree+0x214/0x3c8
[   18.016594]  kmalloc_uaf+0x11c/0x338
[   18.016673]  kunit_try_run_case+0x170/0x3f0
[   18.017324]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.017617]  kthread+0x328/0x630
[   18.017701]  ret_from_fork+0x10/0x20
[   18.017900] 
[   18.017922] The buggy address belongs to the object at fff00000c45d8b40
[   18.017922]  which belongs to the cache kmalloc-16 of size 16
[   18.018145] The buggy address is located 8 bytes inside of
[   18.018145]  freed 16-byte region [fff00000c45d8b40, fff00000c45d8b50)
[   18.018483] 
[   18.018594] The buggy address belongs to the physical page:
[   18.018662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   18.018766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.018851] page_type: f5(slab)
[   18.018925] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.019044] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.019096] page dumped because: kasan: bad access detected
[   18.019292] 
[   18.019510] Memory state around the buggy address:
[   18.019552]  fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc
[   18.019608]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.019671] >fff00000c45d8b00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   18.019725]                                               ^
[   18.019762]  fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.019804]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.019853] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   17.995083] ==================================================================
[   17.995143] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   17.995197] Read of size 64 at addr fff00000c59d5b84 by task kunit_try_catch/184
[   17.995270] 
[   17.995302] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.995385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.995422] Hardware name: linux,dummy-virt (DT)
[   17.995453] Call trace:
[   17.995474]  show_stack+0x20/0x38 (C)
[   17.995708]  dump_stack_lvl+0x8c/0xd0
[   17.995759]  print_report+0x118/0x5d0
[   17.995803]  kasan_report+0xdc/0x128
[   17.995858]  kasan_check_range+0x100/0x1a8
[   17.995904]  __asan_memmove+0x3c/0x98
[   17.995948]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   17.996009]  kunit_try_run_case+0x170/0x3f0
[   17.996060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.996116]  kthread+0x328/0x630
[   17.996160]  ret_from_fork+0x10/0x20
[   17.997084] 
[   17.997112] Allocated by task 184:
[   17.997188]  kasan_save_stack+0x3c/0x68
[   17.997481]  kasan_save_track+0x20/0x40
[   17.997627]  kasan_save_alloc_info+0x40/0x58
[   17.997826]  __kasan_kmalloc+0xd4/0xd8
[   17.997962]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.998069]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   17.998186]  kunit_try_run_case+0x170/0x3f0
[   17.998573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.998720]  kthread+0x328/0x630
[   17.998820]  ret_from_fork+0x10/0x20
[   17.998981] 
[   17.999059] The buggy address belongs to the object at fff00000c59d5b80
[   17.999059]  which belongs to the cache kmalloc-64 of size 64
[   17.999164] The buggy address is located 4 bytes inside of
[   17.999164]  allocated 64-byte region [fff00000c59d5b80, fff00000c59d5bc0)
[   17.999302] 
[   17.999343] The buggy address belongs to the physical page:
[   17.999410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d5
[   17.999860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.000009] page_type: f5(slab)
[   18.000109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   18.000161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.000379] page dumped because: kasan: bad access detected
[   18.000583] 
[   18.000609] Memory state around the buggy address:
[   18.000824]  fff00000c59d5a80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   18.000937]  fff00000c59d5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.001036] >fff00000c59d5b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   18.001255]                                            ^
[   18.001360]  fff00000c59d5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.001450]  fff00000c59d5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.001572] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   17.975319] ==================================================================
[   17.975422] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   17.975571] Read of size 18446744073709551614 at addr fff00000c59d5984 by task kunit_try_catch/182
[   17.975798] 
[   17.976013] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.976137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.976172] Hardware name: linux,dummy-virt (DT)
[   17.976201] Call trace:
[   17.976324]  show_stack+0x20/0x38 (C)
[   17.976379]  dump_stack_lvl+0x8c/0xd0
[   17.976425]  print_report+0x118/0x5d0
[   17.976467]  kasan_report+0xdc/0x128
[   17.976860]  kasan_check_range+0x100/0x1a8
[   17.976935]  __asan_memmove+0x3c/0x98
[   17.977429]  kmalloc_memmove_negative_size+0x154/0x2e0
[   17.977506]  kunit_try_run_case+0x170/0x3f0
[   17.977763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.978044]  kthread+0x328/0x630
[   17.978233]  ret_from_fork+0x10/0x20
[   17.978863] 
[   17.979022] Allocated by task 182:
[   17.979242]  kasan_save_stack+0x3c/0x68
[   17.979361]  kasan_save_track+0x20/0x40
[   17.979420]  kasan_save_alloc_info+0x40/0x58
[   17.979495]  __kasan_kmalloc+0xd4/0xd8
[   17.979657]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.980095]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   17.980283]  kunit_try_run_case+0x170/0x3f0
[   17.980383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.980528]  kthread+0x328/0x630
[   17.980608]  ret_from_fork+0x10/0x20
[   17.980712] 
[   17.980789] The buggy address belongs to the object at fff00000c59d5980
[   17.980789]  which belongs to the cache kmalloc-64 of size 64
[   17.981023] The buggy address is located 4 bytes inside of
[   17.981023]  64-byte region [fff00000c59d5980, fff00000c59d59c0)
[   17.981193] 
[   17.981331] The buggy address belongs to the physical page:
[   17.981369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d5
[   17.981448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.981776] page_type: f5(slab)
[   17.981952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   17.982034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.982215] page dumped because: kasan: bad access detected
[   17.982424] 
[   17.982471] Memory state around the buggy address:
[   17.982774]  fff00000c59d5880: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   17.983244]  fff00000c59d5900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.983421] >fff00000c59d5980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   17.983481]                    ^
[   17.983839]  fff00000c59d5a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.984058]  fff00000c59d5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.984337] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   17.962809] ==================================================================
[   17.962904] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   17.962965] Write of size 16 at addr fff00000c59e4169 by task kunit_try_catch/180
[   17.963015] 
[   17.963045] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.963505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.963549] Hardware name: linux,dummy-virt (DT)
[   17.963609] Call trace:
[   17.963634]  show_stack+0x20/0x38 (C)
[   17.963786]  dump_stack_lvl+0x8c/0xd0
[   17.963838]  print_report+0x118/0x5d0
[   17.963881]  kasan_report+0xdc/0x128
[   17.964055]  kasan_check_range+0x100/0x1a8
[   17.964163]  __asan_memset+0x34/0x78
[   17.964238]  kmalloc_oob_memset_16+0x150/0x2f8
[   17.964287]  kunit_try_run_case+0x170/0x3f0
[   17.964738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.964832]  kthread+0x328/0x630
[   17.964878]  ret_from_fork+0x10/0x20
[   17.965046] 
[   17.965108] Allocated by task 180:
[   17.965155]  kasan_save_stack+0x3c/0x68
[   17.965509]  kasan_save_track+0x20/0x40
[   17.965632]  kasan_save_alloc_info+0x40/0x58
[   17.965737]  __kasan_kmalloc+0xd4/0xd8
[   17.965828]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.965975]  kmalloc_oob_memset_16+0xb0/0x2f8
[   17.966068]  kunit_try_run_case+0x170/0x3f0
[   17.966190]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.966248]  kthread+0x328/0x630
[   17.966283]  ret_from_fork+0x10/0x20
[   17.966324] 
[   17.966503] The buggy address belongs to the object at fff00000c59e4100
[   17.966503]  which belongs to the cache kmalloc-128 of size 128
[   17.966732] The buggy address is located 105 bytes inside of
[   17.966732]  allocated 120-byte region [fff00000c59e4100, fff00000c59e4178)
[   17.966923] 
[   17.966971] The buggy address belongs to the physical page:
[   17.967078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   17.967242] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.967294] page_type: f5(slab)
[   17.967539] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.967735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.967786] page dumped because: kasan: bad access detected
[   17.967818] 
[   17.967836] Memory state around the buggy address:
[   17.967868]  fff00000c59e4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.967911]  fff00000c59e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.967953] >fff00000c59e4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.967990]                                                                 ^
[   17.968032]  fff00000c59e4180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.968074]  fff00000c59e4200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.968112] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   17.924055] ==================================================================
[   17.924341] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   17.924406] Write of size 4 at addr fff00000c59e4075 by task kunit_try_catch/176
[   17.924483] 
[   17.924532] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.924750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.924787] Hardware name: linux,dummy-virt (DT)
[   17.924858] Call trace:
[   17.924908]  show_stack+0x20/0x38 (C)
[   17.925169]  dump_stack_lvl+0x8c/0xd0
[   17.925250]  print_report+0x118/0x5d0
[   17.925295]  kasan_report+0xdc/0x128
[   17.925634]  kasan_check_range+0x100/0x1a8
[   17.925789]  __asan_memset+0x34/0x78
[   17.925891]  kmalloc_oob_memset_4+0x150/0x300
[   17.925978]  kunit_try_run_case+0x170/0x3f0
[   17.926079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.926132]  kthread+0x328/0x630
[   17.926177]  ret_from_fork+0x10/0x20
[   17.926235] 
[   17.926254] Allocated by task 176:
[   17.926611]  kasan_save_stack+0x3c/0x68
[   17.926698]  kasan_save_track+0x20/0x40
[   17.926874]  kasan_save_alloc_info+0x40/0x58
[   17.926962]  __kasan_kmalloc+0xd4/0xd8
[   17.927115]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.927188]  kmalloc_oob_memset_4+0xb0/0x300
[   17.927393]  kunit_try_run_case+0x170/0x3f0
[   17.927573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.927677]  kthread+0x328/0x630
[   17.927759]  ret_from_fork+0x10/0x20
[   17.927891] 
[   17.927981] The buggy address belongs to the object at fff00000c59e4000
[   17.927981]  which belongs to the cache kmalloc-128 of size 128
[   17.928130] The buggy address is located 117 bytes inside of
[   17.928130]  allocated 120-byte region [fff00000c59e4000, fff00000c59e4078)
[   17.928370] 
[   17.928519] The buggy address belongs to the physical page:
[   17.928627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e4
[   17.928704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.928871] page_type: f5(slab)
[   17.928952] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.929093] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.929135] page dumped because: kasan: bad access detected
[   17.929339] 
[   17.929429] Memory state around the buggy address:
[   17.929600]  fff00000c59e3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.929735]  fff00000c59e3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.929818] >fff00000c59e4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.929882]                                                                 ^
[   17.930034]  fff00000c59e4080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930099]  fff00000c59e4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.930143] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   17.905096] ==================================================================
[   17.905171] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   17.905240] Write of size 2 at addr fff00000c47f9f77 by task kunit_try_catch/174
[   17.905431] 
[   17.905947] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.906135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.906165] Hardware name: linux,dummy-virt (DT)
[   17.906239] Call trace:
[   17.906428]  show_stack+0x20/0x38 (C)
[   17.906642]  dump_stack_lvl+0x8c/0xd0
[   17.906859]  print_report+0x118/0x5d0
[   17.907003]  kasan_report+0xdc/0x128
[   17.907144]  kasan_check_range+0x100/0x1a8
[   17.907260]  __asan_memset+0x34/0x78
[   17.907329]  kmalloc_oob_memset_2+0x150/0x2f8
[   17.907588]  kunit_try_run_case+0x170/0x3f0
[   17.907923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.908226]  kthread+0x328/0x630
[   17.908470]  ret_from_fork+0x10/0x20
[   17.908757] 
[   17.908818] Allocated by task 174:
[   17.908868]  kasan_save_stack+0x3c/0x68
[   17.909037]  kasan_save_track+0x20/0x40
[   17.909288]  kasan_save_alloc_info+0x40/0x58
[   17.909338]  __kasan_kmalloc+0xd4/0xd8
[   17.909508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.909603]  kmalloc_oob_memset_2+0xb0/0x2f8
[   17.909771]  kunit_try_run_case+0x170/0x3f0
[   17.909923]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.910031]  kthread+0x328/0x630
[   17.910369]  ret_from_fork+0x10/0x20
[   17.910494] 
[   17.910563] The buggy address belongs to the object at fff00000c47f9f00
[   17.910563]  which belongs to the cache kmalloc-128 of size 128
[   17.910733] The buggy address is located 119 bytes inside of
[   17.910733]  allocated 120-byte region [fff00000c47f9f00, fff00000c47f9f78)
[   17.910830] 
[   17.911050] The buggy address belongs to the physical page:
[   17.911305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9
[   17.911400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.911720] page_type: f5(slab)
[   17.911769] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.911981] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.912447] page dumped because: kasan: bad access detected
[   17.912666] 
[   17.912909] Memory state around the buggy address:
[   17.912970]  fff00000c47f9e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.913369]  fff00000c47f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.913522] >fff00000c47f9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.913563]                                                                 ^
[   17.913607]  fff00000c47f9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.913694]  fff00000c47fa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.913744] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   17.887075] ==================================================================
[   17.887150] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   17.887262] Write of size 128 at addr fff00000c47f9e00 by task kunit_try_catch/172
[   17.887451] 
[   17.887494] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.887577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.887603] Hardware name: linux,dummy-virt (DT)
[   17.887949] Call trace:
[   17.888123]  show_stack+0x20/0x38 (C)
[   17.888260]  dump_stack_lvl+0x8c/0xd0
[   17.888349]  print_report+0x118/0x5d0
[   17.888425]  kasan_report+0xdc/0x128
[   17.888522]  kasan_check_range+0x100/0x1a8
[   17.888589]  __asan_memset+0x34/0x78
[   17.888633]  kmalloc_oob_in_memset+0x144/0x2d0
[   17.888814]  kunit_try_run_case+0x170/0x3f0
[   17.888869]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.888921]  kthread+0x328/0x630
[   17.888966]  ret_from_fork+0x10/0x20
[   17.889331] 
[   17.889417] Allocated by task 172:
[   17.889523]  kasan_save_stack+0x3c/0x68
[   17.889589]  kasan_save_track+0x20/0x40
[   17.889625]  kasan_save_alloc_info+0x40/0x58
[   17.889670]  __kasan_kmalloc+0xd4/0xd8
[   17.889704]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.889974]  kmalloc_oob_in_memset+0xb0/0x2d0
[   17.890164]  kunit_try_run_case+0x170/0x3f0
[   17.890341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.890438]  kthread+0x328/0x630
[   17.890522]  ret_from_fork+0x10/0x20
[   17.890647] 
[   17.890668] The buggy address belongs to the object at fff00000c47f9e00
[   17.890668]  which belongs to the cache kmalloc-128 of size 128
[   17.890781] The buggy address is located 0 bytes inside of
[   17.890781]  allocated 120-byte region [fff00000c47f9e00, fff00000c47f9e78)
[   17.890992] 
[   17.891049] The buggy address belongs to the physical page:
[   17.891241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9
[   17.891346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.891410] page_type: f5(slab)
[   17.891447] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.891560] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.891619] page dumped because: kasan: bad access detected
[   17.891658] 
[   17.891677] Memory state around the buggy address:
[   17.891717]  fff00000c47f9d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.891769]  fff00000c47f9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.891822] >fff00000c47f9e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.891860]                                                                 ^
[   17.891901]  fff00000c47f9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.891942]  fff00000c47f9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.891990] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   17.864806] ==================================================================
[   17.864868] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   17.865571] Read of size 16 at addr fff00000c45d8b20 by task kunit_try_catch/170
[   17.865708] 
[   17.865933] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.866451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.866487] Hardware name: linux,dummy-virt (DT)
[   17.866520] Call trace:
[   17.866556]  show_stack+0x20/0x38 (C)
[   17.866633]  dump_stack_lvl+0x8c/0xd0
[   17.866688]  print_report+0x118/0x5d0
[   17.866744]  kasan_report+0xdc/0x128
[   17.866788]  __asan_report_load16_noabort+0x20/0x30
[   17.866855]  kmalloc_uaf_16+0x3bc/0x438
[   17.866902]  kunit_try_run_case+0x170/0x3f0
[   17.866949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.867013]  kthread+0x328/0x630
[   17.867059]  ret_from_fork+0x10/0x20
[   17.867124] 
[   17.867143] Allocated by task 170:
[   17.867170]  kasan_save_stack+0x3c/0x68
[   17.867390]  kasan_save_track+0x20/0x40
[   17.867787]  kasan_save_alloc_info+0x40/0x58
[   17.867971]  __kasan_kmalloc+0xd4/0xd8
[   17.868305]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.868389]  kmalloc_uaf_16+0x140/0x438
[   17.868922]  kunit_try_run_case+0x170/0x3f0
[   17.869016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.869353]  kthread+0x328/0x630
[   17.869447]  ret_from_fork+0x10/0x20
[   17.869532] 
[   17.869700] Freed by task 170:
[   17.869728]  kasan_save_stack+0x3c/0x68
[   17.869939]  kasan_save_track+0x20/0x40
[   17.870024]  kasan_save_free_info+0x4c/0x78
[   17.870064]  __kasan_slab_free+0x6c/0x98
[   17.870100]  kfree+0x214/0x3c8
[   17.870132]  kmalloc_uaf_16+0x190/0x438
[   17.870170]  kunit_try_run_case+0x170/0x3f0
[   17.870218]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.870631]  kthread+0x328/0x630
[   17.870718]  ret_from_fork+0x10/0x20
[   17.870972] 
[   17.871095] The buggy address belongs to the object at fff00000c45d8b20
[   17.871095]  which belongs to the cache kmalloc-16 of size 16
[   17.871570] The buggy address is located 0 bytes inside of
[   17.871570]  freed 16-byte region [fff00000c45d8b20, fff00000c45d8b30)
[   17.871694] 
[   17.871753] The buggy address belongs to the physical page:
[   17.871785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   17.872019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.872330] page_type: f5(slab)
[   17.872398] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.872787] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.872880] page dumped because: kasan: bad access detected
[   17.872961] 
[   17.873152] Memory state around the buggy address:
[   17.873449]  fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc
[   17.873626]  fff00000c45d8a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   17.873751] >fff00000c45d8b00: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   17.873793]                                ^
[   17.873825]  fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.873988]  fff00000c45d8c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.874059] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   17.822714] ==================================================================
[   17.822768] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   17.823301] Read of size 1 at addr fff00000c1c50400 by task kunit_try_catch/166
[   17.823752] 
[   17.823857] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.823969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.824066] Hardware name: linux,dummy-virt (DT)
[   17.824104] Call trace:
[   17.824142]  show_stack+0x20/0x38 (C)
[   17.824223]  dump_stack_lvl+0x8c/0xd0
[   17.824272]  print_report+0x118/0x5d0
[   17.824608]  kasan_report+0xdc/0x128
[   17.824698]  __asan_report_load1_noabort+0x20/0x30
[   17.824753]  krealloc_uaf+0x4c8/0x520
[   17.824829]  kunit_try_run_case+0x170/0x3f0
[   17.824959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.825013]  kthread+0x328/0x630
[   17.825057]  ret_from_fork+0x10/0x20
[   17.825103] 
[   17.825121] Allocated by task 166:
[   17.825147]  kasan_save_stack+0x3c/0x68
[   17.825185]  kasan_save_track+0x20/0x40
[   17.825383]  kasan_save_alloc_info+0x40/0x58
[   17.825641]  __kasan_kmalloc+0xd4/0xd8
[   17.825795]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.825893]  krealloc_uaf+0xc8/0x520
[   17.826013]  kunit_try_run_case+0x170/0x3f0
[   17.826055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.826100]  kthread+0x328/0x630
[   17.826141]  ret_from_fork+0x10/0x20
[   17.826314] 
[   17.826338] Freed by task 166:
[   17.826517]  kasan_save_stack+0x3c/0x68
[   17.826575]  kasan_save_track+0x20/0x40
[   17.826612]  kasan_save_free_info+0x4c/0x78
[   17.826660]  __kasan_slab_free+0x6c/0x98
[   17.826696]  kfree+0x214/0x3c8
[   17.826741]  krealloc_uaf+0x12c/0x520
[   17.826777]  kunit_try_run_case+0x170/0x3f0
[   17.826815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.826868]  kthread+0x328/0x630
[   17.826902]  ret_from_fork+0x10/0x20
[   17.826945] 
[   17.826964] The buggy address belongs to the object at fff00000c1c50400
[   17.826964]  which belongs to the cache kmalloc-256 of size 256
[   17.827032] The buggy address is located 0 bytes inside of
[   17.827032]  freed 256-byte region [fff00000c1c50400, fff00000c1c50500)
[   17.827102] 
[   17.827121] The buggy address belongs to the physical page:
[   17.827152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.827236] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.827313] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.827576] page_type: f5(slab)
[   17.827887] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.828097] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.828159] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.828305] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.828410] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.828687] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.828864] page dumped because: kasan: bad access detected
[   17.828962] 
[   17.829039] Memory state around the buggy address:
[   17.829109]  fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.829194]  fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.829353] >fff00000c1c50400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.829566]                    ^
[   17.829665]  fff00000c1c50480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.829829]  fff00000c1c50500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.829950] ==================================================================
[   17.808940] ==================================================================
[   17.809004] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   17.809057] Read of size 1 at addr fff00000c1c50400 by task kunit_try_catch/166
[   17.809128] 
[   17.809159] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.809961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.810050] Hardware name: linux,dummy-virt (DT)
[   17.810219] Call trace:
[   17.810302]  show_stack+0x20/0x38 (C)
[   17.810377]  dump_stack_lvl+0x8c/0xd0
[   17.810700]  print_report+0x118/0x5d0
[   17.810865]  kasan_report+0xdc/0x128
[   17.811019]  __kasan_check_byte+0x54/0x70
[   17.811585]  krealloc_noprof+0x44/0x360
[   17.811870]  krealloc_uaf+0x180/0x520
[   17.812088]  kunit_try_run_case+0x170/0x3f0
[   17.812437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.813060]  kthread+0x328/0x630
[   17.813434]  ret_from_fork+0x10/0x20
[   17.813533] 
[   17.813553] Allocated by task 166:
[   17.813581]  kasan_save_stack+0x3c/0x68
[   17.813621]  kasan_save_track+0x20/0x40
[   17.813666]  kasan_save_alloc_info+0x40/0x58
[   17.814144]  __kasan_kmalloc+0xd4/0xd8
[   17.814377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.814574]  krealloc_uaf+0xc8/0x520
[   17.814615]  kunit_try_run_case+0x170/0x3f0
[   17.814665]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.814726]  kthread+0x328/0x630
[   17.814763]  ret_from_fork+0x10/0x20
[   17.814813] 
[   17.814833] Freed by task 166:
[   17.814872]  kasan_save_stack+0x3c/0x68
[   17.814908]  kasan_save_track+0x20/0x40
[   17.814952]  kasan_save_free_info+0x4c/0x78
[   17.814990]  __kasan_slab_free+0x6c/0x98
[   17.815031]  kfree+0x214/0x3c8
[   17.815062]  krealloc_uaf+0x12c/0x520
[   17.815104]  kunit_try_run_case+0x170/0x3f0
[   17.815152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.815196]  kthread+0x328/0x630
[   17.815243]  ret_from_fork+0x10/0x20
[   17.815481] 
[   17.815915] The buggy address belongs to the object at fff00000c1c50400
[   17.815915]  which belongs to the cache kmalloc-256 of size 256
[   17.816405] The buggy address is located 0 bytes inside of
[   17.816405]  freed 256-byte region [fff00000c1c50400, fff00000c1c50500)
[   17.816808] 
[   17.816903] The buggy address belongs to the physical page:
[   17.816981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.817037] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.817423] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.817537] page_type: f5(slab)
[   17.817593] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.817769] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.818114] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.818255] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.818309] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.818424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.818578] page dumped because: kasan: bad access detected
[   17.818820] 
[   17.818845] Memory state around the buggy address:
[   17.819014]  fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.819283]  fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.819479] >fff00000c1c50400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.819686]                    ^
[   17.819740]  fff00000c1c50480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.819896]  fff00000c1c50500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.820157] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   17.798282] ==================================================================
[   17.798471] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.798579] Write of size 1 at addr fff00000c78860eb by task kunit_try_catch/164
[   17.798783] 
[   17.798961] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.799054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.799080] Hardware name: linux,dummy-virt (DT)
[   17.799574] Call trace:
[   17.799640]  show_stack+0x20/0x38 (C)
[   17.799833]  dump_stack_lvl+0x8c/0xd0
[   17.799950]  print_report+0x118/0x5d0
[   17.800036]  kasan_report+0xdc/0x128
[   17.800081]  __asan_report_store1_noabort+0x20/0x30
[   17.800320]  krealloc_less_oob_helper+0xa58/0xc50
[   17.800372]  krealloc_large_less_oob+0x20/0x38
[   17.800426]  kunit_try_run_case+0x170/0x3f0
[   17.800619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.800689]  kthread+0x328/0x630
[   17.800810]  ret_from_fork+0x10/0x20
[   17.800866] 
[   17.800914] The buggy address belongs to the physical page:
[   17.800952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.801012] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.801059] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.801354] page_type: f8(unknown)
[   17.801503] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.801608] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.801721] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.801842] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.801893] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   17.801942] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.801983] page dumped because: kasan: bad access detected
[   17.802162] 
[   17.802362] Memory state around the buggy address:
[   17.802482]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.802542]  fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.802585] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.802629]                                                           ^
[   17.802679]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.802721]  fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.802759] ==================================================================
[   17.784985] ==================================================================
[   17.785091] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.785166] Write of size 1 at addr fff00000c78860da by task kunit_try_catch/164
[   17.785228] 
[   17.785257] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.785581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.785944] Hardware name: linux,dummy-virt (DT)
[   17.786150] Call trace:
[   17.786232]  show_stack+0x20/0x38 (C)
[   17.786377]  dump_stack_lvl+0x8c/0xd0
[   17.786464]  print_report+0x118/0x5d0
[   17.786587]  kasan_report+0xdc/0x128
[   17.786652]  __asan_report_store1_noabort+0x20/0x30
[   17.786723]  krealloc_less_oob_helper+0xa80/0xc50
[   17.786949]  krealloc_large_less_oob+0x20/0x38
[   17.787186]  kunit_try_run_case+0x170/0x3f0
[   17.787265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.787376]  kthread+0x328/0x630
[   17.787424]  ret_from_fork+0x10/0x20
[   17.787485] 
[   17.787515] The buggy address belongs to the physical page:
[   17.787546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.787599] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.787646] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.787696] page_type: f8(unknown)
[   17.787742] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.787815] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.787865] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.787913] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.787977] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   17.788033] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.788082] page dumped because: kasan: bad access detected
[   17.788114] 
[   17.788131] Memory state around the buggy address:
[   17.788161]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.788232]  fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.788274] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.788312]                                                     ^
[   17.788348]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.788390]  fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.788427] ==================================================================
[   17.715390] ==================================================================
[   17.715441] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   17.715486] Write of size 1 at addr fff00000c1c502da by task kunit_try_catch/160
[   17.715536] 
[   17.715564] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.715642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.715668] Hardware name: linux,dummy-virt (DT)
[   17.715895] Call trace:
[   17.715941]  show_stack+0x20/0x38 (C)
[   17.715993]  dump_stack_lvl+0x8c/0xd0
[   17.716040]  print_report+0x118/0x5d0
[   17.716083]  kasan_report+0xdc/0x128
[   17.716126]  __asan_report_store1_noabort+0x20/0x30
[   17.716175]  krealloc_less_oob_helper+0xa80/0xc50
[   17.716237]  krealloc_less_oob+0x20/0x38
[   17.716280]  kunit_try_run_case+0x170/0x3f0
[   17.716327]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.716380]  kthread+0x328/0x630
[   17.716427]  ret_from_fork+0x10/0x20
[   17.716474] 
[   17.716492] Allocated by task 160:
[   17.716536]  kasan_save_stack+0x3c/0x68
[   17.716580]  kasan_save_track+0x20/0x40
[   17.716615]  kasan_save_alloc_info+0x40/0x58
[   17.716653]  __kasan_krealloc+0x118/0x178
[   17.716696]  krealloc_noprof+0x128/0x360
[   17.716736]  krealloc_less_oob_helper+0x168/0xc50
[   17.716773]  krealloc_less_oob+0x20/0x38
[   17.716806]  kunit_try_run_case+0x170/0x3f0
[   17.716843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.716896]  kthread+0x328/0x630
[   17.716930]  ret_from_fork+0x10/0x20
[   17.716964] 
[   17.716981] The buggy address belongs to the object at fff00000c1c50200
[   17.716981]  which belongs to the cache kmalloc-256 of size 256
[   17.717038] The buggy address is located 17 bytes to the right of
[   17.717038]  allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9)
[   17.717102] 
[   17.717121] The buggy address belongs to the physical page:
[   17.717151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.717212] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.717488] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.717584] page_type: f5(slab)
[   17.717622] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.717673] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.718419] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.718574] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.718922] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.719115] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.719234] page dumped because: kasan: bad access detected
[   17.719348] 
[   17.719421] Memory state around the buggy address:
[   17.719473]  fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.719534]  fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.720131] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.720310]                                                     ^
[   17.720388]  fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.720448]  fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.720692] ==================================================================
[   17.779301] ==================================================================
[   17.779355] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.779400] Write of size 1 at addr fff00000c78860d0 by task kunit_try_catch/164
[   17.779518] 
[   17.779576] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.779656] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.779727] Hardware name: linux,dummy-virt (DT)
[   17.779758] Call trace:
[   17.779780]  show_stack+0x20/0x38 (C)
[   17.780022]  dump_stack_lvl+0x8c/0xd0
[   17.780103]  print_report+0x118/0x5d0
[   17.780320]  kasan_report+0xdc/0x128
[   17.780381]  __asan_report_store1_noabort+0x20/0x30
[   17.780438]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.780580]  krealloc_large_less_oob+0x20/0x38
[   17.780656]  kunit_try_run_case+0x170/0x3f0
[   17.780705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.780973]  kthread+0x328/0x630
[   17.781249]  ret_from_fork+0x10/0x20
[   17.781403] 
[   17.781478] The buggy address belongs to the physical page:
[   17.781509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.781562] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.781768] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.781828] page_type: f8(unknown)
[   17.782299] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.782435] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.782788] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.782920] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.783023] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   17.783121] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.783251] page dumped because: kasan: bad access detected
[   17.783310] 
[   17.783328] Memory state around the buggy address:
[   17.783360]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.783757]  fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.783876] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.783987]                                                  ^
[   17.784126]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.784194]  fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.784250] ==================================================================
[   17.772421] ==================================================================
[   17.772481] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.772540] Write of size 1 at addr fff00000c78860c9 by task kunit_try_catch/164
[   17.772672] 
[   17.772816] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.773084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.773152] Hardware name: linux,dummy-virt (DT)
[   17.773201] Call trace:
[   17.773278]  show_stack+0x20/0x38 (C)
[   17.773347]  dump_stack_lvl+0x8c/0xd0
[   17.773773]  print_report+0x118/0x5d0
[   17.773967]  kasan_report+0xdc/0x128
[   17.774076]  __asan_report_store1_noabort+0x20/0x30
[   17.774211]  krealloc_less_oob_helper+0xa48/0xc50
[   17.774362]  krealloc_large_less_oob+0x20/0x38
[   17.774575]  kunit_try_run_case+0x170/0x3f0
[   17.774967]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.775188]  kthread+0x328/0x630
[   17.775333]  ret_from_fork+0x10/0x20
[   17.775499] 
[   17.775554] The buggy address belongs to the physical page:
[   17.775653] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.775897] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.776149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.776277] page_type: f8(unknown)
[   17.776385] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.776546] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.776707] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.776761] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.776850] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   17.777033] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.777276] page dumped because: kasan: bad access detected
[   17.777384] 
[   17.777452] Memory state around the buggy address:
[   17.777567]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.777629]  fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.777678] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.777723]                                               ^
[   17.777758]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.778011]  fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.778161] ==================================================================
[   17.722176] ==================================================================
[   17.722239] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.722453] Write of size 1 at addr fff00000c1c502ea by task kunit_try_catch/160
[   17.722675] 
[   17.722725] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.723166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.723586] Hardware name: linux,dummy-virt (DT)
[   17.723630] Call trace:
[   17.723662]  show_stack+0x20/0x38 (C)
[   17.723715]  dump_stack_lvl+0x8c/0xd0
[   17.723761]  print_report+0x118/0x5d0
[   17.723804]  kasan_report+0xdc/0x128
[   17.723847]  __asan_report_store1_noabort+0x20/0x30
[   17.724231]  krealloc_less_oob_helper+0xae4/0xc50
[   17.724527]  krealloc_less_oob+0x20/0x38
[   17.724683]  kunit_try_run_case+0x170/0x3f0
[   17.724743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.724797]  kthread+0x328/0x630
[   17.724842]  ret_from_fork+0x10/0x20
[   17.724888] 
[   17.724906] Allocated by task 160:
[   17.724932]  kasan_save_stack+0x3c/0x68
[   17.725387]  kasan_save_track+0x20/0x40
[   17.725550]  kasan_save_alloc_info+0x40/0x58
[   17.725626]  __kasan_krealloc+0x118/0x178
[   17.725662]  krealloc_noprof+0x128/0x360
[   17.725958]  krealloc_less_oob_helper+0x168/0xc50
[   17.726082]  krealloc_less_oob+0x20/0x38
[   17.726247]  kunit_try_run_case+0x170/0x3f0
[   17.726463]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.726630]  kthread+0x328/0x630
[   17.726709]  ret_from_fork+0x10/0x20
[   17.726785] 
[   17.726869] The buggy address belongs to the object at fff00000c1c50200
[   17.726869]  which belongs to the cache kmalloc-256 of size 256
[   17.726961] The buggy address is located 33 bytes to the right of
[   17.726961]  allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9)
[   17.727116] 
[   17.727157] The buggy address belongs to the physical page:
[   17.727325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.727606] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.727861] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.728082] page_type: f5(slab)
[   17.728159] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.728317] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.728372] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.728876] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.728984] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.729340] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.729536] page dumped because: kasan: bad access detected
[   17.729650] 
[   17.729670] Memory state around the buggy address:
[   17.729703]  fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.729762]  fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.729810] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.729992]                                                           ^
[   17.730227]  fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.730294]  fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.730476] ==================================================================
[   17.791009] ==================================================================
[   17.791062] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   17.791108] Write of size 1 at addr fff00000c78860ea by task kunit_try_catch/164
[   17.791238] 
[   17.791305] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.791451] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.791479] Hardware name: linux,dummy-virt (DT)
[   17.791736] Call trace:
[   17.791804]  show_stack+0x20/0x38 (C)
[   17.791857]  dump_stack_lvl+0x8c/0xd0
[   17.791994]  print_report+0x118/0x5d0
[   17.792042]  kasan_report+0xdc/0x128
[   17.792356]  __asan_report_store1_noabort+0x20/0x30
[   17.792434]  krealloc_less_oob_helper+0xae4/0xc50
[   17.792515]  krealloc_large_less_oob+0x20/0x38
[   17.792573]  kunit_try_run_case+0x170/0x3f0
[   17.792922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.793001]  kthread+0x328/0x630
[   17.793295]  ret_from_fork+0x10/0x20
[   17.793549] 
[   17.793574] The buggy address belongs to the physical page:
[   17.793612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.794070] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.794180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.794358] page_type: f8(unknown)
[   17.794594] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.794721] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.794832] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.795251] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.795655] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   17.795904] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.796069] page dumped because: kasan: bad access detected
[   17.796171] 
[   17.796285] Memory state around the buggy address:
[   17.796320]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.796483]  fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.796770] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   17.796948]                                                           ^
[   17.797155]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.797284]  fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.797324] ==================================================================
[   17.694056] ==================================================================
[   17.694223] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   17.694311] Write of size 1 at addr fff00000c1c502c9 by task kunit_try_catch/160
[   17.694362] 
[   17.694779] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.694875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.694900] Hardware name: linux,dummy-virt (DT)
[   17.694930] Call trace:
[   17.694950]  show_stack+0x20/0x38 (C)
[   17.695270]  dump_stack_lvl+0x8c/0xd0
[   17.695607]  print_report+0x118/0x5d0
[   17.695731]  kasan_report+0xdc/0x128
[   17.695810]  __asan_report_store1_noabort+0x20/0x30
[   17.695872]  krealloc_less_oob_helper+0xa48/0xc50
[   17.696144]  krealloc_less_oob+0x20/0x38
[   17.696225]  kunit_try_run_case+0x170/0x3f0
[   17.696547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.696625]  kthread+0x328/0x630
[   17.696673]  ret_from_fork+0x10/0x20
[   17.696721] 
[   17.696740] Allocated by task 160:
[   17.696766]  kasan_save_stack+0x3c/0x68
[   17.697303]  kasan_save_track+0x20/0x40
[   17.697361]  kasan_save_alloc_info+0x40/0x58
[   17.697656]  __kasan_krealloc+0x118/0x178
[   17.697809]  krealloc_noprof+0x128/0x360
[   17.697860]  krealloc_less_oob_helper+0x168/0xc50
[   17.697898]  krealloc_less_oob+0x20/0x38
[   17.697938]  kunit_try_run_case+0x170/0x3f0
[   17.697977]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.698272]  kthread+0x328/0x630
[   17.698395]  ret_from_fork+0x10/0x20
[   17.698528] 
[   17.698597] The buggy address belongs to the object at fff00000c1c50200
[   17.698597]  which belongs to the cache kmalloc-256 of size 256
[   17.698810] The buggy address is located 0 bytes to the right of
[   17.698810]  allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9)
[   17.699094] 
[   17.699141] The buggy address belongs to the physical page:
[   17.699175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.699364] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.699603] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.699706] page_type: f5(slab)
[   17.699834] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.699886] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.700266] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.700376] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.700602] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.700792] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.700991] page dumped because: kasan: bad access detected
[   17.701169] 
[   17.701413] Memory state around the buggy address:
[   17.701548]  fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.701597]  fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.701641] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.702071]                                               ^
[   17.702278]  fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.702529]  fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.702633] ==================================================================
[   17.732110] ==================================================================
[   17.732231] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   17.732463] Write of size 1 at addr fff00000c1c502eb by task kunit_try_catch/160
[   17.732543] 
[   17.732590] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.732679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.733027] Hardware name: linux,dummy-virt (DT)
[   17.733163] Call trace:
[   17.733188]  show_stack+0x20/0x38 (C)
[   17.733251]  dump_stack_lvl+0x8c/0xd0
[   17.733747]  print_report+0x118/0x5d0
[   17.734006]  kasan_report+0xdc/0x128
[   17.734134]  __asan_report_store1_noabort+0x20/0x30
[   17.734371]  krealloc_less_oob_helper+0xa58/0xc50
[   17.734900]  krealloc_less_oob+0x20/0x38
[   17.734974]  kunit_try_run_case+0x170/0x3f0
[   17.735385]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.735819]  kthread+0x328/0x630
[   17.735947]  ret_from_fork+0x10/0x20
[   17.736016] 
[   17.736035] Allocated by task 160:
[   17.736138]  kasan_save_stack+0x3c/0x68
[   17.736587]  kasan_save_track+0x20/0x40
[   17.736788]  kasan_save_alloc_info+0x40/0x58
[   17.737014]  __kasan_krealloc+0x118/0x178
[   17.737281]  krealloc_noprof+0x128/0x360
[   17.737470]  krealloc_less_oob_helper+0x168/0xc50
[   17.737555]  krealloc_less_oob+0x20/0x38
[   17.737679]  kunit_try_run_case+0x170/0x3f0
[   17.737732]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.737945]  kthread+0x328/0x630
[   17.738316]  ret_from_fork+0x10/0x20
[   17.738394] 
[   17.738432] The buggy address belongs to the object at fff00000c1c50200
[   17.738432]  which belongs to the cache kmalloc-256 of size 256
[   17.738827] The buggy address is located 34 bytes to the right of
[   17.738827]  allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9)
[   17.738972] 
[   17.738993] The buggy address belongs to the physical page:
[   17.739035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.739348] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.739544] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.739603] page_type: f5(slab)
[   17.739640] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.739721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.739780] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.739849] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.739899] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.739962] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.740017] page dumped because: kasan: bad access detected
[   17.740056] 
[   17.740081] Memory state around the buggy address:
[   17.740113]  fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740156]  fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.740198] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.740254]                                                           ^
[   17.740300]  fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740343]  fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740387] ==================================================================
[   17.704871] ==================================================================
[   17.704926] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   17.704972] Write of size 1 at addr fff00000c1c502d0 by task kunit_try_catch/160
[   17.705021] 
[   17.705351] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.705561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.705684] Hardware name: linux,dummy-virt (DT)
[   17.705720] Call trace:
[   17.705913]  show_stack+0x20/0x38 (C)
[   17.706114]  dump_stack_lvl+0x8c/0xd0
[   17.706260]  print_report+0x118/0x5d0
[   17.706357]  kasan_report+0xdc/0x128
[   17.706585]  __asan_report_store1_noabort+0x20/0x30
[   17.706777]  krealloc_less_oob_helper+0xb9c/0xc50
[   17.706828]  krealloc_less_oob+0x20/0x38
[   17.707245]  kunit_try_run_case+0x170/0x3f0
[   17.707310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.707878]  kthread+0x328/0x630
[   17.708049]  ret_from_fork+0x10/0x20
[   17.708264] 
[   17.708322] Allocated by task 160:
[   17.708411]  kasan_save_stack+0x3c/0x68
[   17.708597]  kasan_save_track+0x20/0x40
[   17.708823]  kasan_save_alloc_info+0x40/0x58
[   17.708920]  __kasan_krealloc+0x118/0x178
[   17.709007]  krealloc_noprof+0x128/0x360
[   17.709063]  krealloc_less_oob_helper+0x168/0xc50
[   17.709288]  krealloc_less_oob+0x20/0x38
[   17.709562]  kunit_try_run_case+0x170/0x3f0
[   17.709703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.709800]  kthread+0x328/0x630
[   17.709903]  ret_from_fork+0x10/0x20
[   17.710119] 
[   17.710282] The buggy address belongs to the object at fff00000c1c50200
[   17.710282]  which belongs to the cache kmalloc-256 of size 256
[   17.710439] The buggy address is located 7 bytes to the right of
[   17.710439]  allocated 201-byte region [fff00000c1c50200, fff00000c1c502c9)
[   17.710555] 
[   17.710651] The buggy address belongs to the physical page:
[   17.710714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.710790] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.710972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.711031] page_type: f5(slab)
[   17.711068] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.711378] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.712028] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.712157] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.712281] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.712431] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.712524] page dumped because: kasan: bad access detected
[   17.712649] 
[   17.712732] Memory state around the buggy address:
[   17.712919]  fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.713122]  fff00000c1c50200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.713278] >fff00000c1c50280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   17.713445]                                                  ^
[   17.713506]  fff00000c1c50300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.713569]  fff00000c1c50380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.713784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   17.671070] ==================================================================
[   17.671131] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.671636] Write of size 1 at addr fff00000c1c500eb by task kunit_try_catch/158
[   17.671856] 
[   17.671949] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.672199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.672256] Hardware name: linux,dummy-virt (DT)
[   17.672386] Call trace:
[   17.672409]  show_stack+0x20/0x38 (C)
[   17.672465]  dump_stack_lvl+0x8c/0xd0
[   17.672512]  print_report+0x118/0x5d0
[   17.672605]  kasan_report+0xdc/0x128
[   17.672656]  __asan_report_store1_noabort+0x20/0x30
[   17.672705]  krealloc_more_oob_helper+0x60c/0x678
[   17.672753]  krealloc_more_oob+0x20/0x38
[   17.672804]  kunit_try_run_case+0x170/0x3f0
[   17.672868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.672934]  kthread+0x328/0x630
[   17.672979]  ret_from_fork+0x10/0x20
[   17.673038] 
[   17.673056] Allocated by task 158:
[   17.673095]  kasan_save_stack+0x3c/0x68
[   17.673142]  kasan_save_track+0x20/0x40
[   17.673188]  kasan_save_alloc_info+0x40/0x58
[   17.673283]  __kasan_krealloc+0x118/0x178
[   17.673851]  krealloc_noprof+0x128/0x360
[   17.673970]  krealloc_more_oob_helper+0x168/0x678
[   17.674039]  krealloc_more_oob+0x20/0x38
[   17.674093]  kunit_try_run_case+0x170/0x3f0
[   17.674418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.674745]  kthread+0x328/0x630
[   17.674854]  ret_from_fork+0x10/0x20
[   17.675333] 
[   17.675394] The buggy address belongs to the object at fff00000c1c50000
[   17.675394]  which belongs to the cache kmalloc-256 of size 256
[   17.675553] The buggy address is located 0 bytes to the right of
[   17.675553]  allocated 235-byte region [fff00000c1c50000, fff00000c1c500eb)
[   17.675664] 
[   17.675857] The buggy address belongs to the physical page:
[   17.676078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.676158] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.676322] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.676428] page_type: f5(slab)
[   17.676685] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.676757] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.676808] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.676939] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.677114] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.677225] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.677427] page dumped because: kasan: bad access detected
[   17.677584] 
[   17.677736] Memory state around the buggy address:
[   17.677856]  fff00000c1c4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.677922]  fff00000c1c50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.678037] >fff00000c1c50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.678134]                                                           ^
[   17.678176]  fff00000c1c50100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.678429]  fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.678572] ==================================================================
[   17.682064] ==================================================================
[   17.682406] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.682624] Write of size 1 at addr fff00000c1c500f0 by task kunit_try_catch/158
[   17.682776] 
[   17.682813] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.682893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.682919] Hardware name: linux,dummy-virt (DT)
[   17.682956] Call trace:
[   17.682976]  show_stack+0x20/0x38 (C)
[   17.683397]  dump_stack_lvl+0x8c/0xd0
[   17.683477]  print_report+0x118/0x5d0
[   17.683522]  kasan_report+0xdc/0x128
[   17.683566]  __asan_report_store1_noabort+0x20/0x30
[   17.683677]  krealloc_more_oob_helper+0x5c0/0x678
[   17.683753]  krealloc_more_oob+0x20/0x38
[   17.683797]  kunit_try_run_case+0x170/0x3f0
[   17.683903]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.683959]  kthread+0x328/0x630
[   17.684006]  ret_from_fork+0x10/0x20
[   17.684388] 
[   17.684478] Allocated by task 158:
[   17.684536]  kasan_save_stack+0x3c/0x68
[   17.684578]  kasan_save_track+0x20/0x40
[   17.684613]  kasan_save_alloc_info+0x40/0x58
[   17.684658]  __kasan_krealloc+0x118/0x178
[   17.684928]  krealloc_noprof+0x128/0x360
[   17.685165]  krealloc_more_oob_helper+0x168/0x678
[   17.685229]  krealloc_more_oob+0x20/0x38
[   17.685310]  kunit_try_run_case+0x170/0x3f0
[   17.685455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.685748]  kthread+0x328/0x630
[   17.685941]  ret_from_fork+0x10/0x20
[   17.686040] 
[   17.686098] The buggy address belongs to the object at fff00000c1c50000
[   17.686098]  which belongs to the cache kmalloc-256 of size 256
[   17.686302] The buggy address is located 5 bytes to the right of
[   17.686302]  allocated 235-byte region [fff00000c1c50000, fff00000c1c500eb)
[   17.686401] 
[   17.686421] The buggy address belongs to the physical page:
[   17.686729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c50
[   17.686926] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.686978] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.687038] page_type: f5(slab)
[   17.687128] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.687201] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.687262] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   17.687318] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.687383] head: 0bfffe0000000001 ffffc1ffc3071401 00000000ffffffff 00000000ffffffff
[   17.687460] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   17.687510] page dumped because: kasan: bad access detected
[   17.687547] 
[   17.687565] Memory state around the buggy address:
[   17.687596]  fff00000c1c4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.687646]  fff00000c1c50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.687688] >fff00000c1c50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   17.687725]                                                              ^
[   17.687765]  fff00000c1c50100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.687807]  fff00000c1c50180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.687845] ==================================================================
[   17.758923] ==================================================================
[   17.759087] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   17.759143] Write of size 1 at addr fff00000c78860f0 by task kunit_try_catch/162
[   17.759501] 
[   17.759556] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.759708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.759775] Hardware name: linux,dummy-virt (DT)
[   17.759823] Call trace:
[   17.759922]  show_stack+0x20/0x38 (C)
[   17.759976]  dump_stack_lvl+0x8c/0xd0
[   17.760022]  print_report+0x118/0x5d0
[   17.760066]  kasan_report+0xdc/0x128
[   17.760123]  __asan_report_store1_noabort+0x20/0x30
[   17.760327]  krealloc_more_oob_helper+0x5c0/0x678
[   17.760503]  krealloc_large_more_oob+0x20/0x38
[   17.760651]  kunit_try_run_case+0x170/0x3f0
[   17.760737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.760799]  kthread+0x328/0x630
[   17.760843]  ret_from_fork+0x10/0x20
[   17.760889] 
[   17.761727] The buggy address belongs to the physical page:
[   17.761825] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.761905] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.761986] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.762225] page_type: f8(unknown)
[   17.762675] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.763066] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.763132] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.763270] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.763357] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   17.763527] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.763568] page dumped because: kasan: bad access detected
[   17.763750] 
[   17.763789] Memory state around the buggy address:
[   17.763822]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.764314]  fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.764428] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.764524]                                                              ^
[   17.764675]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.764737]  fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.764831] ==================================================================
[   17.751416] ==================================================================
[   17.751860] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   17.751999] Write of size 1 at addr fff00000c78860eb by task kunit_try_catch/162
[   17.752095] 
[   17.752130] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.752370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.752592] Hardware name: linux,dummy-virt (DT)
[   17.752655] Call trace:
[   17.752747]  show_stack+0x20/0x38 (C)
[   17.752842]  dump_stack_lvl+0x8c/0xd0
[   17.752917]  print_report+0x118/0x5d0
[   17.753016]  kasan_report+0xdc/0x128
[   17.753081]  __asan_report_store1_noabort+0x20/0x30
[   17.753157]  krealloc_more_oob_helper+0x60c/0x678
[   17.753223]  krealloc_large_more_oob+0x20/0x38
[   17.753270]  kunit_try_run_case+0x170/0x3f0
[   17.753513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.753733]  kthread+0x328/0x630
[   17.753848]  ret_from_fork+0x10/0x20
[   17.753898] 
[   17.753919] The buggy address belongs to the physical page:
[   17.754079] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   17.754338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.754563] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.754754] page_type: f8(unknown)
[   17.755102] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.755314] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.755587] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.755751] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.755840] head: 0bfffe0000000002 ffffc1ffc31e2101 00000000ffffffff 00000000ffffffff
[   17.755896] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.756065] page dumped because: kasan: bad access detected
[   17.756105] 
[   17.756123] Memory state around the buggy address:
[   17.756326]  fff00000c7885f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.756378]  fff00000c7886000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.756443] >fff00000c7886080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   17.756494]                                                           ^
[   17.756551]  fff00000c7886100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.756593]  fff00000c7886180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.756631] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   17.652268] ==================================================================
[   17.652322] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   17.652721] Read of size 1 at addr fff00000c78c0000 by task kunit_try_catch/156
[   17.652784] 
[   17.652939] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.653033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.653059] Hardware name: linux,dummy-virt (DT)
[   17.653417] Call trace:
[   17.653503]  show_stack+0x20/0x38 (C)
[   17.653557]  dump_stack_lvl+0x8c/0xd0
[   17.653911]  print_report+0x118/0x5d0
[   17.654152]  kasan_report+0xdc/0x128
[   17.654484]  __asan_report_load1_noabort+0x20/0x30
[   17.654692]  page_alloc_uaf+0x328/0x350
[   17.654835]  kunit_try_run_case+0x170/0x3f0
[   17.654935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.655335]  kthread+0x328/0x630
[   17.655508]  ret_from_fork+0x10/0x20
[   17.655682] 
[   17.655740] The buggy address belongs to the physical page:
[   17.655879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078c0
[   17.656034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.656215] page_type: f0(buddy)
[   17.656465] raw: 0bfffe0000000000 fff00000ff6160f0 fff00000ff6160f0 0000000000000000
[   17.656645] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   17.656897] page dumped because: kasan: bad access detected
[   17.657636] 
[   17.657672] Memory state around the buggy address:
[   17.658061]  fff00000c78bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.658157]  fff00000c78bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.658254] >fff00000c78c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.658333]                    ^
[   17.658369]  fff00000c78c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.658423]  fff00000c78c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.659216] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   17.631803] ==================================================================
[   17.631895] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   17.632712] Free of addr fff00000c787c001 by task kunit_try_catch/152
[   17.632855] 
[   17.632890] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.633000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.633235] Hardware name: linux,dummy-virt (DT)
[   17.633414] Call trace:
[   17.633499]  show_stack+0x20/0x38 (C)
[   17.633554]  dump_stack_lvl+0x8c/0xd0
[   17.633601]  print_report+0x118/0x5d0
[   17.633644]  kasan_report_invalid_free+0xc0/0xe8
[   17.633690]  __kasan_kfree_large+0x5c/0xa8
[   17.633735]  free_large_kmalloc+0x64/0x190
[   17.634277]  kfree+0x270/0x3c8
[   17.634330]  kmalloc_large_invalid_free+0x108/0x270
[   17.634675]  kunit_try_run_case+0x170/0x3f0
[   17.634818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.634920]  kthread+0x328/0x630
[   17.635329]  ret_from_fork+0x10/0x20
[   17.635480] 
[   17.635502] The buggy address belongs to the physical page:
[   17.635704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c
[   17.635894] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.636026] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.636112] page_type: f8(unknown)
[   17.636160] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.636224] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.636274] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.636322] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.636371] head: 0bfffe0000000002 ffffc1ffc31e1f01 00000000ffffffff 00000000ffffffff
[   17.636448] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.636506] page dumped because: kasan: bad access detected
[   17.636539] 
[   17.636556] Memory state around the buggy address:
[   17.636597]  fff00000c787bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.636649]  fff00000c787bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.636691] >fff00000c787c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.636738]                    ^
[   17.636764]  fff00000c787c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.636807]  fff00000c787c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.636881] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   17.614738] ==================================================================
[   17.614996] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   17.615092] Read of size 1 at addr fff00000c787c000 by task kunit_try_catch/150
[   17.615228] 
[   17.615267] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.615351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.615663] Hardware name: linux,dummy-virt (DT)
[   17.615729] Call trace:
[   17.615835]  show_stack+0x20/0x38 (C)
[   17.615920]  dump_stack_lvl+0x8c/0xd0
[   17.616048]  print_report+0x118/0x5d0
[   17.616113]  kasan_report+0xdc/0x128
[   17.616158]  __asan_report_load1_noabort+0x20/0x30
[   17.616498]  kmalloc_large_uaf+0x2cc/0x2f8
[   17.616665]  kunit_try_run_case+0x170/0x3f0
[   17.616739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.616824]  kthread+0x328/0x630
[   17.616961]  ret_from_fork+0x10/0x20
[   17.617013] 
[   17.617035] The buggy address belongs to the physical page:
[   17.617096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787c
[   17.617150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.617662] raw: 0bfffe0000000000 ffffc1ffc31e2008 fff00000da47fe00 0000000000000000
[   17.617727] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   17.617935] page dumped because: kasan: bad access detected
[   17.618187] 
[   17.618259] Memory state around the buggy address:
[   17.618391]  fff00000c787bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.618482]  fff00000c787bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.618632] >fff00000c787c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.618733]                    ^
[   17.618761]  fff00000c787c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.618991]  fff00000c787c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   17.619132] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   17.596476] ==================================================================
[   17.596544] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   17.596598] Write of size 1 at addr fff00000c787a00a by task kunit_try_catch/148
[   17.596738] 
[   17.596776] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.596859] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.596885] Hardware name: linux,dummy-virt (DT)
[   17.596915] Call trace:
[   17.596936]  show_stack+0x20/0x38 (C)
[   17.596985]  dump_stack_lvl+0x8c/0xd0
[   17.597031]  print_report+0x118/0x5d0
[   17.597074]  kasan_report+0xdc/0x128
[   17.597116]  __asan_report_store1_noabort+0x20/0x30
[   17.597171]  kmalloc_large_oob_right+0x278/0x2b8
[   17.597800]  kunit_try_run_case+0x170/0x3f0
[   17.598122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.598344]  kthread+0x328/0x630
[   17.598728]  ret_from_fork+0x10/0x20
[   17.598789] 
[   17.599246] The buggy address belongs to the physical page:
[   17.599296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107878
[   17.599400] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.599576] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.599823] page_type: f8(unknown)
[   17.600325] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.600555] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.600658] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   17.600883] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   17.601137] head: 0bfffe0000000002 ffffc1ffc31e1e01 00000000ffffffff 00000000ffffffff
[   17.601406] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   17.601452] page dumped because: kasan: bad access detected
[   17.601646] 
[   17.601755] Memory state around the buggy address:
[   17.601911]  fff00000c7879f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.601988]  fff00000c7879f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.602052] >fff00000c787a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.602098]                       ^
[   17.602126]  fff00000c787a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.602433]  fff00000c787a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   17.602651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   17.579128] ==================================================================
[   17.579192] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   17.579352] Write of size 1 at addr fff00000c665df00 by task kunit_try_catch/146
[   17.579437] 
[   17.579485] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.579629] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.579654] Hardware name: linux,dummy-virt (DT)
[   17.579683] Call trace:
[   17.580031]  show_stack+0x20/0x38 (C)
[   17.580100]  dump_stack_lvl+0x8c/0xd0
[   17.580187]  print_report+0x118/0x5d0
[   17.580259]  kasan_report+0xdc/0x128
[   17.580302]  __asan_report_store1_noabort+0x20/0x30
[   17.580411]  kmalloc_big_oob_right+0x2a4/0x2f0
[   17.580478]  kunit_try_run_case+0x170/0x3f0
[   17.580671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.580732]  kthread+0x328/0x630
[   17.580777]  ret_from_fork+0x10/0x20
[   17.580823] 
[   17.580841] Allocated by task 146:
[   17.580867]  kasan_save_stack+0x3c/0x68
[   17.580905]  kasan_save_track+0x20/0x40
[   17.580939]  kasan_save_alloc_info+0x40/0x58
[   17.580976]  __kasan_kmalloc+0xd4/0xd8
[   17.581010]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.581047]  kmalloc_big_oob_right+0xb8/0x2f0
[   17.581470]  kunit_try_run_case+0x170/0x3f0
[   17.581582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.581799]  kthread+0x328/0x630
[   17.581882]  ret_from_fork+0x10/0x20
[   17.582263] 
[   17.582356] The buggy address belongs to the object at fff00000c665c000
[   17.582356]  which belongs to the cache kmalloc-8k of size 8192
[   17.582486] The buggy address is located 0 bytes to the right of
[   17.582486]  allocated 7936-byte region [fff00000c665c000, fff00000c665df00)
[   17.582660] 
[   17.582720] The buggy address belongs to the physical page:
[   17.582863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106658
[   17.582951] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.582998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.583325] page_type: f5(slab)
[   17.583409] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.583512] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.583574] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   17.583624] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   17.583682] head: 0bfffe0000000003 ffffc1ffc3199601 00000000ffffffff 00000000ffffffff
[   17.583745] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.583796] page dumped because: kasan: bad access detected
[   17.583835] 
[   17.583853] Memory state around the buggy address:
[   17.583889]  fff00000c665de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.583953]  fff00000c665de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.583996] >fff00000c665df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.584034]                    ^
[   17.584061]  fff00000c665df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.584103]  fff00000c665e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.584141] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   17.555782] ==================================================================
[   17.556293] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   17.556363] Write of size 1 at addr fff00000c47f9b78 by task kunit_try_catch/144
[   17.556658] 
[   17.556801] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.556890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.556916] Hardware name: linux,dummy-virt (DT)
[   17.556945] Call trace:
[   17.557097]  show_stack+0x20/0x38 (C)
[   17.557278]  dump_stack_lvl+0x8c/0xd0
[   17.557636]  print_report+0x118/0x5d0
[   17.557767]  kasan_report+0xdc/0x128
[   17.557816]  __asan_report_store1_noabort+0x20/0x30
[   17.557867]  kmalloc_track_caller_oob_right+0x40c/0x488
[   17.558294]  kunit_try_run_case+0x170/0x3f0
[   17.558402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.558654]  kthread+0x328/0x630
[   17.558819]  ret_from_fork+0x10/0x20
[   17.558873] 
[   17.558991] Allocated by task 144:
[   17.559123]  kasan_save_stack+0x3c/0x68
[   17.559307]  kasan_save_track+0x20/0x40
[   17.559349]  kasan_save_alloc_info+0x40/0x58
[   17.559749]  __kasan_kmalloc+0xd4/0xd8
[   17.559795]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.559841]  kmalloc_track_caller_oob_right+0xa8/0x488
[   17.559888]  kunit_try_run_case+0x170/0x3f0
[   17.559928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.559998]  kthread+0x328/0x630
[   17.560042]  ret_from_fork+0x10/0x20
[   17.560087] 
[   17.560105] The buggy address belongs to the object at fff00000c47f9b00
[   17.560105]  which belongs to the cache kmalloc-128 of size 128
[   17.560164] The buggy address is located 0 bytes to the right of
[   17.560164]  allocated 120-byte region [fff00000c47f9b00, fff00000c47f9b78)
[   17.560251] 
[   17.560270] The buggy address belongs to the physical page:
[   17.560300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9
[   17.560354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.560404] page_type: f5(slab)
[   17.560440] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.560501] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.560542] page dumped because: kasan: bad access detected
[   17.560582] 
[   17.560599] Memory state around the buggy address:
[   17.560629]  fff00000c47f9a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.560681]  fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.560722] >fff00000c47f9b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.560760]                                                                 ^
[   17.560799]  fff00000c47f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.560843]  fff00000c47f9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.560881] ==================================================================
[   17.562834] ==================================================================
[   17.563465] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   17.563529] Write of size 1 at addr fff00000c47f9c78 by task kunit_try_catch/144
[   17.563579] 
[   17.563608] CPU: 0 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.563688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.563714] Hardware name: linux,dummy-virt (DT)
[   17.564026] Call trace:
[   17.564184]  show_stack+0x20/0x38 (C)
[   17.564259]  dump_stack_lvl+0x8c/0xd0
[   17.564504]  print_report+0x118/0x5d0
[   17.564580]  kasan_report+0xdc/0x128
[   17.564919]  __asan_report_store1_noabort+0x20/0x30
[   17.564981]  kmalloc_track_caller_oob_right+0x418/0x488
[   17.565070]  kunit_try_run_case+0x170/0x3f0
[   17.565121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.565421]  kthread+0x328/0x630
[   17.565582]  ret_from_fork+0x10/0x20
[   17.565785] 
[   17.566050] Allocated by task 144:
[   17.566129]  kasan_save_stack+0x3c/0x68
[   17.566311]  kasan_save_track+0x20/0x40
[   17.566377]  kasan_save_alloc_info+0x40/0x58
[   17.566415]  __kasan_kmalloc+0xd4/0xd8
[   17.566740]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.566826]  kmalloc_track_caller_oob_right+0x184/0x488
[   17.566956]  kunit_try_run_case+0x170/0x3f0
[   17.567039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.567094]  kthread+0x328/0x630
[   17.567265]  ret_from_fork+0x10/0x20
[   17.567419] 
[   17.567533] The buggy address belongs to the object at fff00000c47f9c00
[   17.567533]  which belongs to the cache kmalloc-128 of size 128
[   17.567786] The buggy address is located 0 bytes to the right of
[   17.567786]  allocated 120-byte region [fff00000c47f9c00, fff00000c47f9c78)
[   17.567976] 
[   17.567999] The buggy address belongs to the physical page:
[   17.568177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9
[   17.568249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.568783] page_type: f5(slab)
[   17.568932] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.569004] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.569228] page dumped because: kasan: bad access detected
[   17.569393] 
[   17.569488] Memory state around the buggy address:
[   17.569570]  fff00000c47f9b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.569734]  fff00000c47f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.569782] >fff00000c47f9c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   17.569820]                                                                 ^
[   17.569868]  fff00000c47f9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.569910]  fff00000c47f9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.570199] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   17.533187] ==================================================================
[   17.533269] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   17.533320] Read of size 1 at addr fff00000c7891000 by task kunit_try_catch/142
[   17.533796] 
[   17.534256] CPU: 0 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.534352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.534562] Hardware name: linux,dummy-virt (DT)
[   17.534645] Call trace:
[   17.534938]  show_stack+0x20/0x38 (C)
[   17.535285]  dump_stack_lvl+0x8c/0xd0
[   17.535847]  print_report+0x118/0x5d0
[   17.535950]  kasan_report+0xdc/0x128
[   17.536041]  __asan_report_load1_noabort+0x20/0x30
[   17.536374]  kmalloc_node_oob_right+0x2f4/0x330
[   17.536558]  kunit_try_run_case+0x170/0x3f0
[   17.536643]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.536779]  kthread+0x328/0x630
[   17.536892]  ret_from_fork+0x10/0x20
[   17.537213] 
[   17.537366] Allocated by task 142:
[   17.537418]  kasan_save_stack+0x3c/0x68
[   17.537531]  kasan_save_track+0x20/0x40
[   17.537618]  kasan_save_alloc_info+0x40/0x58
[   17.537724]  __kasan_kmalloc+0xd4/0xd8
[   17.537872]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   17.538125]  kmalloc_node_oob_right+0xbc/0x330
[   17.538269]  kunit_try_run_case+0x170/0x3f0
[   17.538371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.538587]  kthread+0x328/0x630
[   17.538817]  ret_from_fork+0x10/0x20
[   17.539060] 
[   17.539190] The buggy address belongs to the object at fff00000c7890000
[   17.539190]  which belongs to the cache kmalloc-4k of size 4096
[   17.539328] The buggy address is located 0 bytes to the right of
[   17.539328]  allocated 4096-byte region [fff00000c7890000, fff00000c7891000)
[   17.539505] 
[   17.539529] The buggy address belongs to the physical page:
[   17.539970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107890
[   17.540502] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   17.540577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   17.541021] page_type: f5(slab)
[   17.541146] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.541241] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.541390] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   17.541463] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   17.541659] head: 0bfffe0000000003 ffffc1ffc31e2401 00000000ffffffff 00000000ffffffff
[   17.541724] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   17.542234] page dumped because: kasan: bad access detected
[   17.542371] 
[   17.542435] Memory state around the buggy address:
[   17.542504]  fff00000c7890f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.542661]  fff00000c7890f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.542725] >fff00000c7891000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.542774]                    ^
[   17.542887]  fff00000c7891080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.542950]  fff00000c7891100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.543152] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   17.515300] ==================================================================
[   17.515389] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   17.515854] Read of size 1 at addr fff00000c45d8abf by task kunit_try_catch/140
[   17.515925] 
[   17.516019] CPU: 0 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.516099] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.516136] Hardware name: linux,dummy-virt (DT)
[   17.516168] Call trace:
[   17.516197]  show_stack+0x20/0x38 (C)
[   17.516266]  dump_stack_lvl+0x8c/0xd0
[   17.516313]  print_report+0x118/0x5d0
[   17.516357]  kasan_report+0xdc/0x128
[   17.516400]  __asan_report_load1_noabort+0x20/0x30
[   17.516449]  kmalloc_oob_left+0x2ec/0x320
[   17.516495]  kunit_try_run_case+0x170/0x3f0
[   17.516541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.516595]  kthread+0x328/0x630
[   17.516652]  ret_from_fork+0x10/0x20
[   17.516708] 
[   17.516726] Allocated by task 26:
[   17.516753]  kasan_save_stack+0x3c/0x68
[   17.516791]  kasan_save_track+0x20/0x40
[   17.516826]  kasan_save_alloc_info+0x40/0x58
[   17.516863]  __kasan_kmalloc+0xd4/0xd8
[   17.516896]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   17.516938]  kstrdup+0x54/0xc8
[   17.516983]  devtmpfs_work_loop+0x6f8/0xa58
[   17.517025]  devtmpfsd+0x50/0x58
[   17.517059]  kthread+0x328/0x630
[   17.517102]  ret_from_fork+0x10/0x20
[   17.517136] 
[   17.517178] Freed by task 26:
[   17.517233]  kasan_save_stack+0x3c/0x68
[   17.517272]  kasan_save_track+0x20/0x40
[   17.517307]  kasan_save_free_info+0x4c/0x78
[   17.517924]  __kasan_slab_free+0x6c/0x98
[   17.518006]  kfree+0x214/0x3c8
[   17.518062]  devtmpfs_work_loop+0x804/0xa58
[   17.518195]  devtmpfsd+0x50/0x58
[   17.518326]  kthread+0x328/0x630
[   17.518555]  ret_from_fork+0x10/0x20
[   17.518970] 
[   17.519071] The buggy address belongs to the object at fff00000c45d8aa0
[   17.519071]  which belongs to the cache kmalloc-16 of size 16
[   17.519332] The buggy address is located 15 bytes to the right of
[   17.519332]  allocated 16-byte region [fff00000c45d8aa0, fff00000c45d8ab0)
[   17.519616] 
[   17.519718] The buggy address belongs to the physical page:
[   17.519869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d8
[   17.520020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.520070] page_type: f5(slab)
[   17.520108] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   17.520629] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   17.520728] page dumped because: kasan: bad access detected
[   17.520803] 
[   17.520863] Memory state around the buggy address:
[   17.521233]  fff00000c45d8980: 00 05 fc fc fa fb fc fc fa fb fc fc 00 02 fc fc
[   17.521573]  fff00000c45d8a00: fa fb fc fc fa fb fc fc 00 01 fc fc fa fb fc fc
[   17.521631] >fff00000c45d8a80: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   17.521705]                                         ^
[   17.521765]  fff00000c45d8b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.521872]  fff00000c45d8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.521911] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   17.495867] ==================================================================
[   17.495919] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   17.496036] Read of size 1 at addr fff00000c47f9a80 by task kunit_try_catch/138
[   17.496090] 
[   17.496119] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.496198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.496243] Hardware name: linux,dummy-virt (DT)
[   17.496375] Call trace:
[   17.496400]  show_stack+0x20/0x38 (C)
[   17.496485]  dump_stack_lvl+0x8c/0xd0
[   17.496762]  print_report+0x118/0x5d0
[   17.496948]  kasan_report+0xdc/0x128
[   17.496993]  __asan_report_load1_noabort+0x20/0x30
[   17.497157]  kmalloc_oob_right+0x5d0/0x660
[   17.497228]  kunit_try_run_case+0x170/0x3f0
[   17.497275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.497565]  kthread+0x328/0x630
[   17.497903]  ret_from_fork+0x10/0x20
[   17.498022] 
[   17.498057] Allocated by task 138:
[   17.498084]  kasan_save_stack+0x3c/0x68
[   17.498124]  kasan_save_track+0x20/0x40
[   17.498160]  kasan_save_alloc_info+0x40/0x58
[   17.498198]  __kasan_kmalloc+0xd4/0xd8
[   17.498243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.498291]  kmalloc_oob_right+0xb0/0x660
[   17.498331]  kunit_try_run_case+0x170/0x3f0
[   17.498368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.498420]  kthread+0x328/0x630
[   17.498463]  ret_from_fork+0x10/0x20
[   17.498505] 
[   17.498535] The buggy address belongs to the object at fff00000c47f9a00
[   17.498535]  which belongs to the cache kmalloc-128 of size 128
[   17.498594] The buggy address is located 13 bytes to the right of
[   17.498594]  allocated 115-byte region [fff00000c47f9a00, fff00000c47f9a73)
[   17.498667] 
[   17.498687] The buggy address belongs to the physical page:
[   17.498717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9
[   17.498768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.498825] page_type: f5(slab)
[   17.498870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.498921] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.498961] page dumped because: kasan: bad access detected
[   17.498991] 
[   17.499014] Memory state around the buggy address:
[   17.499053]  fff00000c47f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.499103]  fff00000c47f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.499155] >fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.499192]                    ^
[   17.499237]  fff00000c47f9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.499286]  fff00000c47f9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.499333] ==================================================================
[   17.488487] ==================================================================
[   17.488528] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   17.488575] Write of size 1 at addr fff00000c47f9a78 by task kunit_try_catch/138
[   17.488624] 
[   17.488652] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   17.488731] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.488771] Hardware name: linux,dummy-virt (DT)
[   17.488801] Call trace:
[   17.488821]  show_stack+0x20/0x38 (C)
[   17.488867]  dump_stack_lvl+0x8c/0xd0
[   17.488923]  print_report+0x118/0x5d0
[   17.488968]  kasan_report+0xdc/0x128
[   17.489029]  __asan_report_store1_noabort+0x20/0x30
[   17.489095]  kmalloc_oob_right+0x538/0x660
[   17.489313]  kunit_try_run_case+0x170/0x3f0
[   17.489421]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.489505]  kthread+0x328/0x630
[   17.489902]  ret_from_fork+0x10/0x20
[   17.489961] 
[   17.489979] Allocated by task 138:
[   17.490005]  kasan_save_stack+0x3c/0x68
[   17.490052]  kasan_save_track+0x20/0x40
[   17.490358]  kasan_save_alloc_info+0x40/0x58
[   17.490437]  __kasan_kmalloc+0xd4/0xd8
[   17.490473]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.491361]  kmalloc_oob_right+0xb0/0x660
[   17.491694]  kunit_try_run_case+0x170/0x3f0
[   17.491745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.492037]  kthread+0x328/0x630
[   17.492131]  ret_from_fork+0x10/0x20
[   17.492233] 
[   17.492310] The buggy address belongs to the object at fff00000c47f9a00
[   17.492310]  which belongs to the cache kmalloc-128 of size 128
[   17.492413] The buggy address is located 5 bytes to the right of
[   17.492413]  allocated 115-byte region [fff00000c47f9a00, fff00000c47f9a73)
[   17.492796] 
[   17.493055] The buggy address belongs to the physical page:
[   17.493111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9
[   17.493234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.493285] page_type: f5(slab)
[   17.493370] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.493421] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.493462] page dumped because: kasan: bad access detected
[   17.493492] 
[   17.493510] Memory state around the buggy address:
[   17.493540]  fff00000c47f9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.493916]  fff00000c47f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.494014] >fff00000c47f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.494189]                                                                 ^
[   17.494257]  fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.494302]  fff00000c47f9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.494350] ==================================================================
[   17.480004] ==================================================================
[   17.480380] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   17.481194] Write of size 1 at addr fff00000c47f9a73 by task kunit_try_catch/138
[   17.481318] 
[   17.482232] CPU: 0 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G                 N  6.15.7-rc1 #1 PREEMPT 
[   17.482376] Tainted: [N]=TEST
[   17.482408] Hardware name: linux,dummy-virt (DT)
[   17.482620] Call trace:
[   17.482785]  show_stack+0x20/0x38 (C)
[   17.482915]  dump_stack_lvl+0x8c/0xd0
[   17.482978]  print_report+0x118/0x5d0
[   17.483031]  kasan_report+0xdc/0x128
[   17.483077]  __asan_report_store1_noabort+0x20/0x30
[   17.483128]  kmalloc_oob_right+0x5a4/0x660
[   17.483176]  kunit_try_run_case+0x170/0x3f0
[   17.483239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.483293]  kthread+0x328/0x630
[   17.483340]  ret_from_fork+0x10/0x20
[   17.483493] 
[   17.483531] Allocated by task 138:
[   17.483639]  kasan_save_stack+0x3c/0x68
[   17.483702]  kasan_save_track+0x20/0x40
[   17.483739]  kasan_save_alloc_info+0x40/0x58
[   17.483777]  __kasan_kmalloc+0xd4/0xd8
[   17.483811]  __kmalloc_cache_noprof+0x16c/0x3c0
[   17.483849]  kmalloc_oob_right+0xb0/0x660
[   17.483887]  kunit_try_run_case+0x170/0x3f0
[   17.483925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.483968]  kthread+0x328/0x630
[   17.484003]  ret_from_fork+0x10/0x20
[   17.484054] 
[   17.484110] The buggy address belongs to the object at fff00000c47f9a00
[   17.484110]  which belongs to the cache kmalloc-128 of size 128
[   17.484217] The buggy address is located 0 bytes to the right of
[   17.484217]  allocated 115-byte region [fff00000c47f9a00, fff00000c47f9a73)
[   17.484286] 
[   17.484368] The buggy address belongs to the physical page:
[   17.484537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1047f9
[   17.484796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.485076] page_type: f5(slab)
[   17.485385] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   17.485454] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   17.485562] page dumped because: kasan: bad access detected
[   17.485602] 
[   17.485627] Memory state around the buggy address:
[   17.485838]  fff00000c47f9900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.485904]  fff00000c47f9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.485958] >fff00000c47f9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   17.486011]                                                              ^
[   17.486091]  fff00000c47f9a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.486133]  fff00000c47f9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.486196] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   95.881690] WARNING: CPU: 1 PID: 658 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   95.884082] Modules linked in:
[   95.884786] CPU: 1 UID: 0 PID: 658 Comm: kunit_try_catch Tainted: G    B D W        N  6.15.7-rc1 #1 PREEMPT 
[   95.886267] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   95.886751] Hardware name: linux,dummy-virt (DT)
[   95.886968] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.887306] pc : intlog10+0x38/0x48
[   95.887696] lr : intlog10_test+0xe4/0x200
[   95.888112] sp : ffff800082027c10
[   95.888467] x29: ffff800082027c90 x28: 0000000000000000 x27: 0000000000000000
[   95.889240] x26: 1ffe00001959cac1 x25: 0000000000000000 x24: ffff800082027ce0
[   95.890093] x23: ffff800082027d00 x22: 0000000000000000 x21: 1ffff00010404f82
[   95.890595] x20: ffff977f45e35200 x19: ffff800080087990 x18: 000000003078a39f
[   95.890934] x17: 0000000000000001 x16: fff00000c096e03c x15: fff00000ff616b08
[   95.891284] x14: 00000000f1f1f1f1 x13: 1ffe00001b48f81d x12: ffff72efe9379b71
[   95.891685] x11: 1ffff2efe9379b70 x10: ffff72efe9379b70 x9 : ffff977f434159e4
[   95.892063] x8 : ffff977f49bcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.892477] x5 : ffff700010404f82 x4 : 1ffff00010010f3a x3 : 1ffff2efe8bc6a40
[   95.892864] x2 : 1ffff2efe8bc6a40 x1 : 0000000000000003 x0 : 0000000000000000
[   95.893309] Call trace:
[   95.893484]  intlog10+0x38/0x48 (P)
[   95.893735]  kunit_try_run_case+0x170/0x3f0
[   95.894018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.894364]  kthread+0x328/0x630
[   95.894601]  ret_from_fork+0x10/0x20
[   95.894824] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   95.833849] WARNING: CPU: 0 PID: 640 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   95.836595] Modules linked in:
[   95.837175] CPU: 0 UID: 0 PID: 640 Comm: kunit_try_catch Tainted: G    B D          N  6.15.7-rc1 #1 PREEMPT 
[   95.838188] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   95.838417] Hardware name: linux,dummy-virt (DT)
[   95.838817] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.839752] pc : intlog2+0xd8/0xf8
[   95.840199] lr : intlog2_test+0xe4/0x200
[   95.840818] sp : ffff800080fc7c10
[   95.841222] x29: ffff800080fc7c90 x28: 0000000000000000 x27: 0000000000000000
[   95.842105] x26: 1ffe000018b3a6a1 x25: 0000000000000000 x24: ffff800080fc7ce0
[   95.842910] x23: ffff800080fc7d00 x22: 0000000000000000 x21: 1ffff000101f8f82
[   95.843797] x20: ffff977f45e35100 x19: ffff800080087990 x18: 00000000349b827c
[   95.844711] x17: 00000000c7bff53d x16: fff00000c096dc3c x15: 00000000386ef94e
[   95.845535] x14: 00000000f1f1f1f1 x13: 1ffe00001b493c1d x12: ffff72efe9379b71
[   95.846193] x11: 1ffff2efe9379b70 x10: ffff72efe9379b70 x9 : ffff977f43415be4
[   95.846557] x8 : ffff977f49bcdb83 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.846904] x5 : ffff7000101f8f82 x4 : 1ffff00010010f3a x3 : 1ffff2efe8bc6a20
[   95.847317] x2 : 1ffff2efe8bc6a20 x1 : 0000000000000003 x0 : 0000000000000000
[   95.848034] Call trace:
[   95.848325]  intlog2+0xd8/0xf8 (P)
[   95.848710]  kunit_try_run_case+0x170/0x3f0
[   95.849152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.849770]  kthread+0x328/0x630
[   95.850201]  ret_from_fork+0x10/0x20
[   95.850649] ---[ end trace 0000000000000000 ]---
[   94.967157] Internal error: Oops: 0000000096000005 [#1]  SMP
[   94.972870] Modules linked in:
[   94.973990] CPU: 0 UID: 0 PID: 534 Comm: kunit_try_catch Tainted: G    B            N  6.15.7-rc1 #1 PREEMPT 
[   94.974527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   94.974914] Hardware name: linux,dummy-virt (DT)
[   94.975560] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.975998] pc : kunit_test_null_dereference+0x70/0x170
[   94.976477] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.976795] sp : ffff800080df7d30
[   94.977418] x29: ffff800080df7d90 x28: 0000000000000000 x27: 0000000000000000
[   94.978433] x26: 1ffe0000190fca21 x25: 0000000000000000 x24: 0000000000000004
[   94.979362] x23: fff00000c87e510c x22: ffff977f43402fc0 x21: fff00000c8d1ce08
[   94.980253] x20: 1ffff000101befa6 x19: ffff800080087990 x18: 000000007bb5833d
[   94.980879] x17: 0000000000000001 x16: fff00000c096dc3c x15: fff00000ff616b08
[   94.981232] x14: 00000000f1f1f1f1 x13: 1ffe00001b493c1d x12: fffd800019742b3c
[   94.981917] x11: 1ffe000019742b3b x10: fffd800019742b3b x9 : ffff977f433fa428
[   94.982424] x8 : ffff800080df7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   94.982897] x5 : ffff7000101befa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   94.983371] x2 : dfff800000000000 x1 : fff00000cba15100 x0 : ffff800080087990
[   94.983877] Call trace:
[   94.984110]  kunit_test_null_dereference+0x70/0x170 (P)
[   94.984475]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.984828]  kthread+0x328/0x630
[   94.985084]  ret_from_fork+0x10/0x20
[   94.985676] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   94.986487] ---[ end trace 0000000000000000 ]---