Hay
Date
July 18, 2025, 2:09 p.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   19.359992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   19.398932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   19.235022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   19.220250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   19.086890] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
[   19.139584] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   19.035362] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[   94.073526] Internal error: Oops: 0000000096000005 [#1]  SMP
[   94.079733] Modules linked in:
[   94.081530] CPU: 1 UID: 0 PID: 532 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   94.082717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   94.083079] Hardware name: linux,dummy-virt (DT)
[   94.083383] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.083707] pc : kunit_test_null_dereference+0x70/0x170
[   94.083978] lr : kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.084235] sp : ffff800082097d30
[   94.084714] x29: ffff800082097d90 x28: 0000000000000000 x27: 0000000000000000
[   94.085611] x26: 1ffe000018b6fd81 x25: 0000000000000000 x24: 0000000000000004
[   94.086463] x23: fff00000c5b7ec0c x22: ffffaeee56222478 x21: fff00000c1b5ae08
[   94.087203] x20: 1ffff00010412fa6 x19: ffff800080087990 x18: 00000000cf21e6c3
[   94.088092] x17: 0000000000000001 x16: fff00000da475d28 x15: fff00000ff616b08
[   94.089054] x14: 0000000000018fff x13: fff00000cb87bcc8 x12: fffd80001970f8b4
[   94.089916] x11: 1ffe00001970f8b3 x10: fffd80001970f8b3 x9 : ffffaeee562198e0
[   94.090953] x8 : ffff800082097c18 x7 : 0000000000000001 x6 : 0000000041b58ab3
[   94.091715] x5 : ffff700010412fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   94.092476] x2 : dfff800000000000 x1 : fff00000cb87bcc0 x0 : ffff800080087990
[   94.093406] Call trace:
[   94.093781]  kunit_test_null_dereference+0x70/0x170 (P)
[   94.094366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.094730]  kthread+0x328/0x630
[   94.094915]  ret_from_fork+0x10/0x20
[   94.095406] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   94.096019] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[   50.077728] ==================================================================
[   50.077828] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830
[   50.077828] 
[   50.077930] Use-after-free read at 0x000000006405bb58 (in kfence-#150):
[   50.077982]  test_krealloc+0x51c/0x830
[   50.078030]  kunit_try_run_case+0x170/0x3f0
[   50.078077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.078121]  kthread+0x328/0x630
[   50.078161]  ret_from_fork+0x10/0x20
[   50.078202] 
[   50.078226] kfence-#150: 0x000000006405bb58-0x0000000037df8b7b, size=32, cache=kmalloc-32
[   50.078226] 
[   50.078280] allocated by task 337 on cpu 1 at 50.077044s (0.001232s ago):
[   50.078366]  test_alloc+0x29c/0x628
[   50.078409]  test_krealloc+0xc0/0x830
[   50.078447]  kunit_try_run_case+0x170/0x3f0
[   50.078485]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.078529]  kthread+0x328/0x630
[   50.078566]  ret_from_fork+0x10/0x20
[   50.078606] 
[   50.078631] freed by task 337 on cpu 1 at 50.077291s (0.001336s ago):
[   50.078693]  krealloc_noprof+0x148/0x360
[   50.078733]  test_krealloc+0x1dc/0x830
[   50.078773]  kunit_try_run_case+0x170/0x3f0
[   50.078811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.078855]  kthread+0x328/0x630
[   50.078890]  ret_from_fork+0x10/0x20
[   50.078930] 
[   50.078978] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   50.079057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.079088] Hardware name: linux,dummy-virt (DT)
[   50.079124] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[   49.901030] ==================================================================
[   49.901137] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560
[   49.901137] 
[   49.901239] Use-after-free read at 0x000000003b78985d (in kfence-#148):
[   49.901295]  test_memcache_typesafe_by_rcu+0x280/0x560
[   49.901364]  kunit_try_run_case+0x170/0x3f0
[   49.901413]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.901458]  kthread+0x328/0x630
[   49.901498]  ret_from_fork+0x10/0x20
[   49.901539] 
[   49.901565] kfence-#148: 0x000000003b78985d-0x000000004312cc97, size=32, cache=test
[   49.901565] 
[   49.901619] allocated by task 335 on cpu 0 at 49.868984s (0.032630s ago):
[   49.901688]  test_alloc+0x230/0x628
[   49.901729]  test_memcache_typesafe_by_rcu+0x15c/0x560
[   49.901774]  kunit_try_run_case+0x170/0x3f0
[   49.901812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.901856]  kthread+0x328/0x630
[   49.901891]  ret_from_fork+0x10/0x20
[   49.901930] 
[   49.901953] freed by task 335 on cpu 0 at 49.869103s (0.032846s ago):
[   49.902011]  test_memcache_typesafe_by_rcu+0x1a8/0x560
[   49.902055]  kunit_try_run_case+0x170/0x3f0
[   49.902093]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.902136]  kthread+0x328/0x630
[   49.902172]  ret_from_fork+0x10/0x20
[   49.902213] 
[   49.902259] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   49.902348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.902378] Hardware name: linux,dummy-virt (DT)
[   49.902413] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[   27.113374] ==================================================================
[   27.113530] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0
[   27.113530] 
[   27.113669] Invalid read at 0x0000000025e0d646:
[   27.113882]  test_invalid_access+0xdc/0x1f0
[   27.113964]  kunit_try_run_case+0x170/0x3f0
[   27.114027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.114078]  kthread+0x328/0x630
[   27.114121]  ret_from_fork+0x10/0x20
[   27.114238] 
[   27.114297] CPU: 0 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   27.114398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.114678] Hardware name: linux,dummy-virt (DT)
[   27.114787] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[   26.885269] ==================================================================
[   26.885390] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0
[   26.885390] 
[   26.885459] Corrupted memory at 0x000000005fe0eed8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#144):
[   26.885775]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   26.885825]  kunit_try_run_case+0x170/0x3f0
[   26.885868]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.885913]  kthread+0x328/0x630
[   26.885951]  ret_from_fork+0x10/0x20
[   26.885992] 
[   26.886016] kfence-#144: 0x000000009cd5b11a-0x0000000055dd6b87, size=73, cache=kmalloc-96
[   26.886016] 
[   26.886071] allocated by task 325 on cpu 1 at 26.885012s (0.001055s ago):
[   26.886135]  test_alloc+0x29c/0x628
[   26.886174]  test_kmalloc_aligned_oob_write+0xbc/0x2c0
[   26.886217]  kunit_try_run_case+0x170/0x3f0
[   26.886258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.886299]  kthread+0x328/0x630
[   26.886347]  ret_from_fork+0x10/0x20
[   26.886387] 
[   26.886412] freed by task 325 on cpu 1 at 26.885167s (0.001241s ago):
[   26.886473]  test_kmalloc_aligned_oob_write+0x214/0x2c0
[   26.886515]  kunit_try_run_case+0x170/0x3f0
[   26.886555]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.886599]  kthread+0x328/0x630
[   26.886634]  ret_from_fork+0x10/0x20
[   26.886675] 
[   26.886719] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   26.886796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.886826] Hardware name: linux,dummy-virt (DT)
[   26.886860] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[   26.469202] ==================================================================
[   26.469308] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468
[   26.469308] 
[   26.469428] Out-of-bounds read at 0x00000000d9d904b4 (105B right of kfence-#140):
[   26.469491]  test_kmalloc_aligned_oob_read+0x238/0x468
[   26.469541]  kunit_try_run_case+0x170/0x3f0
[   26.469586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.469631]  kthread+0x328/0x630
[   26.469671]  ret_from_fork+0x10/0x20
[   26.469712] 
[   26.469737] kfence-#140: 0x0000000076aecff8-0x0000000011433b06, size=73, cache=kmalloc-96
[   26.469737] 
[   26.469790] allocated by task 323 on cpu 1 at 26.468929s (0.000857s ago):
[   26.469861]  test_alloc+0x29c/0x628
[   26.469900]  test_kmalloc_aligned_oob_read+0x100/0x468
[   26.469944]  kunit_try_run_case+0x170/0x3f0
[   26.469985]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.470027]  kthread+0x328/0x630
[   26.470064]  ret_from_fork+0x10/0x20
[   26.470104] 
[   26.470151] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   26.470231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.470260] Hardware name: linux,dummy-virt (DT)
[   26.470296] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[   22.413186] ==================================================================
[   22.413286] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378
[   22.413286] 
[   22.413361] Corrupted memory at 0x0000000094f4885a [ ! ] (in kfence-#101):
[   22.413486]  test_corruption+0x1d8/0x378
[   22.413535]  kunit_try_run_case+0x170/0x3f0
[   22.413579]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.413623]  kthread+0x328/0x630
[   22.413661]  ret_from_fork+0x10/0x20
[   22.413702] 
[   22.413726] kfence-#101: 0x0000000068f447da-0x0000000087a651fa, size=32, cache=test
[   22.413726] 
[   22.413781] allocated by task 313 on cpu 0 at 22.413040s (0.000738s ago):
[   22.413844]  test_alloc+0x230/0x628
[   22.413887]  test_corruption+0x198/0x378
[   22.413925]  kunit_try_run_case+0x170/0x3f0
[   22.413965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.414007]  kthread+0x328/0x630
[   22.414041]  ret_from_fork+0x10/0x20
[   22.414080] 
[   22.414103] freed by task 313 on cpu 0 at 22.413099s (0.001000s ago):
[   22.414163]  test_corruption+0x1d8/0x378
[   22.414202]  kunit_try_run_case+0x170/0x3f0
[   22.414241]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.414282]  kthread+0x328/0x630
[   22.414327]  ret_from_fork+0x10/0x20
[   22.414364] 
[   22.414407] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   22.414484] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.414512] Hardware name: linux,dummy-virt (DT)
[   22.414546] ==================================================================
[   21.582609] ==================================================================
[   21.582706] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378
[   21.582706] 
[   21.582769] Corrupted memory at 0x000000008d68f499 [ ! . . . . . . . . . . . . . . . ] (in kfence-#93):
[   21.586652]  test_corruption+0x278/0x378
[   21.586734]  kunit_try_run_case+0x170/0x3f0
[   21.586785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.586830]  kthread+0x328/0x630
[   21.586877]  ret_from_fork+0x10/0x20
[   21.586930] 
[   21.586971] kfence-#93: 0x00000000d37f787b-0x00000000341b2e1d, size=32, cache=kmalloc-32
[   21.586971] 
[   21.587077] allocated by task 311 on cpu 0 at 21.582302s (0.004759s ago):
[   21.587156]  test_alloc+0x29c/0x628
[   21.587206]  test_corruption+0xdc/0x378
[   21.587257]  kunit_try_run_case+0x170/0x3f0
[   21.587313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.587375]  kthread+0x328/0x630
[   21.587419]  ret_from_fork+0x10/0x20
[   21.587467] 
[   21.587506] freed by task 311 on cpu 0 at 21.582429s (0.005065s ago):
[   21.587577]  test_corruption+0x278/0x378
[   21.587617]  kunit_try_run_case+0x170/0x3f0
[   21.587666]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.587725]  kthread+0x328/0x630
[   21.587780]  ret_from_fork+0x10/0x20
[   21.587819] 
[   21.587883] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   21.587989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.588034] Hardware name: linux,dummy-virt (DT)
[   21.588100] ==================================================================
[   21.997278] ==================================================================
[   21.997395] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378
[   21.997395] 
[   21.997459] Corrupted memory at 0x000000002aa9d90b [ ! ] (in kfence-#97):
[   21.997588]  test_corruption+0x284/0x378
[   21.997635]  kunit_try_run_case+0x170/0x3f0
[   21.997677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.997722]  kthread+0x328/0x630
[   21.997759]  ret_from_fork+0x10/0x20
[   21.997798] 
[   21.997822] kfence-#97: 0x00000000c7c33a76-0x0000000095f27c5c, size=32, cache=kmalloc-32
[   21.997822] 
[   21.997876] allocated by task 311 on cpu 0 at 21.996992s (0.000881s ago):
[   21.997939]  test_alloc+0x29c/0x628
[   21.997978]  test_corruption+0x198/0x378
[   21.998016]  kunit_try_run_case+0x170/0x3f0
[   21.998055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.998098]  kthread+0x328/0x630
[   21.998132]  ret_from_fork+0x10/0x20
[   21.998172] 
[   21.998194] freed by task 311 on cpu 0 at 21.997102s (0.001088s ago):
[   21.998254]  test_corruption+0x284/0x378
[   21.998293]  kunit_try_run_case+0x170/0x3f0
[   21.998343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.998386]  kthread+0x328/0x630
[   21.998420]  ret_from_fork+0x10/0x20
[   21.998459] 
[   21.998502] CPU: 0 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   21.998579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.998607] Hardware name: linux,dummy-virt (DT)
[   21.998641] ==================================================================
[   22.205175] ==================================================================
[   22.205275] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378
[   22.205275] 
[   22.205353] Corrupted memory at 0x0000000033100ab0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#99):
[   22.205664]  test_corruption+0x120/0x378
[   22.205711]  kunit_try_run_case+0x170/0x3f0
[   22.205754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.205798]  kthread+0x328/0x630
[   22.205836]  ret_from_fork+0x10/0x20
[   22.205877] 
[   22.205901] kfence-#99: 0x00000000ad5ad1d6-0x00000000226ce682, size=32, cache=test
[   22.205901] 
[   22.205957] allocated by task 313 on cpu 0 at 22.205027s (0.000927s ago):
[   22.206020]  test_alloc+0x230/0x628
[   22.206059]  test_corruption+0xdc/0x378
[   22.206099]  kunit_try_run_case+0x170/0x3f0
[   22.206139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.206183]  kthread+0x328/0x630
[   22.206217]  ret_from_fork+0x10/0x20
[   22.206256] 
[   22.206281] freed by task 313 on cpu 0 at 22.205087s (0.001190s ago):
[   22.206350]  test_corruption+0x120/0x378
[   22.206390]  kunit_try_run_case+0x170/0x3f0
[   22.206429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.206473]  kthread+0x328/0x630
[   22.206507]  ret_from_fork+0x10/0x20
[   22.206546] 
[   22.206591] CPU: 0 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   22.206667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.206695] Hardware name: linux,dummy-virt (DT)
[   22.206730] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[   21.370761] ==================================================================
[   21.370839] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238
[   21.370839] 
[   21.371062] Invalid free of 0x000000005005abd7 (in kfence-#91):
[   21.371132]  test_invalid_addr_free+0x1ac/0x238
[   21.371307]  kunit_try_run_case+0x170/0x3f0
[   21.371368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.371413]  kthread+0x328/0x630
[   21.371706]  ret_from_fork+0x10/0x20
[   21.371849] 
[   21.371930] kfence-#91: 0x0000000004e28f95-0x000000005b39d323, size=32, cache=kmalloc-32
[   21.371930] 
[   21.372376] allocated by task 307 on cpu 0 at 21.370481s (0.001560s ago):
[   21.372465]  test_alloc+0x29c/0x628
[   21.372508]  test_invalid_addr_free+0xd4/0x238
[   21.372874]  kunit_try_run_case+0x170/0x3f0
[   21.373023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.373075]  kthread+0x328/0x630
[   21.373113]  ret_from_fork+0x10/0x20
[   21.373154] 
[   21.373224] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   21.373624] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.373734] Hardware name: linux,dummy-virt (DT)
[   21.373826] ==================================================================
[   21.479110] ==================================================================
[   21.479194] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238
[   21.479194] 
[   21.479541] Invalid free of 0x000000009ec085db (in kfence-#92):
[   21.479617]  test_invalid_addr_free+0xec/0x238
[   21.479691]  kunit_try_run_case+0x170/0x3f0
[   21.479751]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.479823]  kthread+0x328/0x630
[   21.480100]  ret_from_fork+0x10/0x20
[   21.480144] 
[   21.480177] kfence-#92: 0x0000000052ac07a0-0x0000000013ed7175, size=32, cache=test
[   21.480177] 
[   21.480358] allocated by task 309 on cpu 0 at 21.478959s (0.001393s ago):
[   21.480708]  test_alloc+0x230/0x628
[   21.480775]  test_invalid_addr_free+0xd4/0x238
[   21.481048]  kunit_try_run_case+0x170/0x3f0
[   21.481164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.481303]  kthread+0x328/0x630
[   21.481686]  ret_from_fork+0x10/0x20
[   21.481804] 
[   21.481869] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   21.482255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.482314] Hardware name: linux,dummy-virt (DT)
[   21.482363] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[   21.158991] ==================================================================
[   21.159334] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238
[   21.159334] 
[   21.159553] Invalid free of 0x00000000e67eb885 (in kfence-#89):
[   21.159716]  test_double_free+0x1bc/0x238
[   21.159772]  kunit_try_run_case+0x170/0x3f0
[   21.159815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.160069]  kthread+0x328/0x630
[   21.160231]  ret_from_fork+0x10/0x20
[   21.160283] 
[   21.160471] kfence-#89: 0x00000000e67eb885-0x00000000a2a27288, size=32, cache=kmalloc-32
[   21.160471] 
[   21.160759] allocated by task 303 on cpu 0 at 21.158114s (0.002637s ago):
[   21.161029]  test_alloc+0x29c/0x628
[   21.161185]  test_double_free+0xd4/0x238
[   21.161624]  kunit_try_run_case+0x170/0x3f0
[   21.161815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.161934]  kthread+0x328/0x630
[   21.162293]  ret_from_fork+0x10/0x20
[   21.162420] 
[   21.162863] freed by task 303 on cpu 0 at 21.158475s (0.004376s ago):
[   21.162971]  test_double_free+0x1ac/0x238
[   21.163109]  kunit_try_run_case+0x170/0x3f0
[   21.163160]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.163512]  kthread+0x328/0x630
[   21.163714]  ret_from_fork+0x10/0x20
[   21.163848] 
[   21.164071] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   21.164547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.164694] Hardware name: linux,dummy-virt (DT)
[   21.164886] ==================================================================
[   21.262881] ==================================================================
[   21.262962] BUG: KFENCE: invalid free in test_double_free+0x100/0x238
[   21.262962] 
[   21.263165] Invalid free of 0x000000001a43d317 (in kfence-#90):
[   21.263255]  test_double_free+0x100/0x238
[   21.263308]  kunit_try_run_case+0x170/0x3f0
[   21.263509]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.263571]  kthread+0x328/0x630
[   21.263649]  ret_from_fork+0x10/0x20
[   21.263893] 
[   21.264024] kfence-#90: 0x000000001a43d317-0x00000000f80ddab9, size=32, cache=test
[   21.264024] 
[   21.264379] allocated by task 305 on cpu 0 at 21.262256s (0.001974s ago):
[   21.264628]  test_alloc+0x230/0x628
[   21.264953]  test_double_free+0xd4/0x238
[   21.265184]  kunit_try_run_case+0x170/0x3f0
[   21.265631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.265843]  kthread+0x328/0x630
[   21.265979]  ret_from_fork+0x10/0x20
[   21.266024] 
[   21.266049] freed by task 305 on cpu 0 at 21.262329s (0.003716s ago):
[   21.266485]  test_double_free+0xf0/0x238
[   21.266591]  kunit_try_run_case+0x170/0x3f0
[   21.266802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.267221]  kthread+0x328/0x630
[   21.267385]  ret_from_fork+0x10/0x20
[   21.267455] 
[   21.267550] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   21.267631] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.267672] Hardware name: linux,dummy-virt (DT)
[   21.267731] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[   20.737497] ==================================================================
[   20.737765] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   20.737765] 
[   20.737884] Use-after-free read at 0x000000006f0e0a37 (in kfence-#85):
[   20.738277]  test_use_after_free_read+0x114/0x248
[   20.738415]  kunit_try_run_case+0x170/0x3f0
[   20.738466]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.738513]  kthread+0x328/0x630
[   20.738586]  ret_from_fork+0x10/0x20
[   20.738634] 
[   20.738662] kfence-#85: 0x000000006f0e0a37-0x00000000db2193bf, size=32, cache=kmalloc-32
[   20.738662] 
[   20.738716] allocated by task 295 on cpu 0 at 20.736893s (0.001818s ago):
[   20.738784]  test_alloc+0x29c/0x628
[   20.738826]  test_use_after_free_read+0xd0/0x248
[   20.738876]  kunit_try_run_case+0x170/0x3f0
[   20.738917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.738959]  kthread+0x328/0x630
[   20.738995]  ret_from_fork+0x10/0x20
[   20.739344] 
[   20.739948] freed by task 295 on cpu 0 at 20.736983s (0.002439s ago):
[   20.740108]  test_use_after_free_read+0x1c0/0x248
[   20.740461]  kunit_try_run_case+0x170/0x3f0
[   20.740656]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.740702]  kthread+0x328/0x630
[   20.740786]  ret_from_fork+0x10/0x20
[   20.740849] 
[   20.740898] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.741345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.741473] Hardware name: linux,dummy-virt (DT)
[   20.742008] ==================================================================
[   20.842471] ==================================================================
[   20.842585] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248
[   20.842585] 
[   20.842804] Use-after-free read at 0x000000004ed1a66a (in kfence-#86):
[   20.842962]  test_use_after_free_read+0x114/0x248
[   20.843277]  kunit_try_run_case+0x170/0x3f0
[   20.843406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.843457]  kthread+0x328/0x630
[   20.843625]  ret_from_fork+0x10/0x20
[   20.843680] 
[   20.843964] kfence-#86: 0x000000004ed1a66a-0x0000000044fd3c6d, size=32, cache=test
[   20.843964] 
[   20.844125] allocated by task 297 on cpu 0 at 20.841843s (0.002249s ago):
[   20.844211]  test_alloc+0x230/0x628
[   20.844508]  test_use_after_free_read+0xd0/0x248
[   20.844767]  kunit_try_run_case+0x170/0x3f0
[   20.844973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.845226]  kthread+0x328/0x630
[   20.845421]  ret_from_fork+0x10/0x20
[   20.845531] 
[   20.845556] freed by task 297 on cpu 0 at 20.842108s (0.003444s ago):
[   20.845833]  test_use_after_free_read+0xf0/0x248
[   20.846073]  kunit_try_run_case+0x170/0x3f0
[   20.846132]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.846516]  kthread+0x328/0x630
[   20.846638]  ret_from_fork+0x10/0x20
[   20.846701] 
[   20.847213] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.847604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.847667] Hardware name: linux,dummy-virt (DT)
[   20.847783] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[   20.635403] ==================================================================
[   20.635799] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   20.635799] 
[   20.635898] Out-of-bounds write at 0x00000000f932d1e7 (1B left of kfence-#84):
[   20.636451]  test_out_of_bounds_write+0x100/0x240
[   20.636648]  kunit_try_run_case+0x170/0x3f0
[   20.636822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.636896]  kthread+0x328/0x630
[   20.637080]  ret_from_fork+0x10/0x20
[   20.637367] 
[   20.637400] kfence-#84: 0x000000000faf15e7-0x00000000fbe7fa79, size=32, cache=test
[   20.637400] 
[   20.637955] allocated by task 293 on cpu 0 at 20.634973s (0.002964s ago):
[   20.638176]  test_alloc+0x230/0x628
[   20.638372]  test_out_of_bounds_write+0xc8/0x240
[   20.638493]  kunit_try_run_case+0x170/0x3f0
[   20.638547]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.638597]  kthread+0x328/0x630
[   20.638654]  ret_from_fork+0x10/0x20
[   20.638714] 
[   20.638761] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.638856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.638889] Hardware name: linux,dummy-virt (DT)
[   20.638940] ==================================================================
[   20.530127] ==================================================================
[   20.530206] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240
[   20.530206] 
[   20.530293] Out-of-bounds write at 0x00000000b461b851 (1B left of kfence-#83):
[   20.530359]  test_out_of_bounds_write+0x100/0x240
[   20.530406]  kunit_try_run_case+0x170/0x3f0
[   20.530698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.530782]  kthread+0x328/0x630
[   20.530826]  ret_from_fork+0x10/0x20
[   20.530877] 
[   20.530903] kfence-#83: 0x000000002cada134-0x00000000b6138ad3, size=32, cache=kmalloc-32
[   20.530903] 
[   20.531086] allocated by task 291 on cpu 0 at 20.529449s (0.001537s ago):
[   20.531177]  test_alloc+0x29c/0x628
[   20.531219]  test_out_of_bounds_write+0xc8/0x240
[   20.531262]  kunit_try_run_case+0x170/0x3f0
[   20.531300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.531354]  kthread+0x328/0x630
[   20.531392]  ret_from_fork+0x10/0x20
[   20.531573] 
[   20.531747] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.531911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.532019] Hardware name: linux,dummy-virt (DT)
[   20.532054] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   18.859013] ==================================================================
[   18.859487] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310
[   18.859600] Read of size 1 at addr ffff800080ac7b5f by task kunit_try_catch/251
[   18.859682] 
[   18.859718] CPU: 1 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.859827] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.859884] Hardware name: linux,dummy-virt (DT)
[   18.860133] Call trace:
[   18.860165]  show_stack+0x20/0x38 (C)
[   18.860238]  dump_stack_lvl+0x8c/0xd0
[   18.860433]  print_report+0x310/0x5d0
[   18.860526]  kasan_report+0xdc/0x128
[   18.860594]  __asan_report_load1_noabort+0x20/0x30
[   18.860803]  kasan_alloca_oob_left+0x2b8/0x310
[   18.860919]  kunit_try_run_case+0x170/0x3f0
[   18.861029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.861125]  kthread+0x328/0x630
[   18.861227]  ret_from_fork+0x10/0x20
[   18.861368] 
[   18.861419] The buggy address belongs to stack of task kunit_try_catch/251
[   18.861511] 
[   18.861534] The buggy address ffff800080ac7b5f belongs to a vmalloc virtual mapping
[   18.861579] The buggy address belongs to the physical page:
[   18.861612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   18.861668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.861733] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.861785] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.861828] page dumped because: kasan: bad access detected
[   18.861862] 
[   18.861882] Memory state around the buggy address:
[   18.861914]  ffff800080ac7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.861960]  ffff800080ac7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.862006] >ffff800080ac7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb
[   18.862047]                                                     ^
[   18.862087]  ffff800080ac7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   18.862133]  ffff800080ac7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.862175] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[   20.218516] ==================================================================
[   20.218597] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   20.218597] 
[   20.218721] Out-of-bounds read at 0x0000000097da3632 (32B right of kfence-#80):
[   20.218813]  test_out_of_bounds_read+0x1c8/0x3e0
[   20.218898]  kunit_try_run_case+0x170/0x3f0
[   20.219011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.219095]  kthread+0x328/0x630
[   20.219185]  ret_from_fork+0x10/0x20
[   20.219234] 
[   20.219281] kfence-#80: 0x00000000974ca35c-0x00000000caed2796, size=32, cache=kmalloc-32
[   20.219281] 
[   20.219363] allocated by task 287 on cpu 0 at 20.217943s (0.001399s ago):
[   20.219432]  test_alloc+0x29c/0x628
[   20.219491]  test_out_of_bounds_read+0x198/0x3e0
[   20.219534]  kunit_try_run_case+0x170/0x3f0
[   20.219574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.219622]  kthread+0x328/0x630
[   20.219687]  ret_from_fork+0x10/0x20
[   20.220089] 
[   20.220183] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.220263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.220293] Hardware name: linux,dummy-virt (DT)
[   20.220337] ==================================================================
[   20.321153] ==================================================================
[   20.321236] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   20.321236] 
[   20.321334] Out-of-bounds read at 0x00000000307fac2d (1B left of kfence-#81):
[   20.321392]  test_out_of_bounds_read+0x114/0x3e0
[   20.321437]  kunit_try_run_case+0x170/0x3f0
[   20.321480]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.321524]  kthread+0x328/0x630
[   20.321561]  ret_from_fork+0x10/0x20
[   20.321599] 
[   20.321623] kfence-#81: 0x000000008e669181-0x00000000c180fda1, size=32, cache=test
[   20.321623] 
[   20.321672] allocated by task 289 on cpu 0 at 20.321060s (0.000609s ago):
[   20.321816]  test_alloc+0x230/0x628
[   20.321861]  test_out_of_bounds_read+0xdc/0x3e0
[   20.321903]  kunit_try_run_case+0x170/0x3f0
[   20.321941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.321984]  kthread+0x328/0x630
[   20.322019]  ret_from_fork+0x10/0x20
[   20.322059] 
[   20.322101] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.322179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.322207] Hardware name: linux,dummy-virt (DT)
[   20.322240] ==================================================================
[   20.010733] ==================================================================
[   20.010833] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0
[   20.010833] 
[   20.011018] Out-of-bounds read at 0x000000000e8a6e9e (1B left of kfence-#78):
[   20.011765]  test_out_of_bounds_read+0x114/0x3e0
[   20.011833]  kunit_try_run_case+0x170/0x3f0
[   20.011880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.011922]  kthread+0x328/0x630
[   20.011962]  ret_from_fork+0x10/0x20
[   20.012006] 
[   20.012178] kfence-#78: 0x000000008a7ba22d-0x000000006ac7420d, size=32, cache=kmalloc-32
[   20.012178] 
[   20.012359] allocated by task 287 on cpu 0 at 20.009907s (0.002384s ago):
[   20.013048]  test_alloc+0x29c/0x628
[   20.013125]  test_out_of_bounds_read+0xdc/0x3e0
[   20.013170]  kunit_try_run_case+0x170/0x3f0
[   20.013210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.013253]  kthread+0x328/0x630
[   20.013577]  ret_from_fork+0x10/0x20
[   20.014017] 
[   20.014251] CPU: 0 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.014482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.014657] Hardware name: linux,dummy-virt (DT)
[   20.014841] ==================================================================
[   20.426745] ==================================================================
[   20.426833] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0
[   20.426833] 
[   20.427038] Out-of-bounds read at 0x00000000998d9303 (32B right of kfence-#82):
[   20.427112]  test_out_of_bounds_read+0x1c8/0x3e0
[   20.427547]  kunit_try_run_case+0x170/0x3f0
[   20.427647]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.427714]  kthread+0x328/0x630
[   20.427782]  ret_from_fork+0x10/0x20
[   20.427871] 
[   20.427960] kfence-#82: 0x00000000d2a59537-0x0000000037320f19, size=32, cache=test
[   20.427960] 
[   20.428165] allocated by task 289 on cpu 0 at 20.426560s (0.001451s ago):
[   20.428444]  test_alloc+0x230/0x628
[   20.428579]  test_out_of_bounds_read+0x198/0x3e0
[   20.428982]  kunit_try_run_case+0x170/0x3f0
[   20.429068]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.429114]  kthread+0x328/0x630
[   20.429449]  ret_from_fork+0x10/0x20
[   20.429946] 
[   20.430028] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   20.430226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.430258] Hardware name: linux,dummy-virt (DT)
[   20.430884] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[   19.925687] ==================================================================
[   19.926083] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0
[   19.926387] Write of size 1 at addr fff00000c7a4ee78 by task kunit_try_catch/285
[   19.926450] 
[   19.926484] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.926576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.926604] Hardware name: linux,dummy-virt (DT)
[   19.926638] Call trace:
[   19.927178]  show_stack+0x20/0x38 (C)
[   19.927518]  dump_stack_lvl+0x8c/0xd0
[   19.927919]  print_report+0x118/0x5d0
[   19.928000]  kasan_report+0xdc/0x128
[   19.928068]  __asan_report_store1_noabort+0x20/0x30
[   19.928206]  strncpy_from_user+0x270/0x2a0
[   19.928269]  copy_user_test_oob+0x5c0/0xec8
[   19.928328]  kunit_try_run_case+0x170/0x3f0
[   19.928433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.928493]  kthread+0x328/0x630
[   19.928560]  ret_from_fork+0x10/0x20
[   19.929096] 
[   19.929129] Allocated by task 285:
[   19.929163]  kasan_save_stack+0x3c/0x68
[   19.929221]  kasan_save_track+0x20/0x40
[   19.929508]  kasan_save_alloc_info+0x40/0x58
[   19.929766]  __kasan_kmalloc+0xd4/0xd8
[   19.929975]  __kmalloc_noprof+0x198/0x4c8
[   19.930199]  kunit_kmalloc_array+0x34/0x88
[   19.930412]  copy_user_test_oob+0xac/0xec8
[   19.930498]  kunit_try_run_case+0x170/0x3f0
[   19.930740]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.930932]  kthread+0x328/0x630
[   19.931273]  ret_from_fork+0x10/0x20
[   19.931479] 
[   19.931515] The buggy address belongs to the object at fff00000c7a4ee00
[   19.931515]  which belongs to the cache kmalloc-128 of size 128
[   19.931616] The buggy address is located 0 bytes to the right of
[   19.931616]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.931751] 
[   19.931776] The buggy address belongs to the physical page:
[   19.931827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.931885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.931943] page_type: f5(slab)
[   19.931988] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.932042] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.932084] page dumped because: kasan: bad access detected
[   19.932119] 
[   19.932148] Memory state around the buggy address:
[   19.932197]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.932245]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.932299] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.932362]                                                                 ^
[   19.932407]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.932452]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.933160] ==================================================================
[   19.915869] ==================================================================
[   19.915923] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0
[   19.915984] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.916038] 
[   19.916749] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.917062] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.917238] Hardware name: linux,dummy-virt (DT)
[   19.917519] Call trace:
[   19.917958]  show_stack+0x20/0x38 (C)
[   19.918042]  dump_stack_lvl+0x8c/0xd0
[   19.918203]  print_report+0x118/0x5d0
[   19.918315]  kasan_report+0xdc/0x128
[   19.918704]  kasan_check_range+0x100/0x1a8
[   19.918791]  __kasan_check_write+0x20/0x30
[   19.918938]  strncpy_from_user+0x3c/0x2a0
[   19.919331]  copy_user_test_oob+0x5c0/0xec8
[   19.919517]  kunit_try_run_case+0x170/0x3f0
[   19.919599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.919662]  kthread+0x328/0x630
[   19.919706]  ret_from_fork+0x10/0x20
[   19.919769] 
[   19.919800] Allocated by task 285:
[   19.919841]  kasan_save_stack+0x3c/0x68
[   19.919886]  kasan_save_track+0x20/0x40
[   19.919926]  kasan_save_alloc_info+0x40/0x58
[   19.919967]  __kasan_kmalloc+0xd4/0xd8
[   19.920006]  __kmalloc_noprof+0x198/0x4c8
[   19.920054]  kunit_kmalloc_array+0x34/0x88
[   19.920102]  copy_user_test_oob+0xac/0xec8
[   19.920140]  kunit_try_run_case+0x170/0x3f0
[   19.920186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.920233]  kthread+0x328/0x630
[   19.920267]  ret_from_fork+0x10/0x20
[   19.920337] 
[   19.920368] The buggy address belongs to the object at fff00000c7a4ee00
[   19.920368]  which belongs to the cache kmalloc-128 of size 128
[   19.920439] The buggy address is located 0 bytes inside of
[   19.920439]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.920823] 
[   19.920857] The buggy address belongs to the physical page:
[   19.920978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.921168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.921468] page_type: f5(slab)
[   19.921544] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.921862] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.922237] page dumped because: kasan: bad access detected
[   19.922306] 
[   19.922553] Memory state around the buggy address:
[   19.922702]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.922846]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.923207] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.923393]                                                                 ^
[   19.923589]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.923812]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.923897] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[   19.894386] ==================================================================
[   19.894737] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8
[   19.895093] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.895176] 
[   19.895424] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.895523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.895996] Hardware name: linux,dummy-virt (DT)
[   19.896048] Call trace:
[   19.896104]  show_stack+0x20/0x38 (C)
[   19.896168]  dump_stack_lvl+0x8c/0xd0
[   19.896526]  print_report+0x118/0x5d0
[   19.896642]  kasan_report+0xdc/0x128
[   19.897128]  kasan_check_range+0x100/0x1a8
[   19.897218]  __kasan_check_write+0x20/0x30
[   19.897429]  copy_user_test_oob+0x434/0xec8
[   19.897531]  kunit_try_run_case+0x170/0x3f0
[   19.897764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.898062]  kthread+0x328/0x630
[   19.898444]  ret_from_fork+0x10/0x20
[   19.898800] 
[   19.898847] Allocated by task 285:
[   19.899027]  kasan_save_stack+0x3c/0x68
[   19.899286]  kasan_save_track+0x20/0x40
[   19.899507]  kasan_save_alloc_info+0x40/0x58
[   19.899676]  __kasan_kmalloc+0xd4/0xd8
[   19.899742]  __kmalloc_noprof+0x198/0x4c8
[   19.899788]  kunit_kmalloc_array+0x34/0x88
[   19.900096]  copy_user_test_oob+0xac/0xec8
[   19.900335]  kunit_try_run_case+0x170/0x3f0
[   19.900502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.900594]  kthread+0x328/0x630
[   19.900694]  ret_from_fork+0x10/0x20
[   19.900823] 
[   19.900951] The buggy address belongs to the object at fff00000c7a4ee00
[   19.900951]  which belongs to the cache kmalloc-128 of size 128
[   19.901031] The buggy address is located 0 bytes inside of
[   19.901031]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.901484] 
[   19.901582] The buggy address belongs to the physical page:
[   19.901845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.902051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.902151] page_type: f5(slab)
[   19.902292] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.902429] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.902474] page dumped because: kasan: bad access detected
[   19.902545] 
[   19.902819] Memory state around the buggy address:
[   19.902910]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.903120]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.903170] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.903555]                                                                 ^
[   19.903878]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.904008]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.904053] ==================================================================
[   19.878077] ==================================================================
[   19.878505] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8
[   19.878573] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.878945] 
[   19.879040] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.879413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.879485] Hardware name: linux,dummy-virt (DT)
[   19.879631] Call trace:
[   19.879793]  show_stack+0x20/0x38 (C)
[   19.879855]  dump_stack_lvl+0x8c/0xd0
[   19.879965]  print_report+0x118/0x5d0
[   19.880018]  kasan_report+0xdc/0x128
[   19.880104]  kasan_check_range+0x100/0x1a8
[   19.880206]  __kasan_check_write+0x20/0x30
[   19.880483]  copy_user_test_oob+0x35c/0xec8
[   19.880722]  kunit_try_run_case+0x170/0x3f0
[   19.880952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.881286]  kthread+0x328/0x630
[   19.881419]  ret_from_fork+0x10/0x20
[   19.881594] 
[   19.881757] Allocated by task 285:
[   19.881793]  kasan_save_stack+0x3c/0x68
[   19.881876]  kasan_save_track+0x20/0x40
[   19.882186]  kasan_save_alloc_info+0x40/0x58
[   19.882543]  __kasan_kmalloc+0xd4/0xd8
[   19.882624]  __kmalloc_noprof+0x198/0x4c8
[   19.882757]  kunit_kmalloc_array+0x34/0x88
[   19.882842]  copy_user_test_oob+0xac/0xec8
[   19.882974]  kunit_try_run_case+0x170/0x3f0
[   19.883080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.883458]  kthread+0x328/0x630
[   19.883522]  ret_from_fork+0x10/0x20
[   19.883879] 
[   19.883939] The buggy address belongs to the object at fff00000c7a4ee00
[   19.883939]  which belongs to the cache kmalloc-128 of size 128
[   19.884053] The buggy address is located 0 bytes inside of
[   19.884053]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.884241] 
[   19.884297] The buggy address belongs to the physical page:
[   19.884393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.884460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.884552] page_type: f5(slab)
[   19.884908] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.884991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.885387] page dumped because: kasan: bad access detected
[   19.885701] 
[   19.885738] Memory state around the buggy address:
[   19.885778]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.885990]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886423] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.886660]                                                                 ^
[   19.886797]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886910]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.886954] ==================================================================
[   19.906224] ==================================================================
[   19.906352] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8
[   19.906425] Read of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.906478] 
[   19.906679] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.907096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.907172] Hardware name: linux,dummy-virt (DT)
[   19.907247] Call trace:
[   19.907277]  show_stack+0x20/0x38 (C)
[   19.907522]  dump_stack_lvl+0x8c/0xd0
[   19.907675]  print_report+0x118/0x5d0
[   19.907967]  kasan_report+0xdc/0x128
[   19.908182]  kasan_check_range+0x100/0x1a8
[   19.908280]  __kasan_check_read+0x20/0x30
[   19.908530]  copy_user_test_oob+0x4a0/0xec8
[   19.908607]  kunit_try_run_case+0x170/0x3f0
[   19.908862]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.909018]  kthread+0x328/0x630
[   19.909176]  ret_from_fork+0x10/0x20
[   19.909234] 
[   19.909266] Allocated by task 285:
[   19.909303]  kasan_save_stack+0x3c/0x68
[   19.909657]  kasan_save_track+0x20/0x40
[   19.909853]  kasan_save_alloc_info+0x40/0x58
[   19.909926]  __kasan_kmalloc+0xd4/0xd8
[   19.910145]  __kmalloc_noprof+0x198/0x4c8
[   19.910312]  kunit_kmalloc_array+0x34/0x88
[   19.910786]  copy_user_test_oob+0xac/0xec8
[   19.910967]  kunit_try_run_case+0x170/0x3f0
[   19.911201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.911458]  kthread+0x328/0x630
[   19.911573]  ret_from_fork+0x10/0x20
[   19.911697] 
[   19.911722] The buggy address belongs to the object at fff00000c7a4ee00
[   19.911722]  which belongs to the cache kmalloc-128 of size 128
[   19.911830] The buggy address is located 0 bytes inside of
[   19.911830]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.912205] 
[   19.912262] The buggy address belongs to the physical page:
[   19.912607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.912785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.912888] page_type: f5(slab)
[   19.913015] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.913083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.913133] page dumped because: kasan: bad access detected
[   19.913478] 
[   19.913517] Memory state around the buggy address:
[   19.913572]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.913842]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.913899] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.913941]                                                                 ^
[   19.914111]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.914175]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.914217] ==================================================================
[   19.887975] ==================================================================
[   19.888738] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8
[   19.888821] Read of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.889090] 
[   19.889266] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.889406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.889473] Hardware name: linux,dummy-virt (DT)
[   19.889508] Call trace:
[   19.889533]  show_stack+0x20/0x38 (C)
[   19.889904]  dump_stack_lvl+0x8c/0xd0
[   19.890117]  print_report+0x118/0x5d0
[   19.890418]  kasan_report+0xdc/0x128
[   19.890526]  kasan_check_range+0x100/0x1a8
[   19.890593]  __kasan_check_read+0x20/0x30
[   19.890639]  copy_user_test_oob+0x3c8/0xec8
[   19.890716]  kunit_try_run_case+0x170/0x3f0
[   19.890769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.890824]  kthread+0x328/0x630
[   19.890882]  ret_from_fork+0x10/0x20
[   19.890934] 
[   19.890955] Allocated by task 285:
[   19.890992]  kasan_save_stack+0x3c/0x68
[   19.891047]  kasan_save_track+0x20/0x40
[   19.891087]  kasan_save_alloc_info+0x40/0x58
[   19.891131]  __kasan_kmalloc+0xd4/0xd8
[   19.891170]  __kmalloc_noprof+0x198/0x4c8
[   19.891211]  kunit_kmalloc_array+0x34/0x88
[   19.891262]  copy_user_test_oob+0xac/0xec8
[   19.891315]  kunit_try_run_case+0x170/0x3f0
[   19.891391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.891446]  kthread+0x328/0x630
[   19.891489]  ret_from_fork+0x10/0x20
[   19.891526] 
[   19.891549] The buggy address belongs to the object at fff00000c7a4ee00
[   19.891549]  which belongs to the cache kmalloc-128 of size 128
[   19.891608] The buggy address is located 0 bytes inside of
[   19.891608]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.891682] 
[   19.891718] The buggy address belongs to the physical page:
[   19.891755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.891816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.891883] page_type: f5(slab)
[   19.891923] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.891975] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.892017] page dumped because: kasan: bad access detected
[   19.892059] 
[   19.892095] Memory state around the buggy address:
[   19.892128]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.892180]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.892241] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.892281]                                                                 ^
[   19.892332]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.892896]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.893345] ==================================================================
[   19.861673] ==================================================================
[   19.861748] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8
[   19.861809] Read of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.861863] 
[   19.861904] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.861991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.862019] Hardware name: linux,dummy-virt (DT)
[   19.862055] Call trace:
[   19.862081]  show_stack+0x20/0x38 (C)
[   19.862134]  dump_stack_lvl+0x8c/0xd0
[   19.862182]  print_report+0x118/0x5d0
[   19.862229]  kasan_report+0xdc/0x128
[   19.862277]  kasan_check_range+0x100/0x1a8
[   19.862342]  __kasan_check_read+0x20/0x30
[   19.862387]  copy_user_test_oob+0x728/0xec8
[   19.862436]  kunit_try_run_case+0x170/0x3f0
[   19.862495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.862549]  kthread+0x328/0x630
[   19.862597]  ret_from_fork+0x10/0x20
[   19.862648] 
[   19.862680] Allocated by task 285:
[   19.862712]  kasan_save_stack+0x3c/0x68
[   19.862756]  kasan_save_track+0x20/0x40
[   19.862794]  kasan_save_alloc_info+0x40/0x58
[   19.862836]  __kasan_kmalloc+0xd4/0xd8
[   19.862873]  __kmalloc_noprof+0x198/0x4c8
[   19.862914]  kunit_kmalloc_array+0x34/0x88
[   19.862959]  copy_user_test_oob+0xac/0xec8
[   19.863000]  kunit_try_run_case+0x170/0x3f0
[   19.863039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.863083]  kthread+0x328/0x630
[   19.863118]  ret_from_fork+0x10/0x20
[   19.863154] 
[   19.863176] The buggy address belongs to the object at fff00000c7a4ee00
[   19.863176]  which belongs to the cache kmalloc-128 of size 128
[   19.863245] The buggy address is located 0 bytes inside of
[   19.863245]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.863315] 
[   19.864877] The buggy address belongs to the physical page:
[   19.864951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.865121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.865285] page_type: f5(slab)
[   19.865699] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.865797] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.865877] page dumped because: kasan: bad access detected
[   19.865930] 
[   19.866726] Memory state around the buggy address:
[   19.866772]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.866857]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.866913] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.866976]                                                                 ^
[   19.867046]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.867380]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.867643] ==================================================================
[   19.846697] ==================================================================
[   19.846808] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8
[   19.846890] Write of size 121 at addr fff00000c7a4ee00 by task kunit_try_catch/285
[   19.846944] 
[   19.847029] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.847214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.847272] Hardware name: linux,dummy-virt (DT)
[   19.847339] Call trace:
[   19.847449]  show_stack+0x20/0x38 (C)
[   19.847511]  dump_stack_lvl+0x8c/0xd0
[   19.847566]  print_report+0x118/0x5d0
[   19.847615]  kasan_report+0xdc/0x128
[   19.847901]  kasan_check_range+0x100/0x1a8
[   19.847972]  __kasan_check_write+0x20/0x30
[   19.848082]  copy_user_test_oob+0x234/0xec8
[   19.848143]  kunit_try_run_case+0x170/0x3f0
[   19.848205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.848266]  kthread+0x328/0x630
[   19.848312]  ret_from_fork+0x10/0x20
[   19.848377] 
[   19.848478] Allocated by task 285:
[   19.848529]  kasan_save_stack+0x3c/0x68
[   19.848760]  kasan_save_track+0x20/0x40
[   19.848977]  kasan_save_alloc_info+0x40/0x58
[   19.849210]  __kasan_kmalloc+0xd4/0xd8
[   19.849256]  __kmalloc_noprof+0x198/0x4c8
[   19.849595]  kunit_kmalloc_array+0x34/0x88
[   19.849706]  copy_user_test_oob+0xac/0xec8
[   19.850019]  kunit_try_run_case+0x170/0x3f0
[   19.850104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.850285]  kthread+0x328/0x630
[   19.850338]  ret_from_fork+0x10/0x20
[   19.850720] 
[   19.850761] The buggy address belongs to the object at fff00000c7a4ee00
[   19.850761]  which belongs to the cache kmalloc-128 of size 128
[   19.851137] The buggy address is located 0 bytes inside of
[   19.851137]  allocated 120-byte region [fff00000c7a4ee00, fff00000c7a4ee78)
[   19.851333] 
[   19.851401] The buggy address belongs to the physical page:
[   19.851456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.851593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.851765] page_type: f5(slab)
[   19.852157] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.852226] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.852272] page dumped because: kasan: bad access detected
[   19.852364] 
[   19.852512] Memory state around the buggy address:
[   19.852608]  fff00000c7a4ed00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.852691]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.852736] >fff00000c7a4ee00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.853105]                                                                 ^
[   19.853180]  fff00000c7a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853238]  fff00000c7a4ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.853620] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[   19.814922] ==================================================================
[   19.814995] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250
[   19.815076] Read of size 8 at addr fff00000c7a4ed78 by task kunit_try_catch/281
[   19.815656] 
[   19.815925] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.816442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.816483] Hardware name: linux,dummy-virt (DT)
[   19.816587] Call trace:
[   19.816691]  show_stack+0x20/0x38 (C)
[   19.816752]  dump_stack_lvl+0x8c/0xd0
[   19.816825]  print_report+0x118/0x5d0
[   19.816882]  kasan_report+0xdc/0x128
[   19.816929]  __asan_report_load8_noabort+0x20/0x30
[   19.816999]  copy_to_kernel_nofault+0x204/0x250
[   19.817051]  copy_to_kernel_nofault_oob+0x158/0x418
[   19.817099]  kunit_try_run_case+0x170/0x3f0
[   19.817359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.817524]  kthread+0x328/0x630
[   19.817640]  ret_from_fork+0x10/0x20
[   19.817714] 
[   19.817735] Allocated by task 281:
[   19.817767]  kasan_save_stack+0x3c/0x68
[   19.817848]  kasan_save_track+0x20/0x40
[   19.817971]  kasan_save_alloc_info+0x40/0x58
[   19.818064]  __kasan_kmalloc+0xd4/0xd8
[   19.818136]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.818191]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.818284]  kunit_try_run_case+0x170/0x3f0
[   19.818338]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.818421]  kthread+0x328/0x630
[   19.818478]  ret_from_fork+0x10/0x20
[   19.818518] 
[   19.818542] The buggy address belongs to the object at fff00000c7a4ed00
[   19.818542]  which belongs to the cache kmalloc-128 of size 128
[   19.818618] The buggy address is located 0 bytes to the right of
[   19.818618]  allocated 120-byte region [fff00000c7a4ed00, fff00000c7a4ed78)
[   19.818694] 
[   19.818717] The buggy address belongs to the physical page:
[   19.818779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.818840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.818892] page_type: f5(slab)
[   19.818938] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.818989] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.819168] page dumped because: kasan: bad access detected
[   19.819233] 
[   19.819312] Memory state around the buggy address:
[   19.819443]  fff00000c7a4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.819525]  fff00000c7a4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.819587] >fff00000c7a4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.819695]                                                                 ^
[   19.819798]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.819882]  fff00000c7a4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.819996] ==================================================================
[   19.820346] ==================================================================
[   19.820737] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250
[   19.820812] Write of size 8 at addr fff00000c7a4ed78 by task kunit_try_catch/281
[   19.820866] 
[   19.820900] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.820982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.821011] Hardware name: linux,dummy-virt (DT)
[   19.821043] Call trace:
[   19.821069]  show_stack+0x20/0x38 (C)
[   19.821120]  dump_stack_lvl+0x8c/0xd0
[   19.821170]  print_report+0x118/0x5d0
[   19.821217]  kasan_report+0xdc/0x128
[   19.821267]  kasan_check_range+0x100/0x1a8
[   19.821317]  __kasan_check_write+0x20/0x30
[   19.821425]  copy_to_kernel_nofault+0x8c/0x250
[   19.821475]  copy_to_kernel_nofault_oob+0x1bc/0x418
[   19.821535]  kunit_try_run_case+0x170/0x3f0
[   19.821582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.821636]  kthread+0x328/0x630
[   19.821680]  ret_from_fork+0x10/0x20
[   19.821728] 
[   19.821766] Allocated by task 281:
[   19.821796]  kasan_save_stack+0x3c/0x68
[   19.821839]  kasan_save_track+0x20/0x40
[   19.821877]  kasan_save_alloc_info+0x40/0x58
[   19.821925]  __kasan_kmalloc+0xd4/0xd8
[   19.821965]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.822015]  copy_to_kernel_nofault_oob+0xc8/0x418
[   19.822056]  kunit_try_run_case+0x170/0x3f0
[   19.822103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.822154]  kthread+0x328/0x630
[   19.822190]  ret_from_fork+0x10/0x20
[   19.822226] 
[   19.822247] The buggy address belongs to the object at fff00000c7a4ed00
[   19.822247]  which belongs to the cache kmalloc-128 of size 128
[   19.822304] The buggy address is located 0 bytes to the right of
[   19.822304]  allocated 120-byte region [fff00000c7a4ed00, fff00000c7a4ed78)
[   19.822379] 
[   19.822409] The buggy address belongs to the physical page:
[   19.822444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   19.822505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.822554] page_type: f5(slab)
[   19.822593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   19.822645] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   19.822687] page dumped because: kasan: bad access detected
[   19.822718] 
[   19.822748] Memory state around the buggy address:
[   19.822781]  fff00000c7a4ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   19.822827]  fff00000c7a4ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.822883] >fff00000c7a4ed00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   19.822924]                                                                 ^
[   19.822966]  fff00000c7a4ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.823011]  fff00000c7a4ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.823061] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   19.760874] ==================================================================
[   19.760935] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0
[   19.761196] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/269
[   19.761334] 
[   19.761403] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.761487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.761518] Hardware name: linux,dummy-virt (DT)
[   19.761675] Call trace:
[   19.761700]  show_stack+0x20/0x38 (C)
[   19.761751]  dump_stack_lvl+0x8c/0xd0
[   19.761799]  print_report+0x310/0x5d0
[   19.762007]  kasan_report+0xdc/0x128
[   19.762094]  __asan_report_load1_noabort+0x20/0x30
[   19.762372]  vmalloc_oob+0x51c/0x5d0
[   19.762574]  kunit_try_run_case+0x170/0x3f0
[   19.762650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.763031]  kthread+0x328/0x630
[   19.763172]  ret_from_fork+0x10/0x20
[   19.763274] 
[   19.763449] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping
[   19.763615] The buggy address belongs to the physical page:
[   19.763677] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107abd
[   19.763764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.763874] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.763990] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.764090] page dumped because: kasan: bad access detected
[   19.764146] 
[   19.764173] Memory state around the buggy address:
[   19.764207]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.764286]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.764632] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.764742]                                                                 ^
[   19.764825]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.764881]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.764930] ==================================================================
[   19.756064] ==================================================================
[   19.756138] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0
[   19.756294] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/269
[   19.756363] 
[   19.756534] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.756649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.756684] Hardware name: linux,dummy-virt (DT)
[   19.756721] Call trace:
[   19.756747]  show_stack+0x20/0x38 (C)
[   19.756985]  dump_stack_lvl+0x8c/0xd0
[   19.757092]  print_report+0x310/0x5d0
[   19.757192]  kasan_report+0xdc/0x128
[   19.757291]  __asan_report_load1_noabort+0x20/0x30
[   19.757389]  vmalloc_oob+0x578/0x5d0
[   19.757486]  kunit_try_run_case+0x170/0x3f0
[   19.757624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.757766]  kthread+0x328/0x630
[   19.757871]  ret_from_fork+0x10/0x20
[   19.758003] 
[   19.758079] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping
[   19.758175] The buggy address belongs to the physical page:
[   19.758211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107abd
[   19.758432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.758684] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   19.758787] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   19.758884] page dumped because: kasan: bad access detected
[   19.758933] 
[   19.758955] Memory state around the buggy address:
[   19.758992]  ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.759308]  ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   19.759404] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   19.759506]                                                              ^
[   19.759664]  ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.759844]  ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   19.759959] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[   19.527627] ==================================================================
[   19.527681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.527734] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.528220] 
[   19.528286] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.529029] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.529078] Hardware name: linux,dummy-virt (DT)
[   19.529149] Call trace:
[   19.529197]  show_stack+0x20/0x38 (C)
[   19.529253]  dump_stack_lvl+0x8c/0xd0
[   19.529302]  print_report+0x118/0x5d0
[   19.529363]  kasan_report+0xdc/0x128
[   19.529563]  kasan_check_range+0x100/0x1a8
[   19.529912]  __kasan_check_write+0x20/0x30
[   19.530149]  kasan_atomics_helper+0xff0/0x4858
[   19.530675]  kasan_atomics+0x198/0x2e0
[   19.530934]  kunit_try_run_case+0x170/0x3f0
[   19.531483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.531619]  kthread+0x328/0x630
[   19.531846]  ret_from_fork+0x10/0x20
[   19.531986] 
[   19.532239] Allocated by task 265:
[   19.532332]  kasan_save_stack+0x3c/0x68
[   19.532510]  kasan_save_track+0x20/0x40
[   19.532771]  kasan_save_alloc_info+0x40/0x58
[   19.532974]  __kasan_kmalloc+0xd4/0xd8
[   19.533115]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.533162]  kasan_atomics+0xb8/0x2e0
[   19.533210]  kunit_try_run_case+0x170/0x3f0
[   19.533298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.533515]  kthread+0x328/0x630
[   19.533927]  ret_from_fork+0x10/0x20
[   19.534018] 
[   19.534199] The buggy address belongs to the object at fff00000c7ab9600
[   19.534199]  which belongs to the cache kmalloc-64 of size 64
[   19.534431] The buggy address is located 0 bytes to the right of
[   19.534431]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.534654] 
[   19.534700] The buggy address belongs to the physical page:
[   19.534754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.535003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.535150] page_type: f5(slab)
[   19.535406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.535468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.535545] page dumped because: kasan: bad access detected
[   19.535742] 
[   19.535771] Memory state around the buggy address:
[   19.535808]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535865]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.535910] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.535947]                                      ^
[   19.535983]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536027]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.536075] ==================================================================
[   19.507329] ==================================================================
[   19.507439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.507562] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.507663] 
[   19.507699] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.507783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.507981] Hardware name: linux,dummy-virt (DT)
[   19.508245] Call trace:
[   19.508289]  show_stack+0x20/0x38 (C)
[   19.508650]  dump_stack_lvl+0x8c/0xd0
[   19.508780]  print_report+0x118/0x5d0
[   19.508908]  kasan_report+0xdc/0x128
[   19.508970]  kasan_check_range+0x100/0x1a8
[   19.509288]  __kasan_check_write+0x20/0x30
[   19.509590]  kasan_atomics_helper+0xf20/0x4858
[   19.509774]  kasan_atomics+0x198/0x2e0
[   19.509960]  kunit_try_run_case+0x170/0x3f0
[   19.510090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.510214]  kthread+0x328/0x630
[   19.510501]  ret_from_fork+0x10/0x20
[   19.510884] 
[   19.510912] Allocated by task 265:
[   19.511070]  kasan_save_stack+0x3c/0x68
[   19.512075]  kasan_save_track+0x20/0x40
[   19.512483]  kasan_save_alloc_info+0x40/0x58
[   19.512591]  __kasan_kmalloc+0xd4/0xd8
[   19.512697]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.512947]  kasan_atomics+0xb8/0x2e0
[   19.513118]  kunit_try_run_case+0x170/0x3f0
[   19.513343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.513552]  kthread+0x328/0x630
[   19.513622]  ret_from_fork+0x10/0x20
[   19.513660] 
[   19.513731] The buggy address belongs to the object at fff00000c7ab9600
[   19.513731]  which belongs to the cache kmalloc-64 of size 64
[   19.514164] The buggy address is located 0 bytes to the right of
[   19.514164]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.514378] 
[   19.514522] The buggy address belongs to the physical page:
[   19.514758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.515115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.515455] page_type: f5(slab)
[   19.515578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.515765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.516021] page dumped because: kasan: bad access detected
[   19.516129] 
[   19.516250] Memory state around the buggy address:
[   19.516317]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.516606]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.516799] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.516849]                                      ^
[   19.517159]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517214]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.517600] ==================================================================
[   19.711228] ==================================================================
[   19.711351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.711406] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.711481] 
[   19.711521] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.711614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.711652] Hardware name: linux,dummy-virt (DT)
[   19.711684] Call trace:
[   19.711709]  show_stack+0x20/0x38 (C)
[   19.711759]  dump_stack_lvl+0x8c/0xd0
[   19.711808]  print_report+0x118/0x5d0
[   19.711855]  kasan_report+0xdc/0x128
[   19.711902]  kasan_check_range+0x100/0x1a8
[   19.711953]  __kasan_check_write+0x20/0x30
[   19.712001]  kasan_atomics_helper+0x175c/0x4858
[   19.712068]  kasan_atomics+0x198/0x2e0
[   19.712114]  kunit_try_run_case+0x170/0x3f0
[   19.712167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.712230]  kthread+0x328/0x630
[   19.712273]  ret_from_fork+0x10/0x20
[   19.712673] 
[   19.712707] Allocated by task 265:
[   19.712902]  kasan_save_stack+0x3c/0x68
[   19.713105]  kasan_save_track+0x20/0x40
[   19.713169]  kasan_save_alloc_info+0x40/0x58
[   19.713278]  __kasan_kmalloc+0xd4/0xd8
[   19.713721]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.713866]  kasan_atomics+0xb8/0x2e0
[   19.713947]  kunit_try_run_case+0x170/0x3f0
[   19.714303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.714489]  kthread+0x328/0x630
[   19.714814]  ret_from_fork+0x10/0x20
[   19.715046] 
[   19.715114] The buggy address belongs to the object at fff00000c7ab9600
[   19.715114]  which belongs to the cache kmalloc-64 of size 64
[   19.715452] The buggy address is located 0 bytes to the right of
[   19.715452]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.715718] 
[   19.715763] The buggy address belongs to the physical page:
[   19.716296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.716385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.716552] page_type: f5(slab)
[   19.716598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.716650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.716995] page dumped because: kasan: bad access detected
[   19.717481] 
[   19.717511] Memory state around the buggy address:
[   19.717550]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.717785]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.717851] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.718184]                                      ^
[   19.718280]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.718393]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.718731] ==================================================================
[   19.657661] ==================================================================
[   19.657956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.658055] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.658162] 
[   19.658376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.658531] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.658566] Hardware name: linux,dummy-virt (DT)
[   19.658908] Call trace:
[   19.659045]  show_stack+0x20/0x38 (C)
[   19.659107]  dump_stack_lvl+0x8c/0xd0
[   19.659154]  print_report+0x118/0x5d0
[   19.659514]  kasan_report+0xdc/0x128
[   19.659586]  kasan_check_range+0x100/0x1a8
[   19.659699]  __kasan_check_write+0x20/0x30
[   19.659766]  kasan_atomics_helper+0x15b4/0x4858
[   19.659819]  kasan_atomics+0x198/0x2e0
[   19.660003]  kunit_try_run_case+0x170/0x3f0
[   19.660056]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.660111]  kthread+0x328/0x630
[   19.660432]  ret_from_fork+0x10/0x20
[   19.660672] 
[   19.660746] Allocated by task 265:
[   19.660892]  kasan_save_stack+0x3c/0x68
[   19.660952]  kasan_save_track+0x20/0x40
[   19.661048]  kasan_save_alloc_info+0x40/0x58
[   19.661122]  __kasan_kmalloc+0xd4/0xd8
[   19.661162]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.661227]  kasan_atomics+0xb8/0x2e0
[   19.661267]  kunit_try_run_case+0x170/0x3f0
[   19.661469]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.661618]  kthread+0x328/0x630
[   19.661685]  ret_from_fork+0x10/0x20
[   19.662051] 
[   19.662105] The buggy address belongs to the object at fff00000c7ab9600
[   19.662105]  which belongs to the cache kmalloc-64 of size 64
[   19.662436] The buggy address is located 0 bytes to the right of
[   19.662436]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.662547] 
[   19.662703] The buggy address belongs to the physical page:
[   19.663011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.663079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.663513] page_type: f5(slab)
[   19.663690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.664088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.664331] page dumped because: kasan: bad access detected
[   19.664631] 
[   19.664753] Memory state around the buggy address:
[   19.664969]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.665209]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.665306] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.665530]                                      ^
[   19.665592]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.665685]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.665858] ==================================================================
[   19.676053] ==================================================================
[   19.676139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.676196] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.676302] 
[   19.676346] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.676435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.676464] Hardware name: linux,dummy-virt (DT)
[   19.676496] Call trace:
[   19.676526]  show_stack+0x20/0x38 (C)
[   19.677034]  dump_stack_lvl+0x8c/0xd0
[   19.677195]  print_report+0x118/0x5d0
[   19.677305]  kasan_report+0xdc/0x128
[   19.677487]  kasan_check_range+0x100/0x1a8
[   19.677541]  __kasan_check_write+0x20/0x30
[   19.677588]  kasan_atomics_helper+0x1644/0x4858
[   19.677639]  kasan_atomics+0x198/0x2e0
[   19.677684]  kunit_try_run_case+0x170/0x3f0
[   19.678228]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.678440]  kthread+0x328/0x630
[   19.678575]  ret_from_fork+0x10/0x20
[   19.678706] 
[   19.678778] Allocated by task 265:
[   19.678876]  kasan_save_stack+0x3c/0x68
[   19.678921]  kasan_save_track+0x20/0x40
[   19.678960]  kasan_save_alloc_info+0x40/0x58
[   19.679002]  __kasan_kmalloc+0xd4/0xd8
[   19.679050]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.679092]  kasan_atomics+0xb8/0x2e0
[   19.679140]  kunit_try_run_case+0x170/0x3f0
[   19.679180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.679239]  kthread+0x328/0x630
[   19.679275]  ret_from_fork+0x10/0x20
[   19.679314] 
[   19.679479] The buggy address belongs to the object at fff00000c7ab9600
[   19.679479]  which belongs to the cache kmalloc-64 of size 64
[   19.679929] The buggy address is located 0 bytes to the right of
[   19.679929]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.680197] 
[   19.680529] The buggy address belongs to the physical page:
[   19.680964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.681030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.681090] page_type: f5(slab)
[   19.681464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.681855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.681907] page dumped because: kasan: bad access detected
[   19.681944] 
[   19.681965] Memory state around the buggy address:
[   19.682407]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.682746]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.682996] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.683099]                                      ^
[   19.683298]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.683367]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.683406] ==================================================================
[   19.603447] ==================================================================
[   19.603750] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.603992] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.604054] 
[   19.604090] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.604345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.604387] Hardware name: linux,dummy-virt (DT)
[   19.604421] Call trace:
[   19.604483]  show_stack+0x20/0x38 (C)
[   19.605135]  dump_stack_lvl+0x8c/0xd0
[   19.605246]  print_report+0x118/0x5d0
[   19.605512]  kasan_report+0xdc/0x128
[   19.605691]  kasan_check_range+0x100/0x1a8
[   19.606081]  __kasan_check_write+0x20/0x30
[   19.606272]  kasan_atomics_helper+0x1384/0x4858
[   19.606674]  kasan_atomics+0x198/0x2e0
[   19.606786]  kunit_try_run_case+0x170/0x3f0
[   19.607069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.607204]  kthread+0x328/0x630
[   19.607480]  ret_from_fork+0x10/0x20
[   19.607625] 
[   19.607709] Allocated by task 265:
[   19.607741]  kasan_save_stack+0x3c/0x68
[   19.607851]  kasan_save_track+0x20/0x40
[   19.608165]  kasan_save_alloc_info+0x40/0x58
[   19.608550]  __kasan_kmalloc+0xd4/0xd8
[   19.608684]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.608842]  kasan_atomics+0xb8/0x2e0
[   19.608940]  kunit_try_run_case+0x170/0x3f0
[   19.609182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.609400]  kthread+0x328/0x630
[   19.609507]  ret_from_fork+0x10/0x20
[   19.609764] 
[   19.609820] The buggy address belongs to the object at fff00000c7ab9600
[   19.609820]  which belongs to the cache kmalloc-64 of size 64
[   19.610056] The buggy address is located 0 bytes to the right of
[   19.610056]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.610350] 
[   19.610482] The buggy address belongs to the physical page:
[   19.610769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.610920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.611363] page_type: f5(slab)
[   19.611430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.611842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.611915] page dumped because: kasan: bad access detected
[   19.611951] 
[   19.611972] Memory state around the buggy address:
[   19.612008]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.612483]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.612654] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.612841]                                      ^
[   19.612888]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.612935]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.612974] ==================================================================
[   19.562921] ==================================================================
[   19.562974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.563200] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.563280] 
[   19.563315] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.563831] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.563892] Hardware name: linux,dummy-virt (DT)
[   19.563981] Call trace:
[   19.564009]  show_stack+0x20/0x38 (C)
[   19.564064]  dump_stack_lvl+0x8c/0xd0
[   19.564187]  print_report+0x118/0x5d0
[   19.564244]  kasan_report+0xdc/0x128
[   19.564291]  kasan_check_range+0x100/0x1a8
[   19.564352]  __kasan_check_write+0x20/0x30
[   19.564397]  kasan_atomics_helper+0x1190/0x4858
[   19.564675]  kasan_atomics+0x198/0x2e0
[   19.565193]  kunit_try_run_case+0x170/0x3f0
[   19.565297]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.565479]  kthread+0x328/0x630
[   19.565527]  ret_from_fork+0x10/0x20
[   19.565576] 
[   19.565873] Allocated by task 265:
[   19.566010]  kasan_save_stack+0x3c/0x68
[   19.566108]  kasan_save_track+0x20/0x40
[   19.566553]  kasan_save_alloc_info+0x40/0x58
[   19.566658]  __kasan_kmalloc+0xd4/0xd8
[   19.566772]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.566903]  kasan_atomics+0xb8/0x2e0
[   19.566990]  kunit_try_run_case+0x170/0x3f0
[   19.567207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.567461]  kthread+0x328/0x630
[   19.567760]  ret_from_fork+0x10/0x20
[   19.568011] 
[   19.568069] The buggy address belongs to the object at fff00000c7ab9600
[   19.568069]  which belongs to the cache kmalloc-64 of size 64
[   19.568593] The buggy address is located 0 bytes to the right of
[   19.568593]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.568819] 
[   19.568944] The buggy address belongs to the physical page:
[   19.569076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.569346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.569592] page_type: f5(slab)
[   19.569675] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.569730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.570152] page dumped because: kasan: bad access detected
[   19.570458] 
[   19.570600] Memory state around the buggy address:
[   19.570640]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.570882]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.571337] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.571893]                                      ^
[   19.572108]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.572438]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.572539] ==================================================================
[   19.455989] ==================================================================
[   19.456044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.456096] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.456147] 
[   19.456184] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.456877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.457114] Hardware name: linux,dummy-virt (DT)
[   19.457178] Call trace:
[   19.457295]  show_stack+0x20/0x38 (C)
[   19.457533]  dump_stack_lvl+0x8c/0xd0
[   19.457746]  print_report+0x118/0x5d0
[   19.457838]  kasan_report+0xdc/0x128
[   19.458102]  kasan_check_range+0x100/0x1a8
[   19.458373]  __kasan_check_read+0x20/0x30
[   19.458683]  kasan_atomics_helper+0xdd4/0x4858
[   19.458763]  kasan_atomics+0x198/0x2e0
[   19.458811]  kunit_try_run_case+0x170/0x3f0
[   19.459447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.459668]  kthread+0x328/0x630
[   19.459734]  ret_from_fork+0x10/0x20
[   19.460000] 
[   19.460194] Allocated by task 265:
[   19.460261]  kasan_save_stack+0x3c/0x68
[   19.460329]  kasan_save_track+0x20/0x40
[   19.460372]  kasan_save_alloc_info+0x40/0x58
[   19.460421]  __kasan_kmalloc+0xd4/0xd8
[   19.460475]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.460795]  kasan_atomics+0xb8/0x2e0
[   19.460847]  kunit_try_run_case+0x170/0x3f0
[   19.460888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.460940]  kthread+0x328/0x630
[   19.460976]  ret_from_fork+0x10/0x20
[   19.461144] 
[   19.461223] The buggy address belongs to the object at fff00000c7ab9600
[   19.461223]  which belongs to the cache kmalloc-64 of size 64
[   19.461690] The buggy address is located 0 bytes to the right of
[   19.461690]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.462269] 
[   19.462426] The buggy address belongs to the physical page:
[   19.462524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.462609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.462965] page_type: f5(slab)
[   19.463308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.463652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.463902] page dumped because: kasan: bad access detected
[   19.464177] 
[   19.464253] Memory state around the buggy address:
[   19.464384]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.464712]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.464766] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.464945]                                      ^
[   19.465025]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.465188]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.465267] ==================================================================
[   19.614758] ==================================================================
[   19.615153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.615252] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.615441] 
[   19.615485] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.615568] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.615598] Hardware name: linux,dummy-virt (DT)
[   19.615932] Call trace:
[   19.615974]  show_stack+0x20/0x38 (C)
[   19.616030]  dump_stack_lvl+0x8c/0xd0
[   19.616498]  print_report+0x118/0x5d0
[   19.616922]  kasan_report+0xdc/0x128
[   19.617049]  __asan_report_load8_noabort+0x20/0x30
[   19.617168]  kasan_atomics_helper+0x3f04/0x4858
[   19.617337]  kasan_atomics+0x198/0x2e0
[   19.617410]  kunit_try_run_case+0x170/0x3f0
[   19.617468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.617523]  kthread+0x328/0x630
[   19.617731]  ret_from_fork+0x10/0x20
[   19.617859] 
[   19.617888] Allocated by task 265:
[   19.618027]  kasan_save_stack+0x3c/0x68
[   19.618079]  kasan_save_track+0x20/0x40
[   19.618145]  kasan_save_alloc_info+0x40/0x58
[   19.618204]  __kasan_kmalloc+0xd4/0xd8
[   19.618243]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.618298]  kasan_atomics+0xb8/0x2e0
[   19.618357]  kunit_try_run_case+0x170/0x3f0
[   19.618397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.618440]  kthread+0x328/0x630
[   19.618489]  ret_from_fork+0x10/0x20
[   19.618527] 
[   19.618565] The buggy address belongs to the object at fff00000c7ab9600
[   19.618565]  which belongs to the cache kmalloc-64 of size 64
[   19.618626] The buggy address is located 0 bytes to the right of
[   19.618626]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.618692] 
[   19.618738] The buggy address belongs to the physical page:
[   19.618795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.618849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.618901] page_type: f5(slab)
[   19.618950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.619005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.619047] page dumped because: kasan: bad access detected
[   19.619092] 
[   19.619120] Memory state around the buggy address:
[   19.619162]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.619208]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.619253] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.619292]                                      ^
[   19.619336]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.620158]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.620228] ==================================================================
[   19.621412] ==================================================================
[   19.621467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.621523] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.621765] 
[   19.621925] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.622156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.622326] Hardware name: linux,dummy-virt (DT)
[   19.622392] Call trace:
[   19.622558]  show_stack+0x20/0x38 (C)
[   19.622619]  dump_stack_lvl+0x8c/0xd0
[   19.622675]  print_report+0x118/0x5d0
[   19.622768]  kasan_report+0xdc/0x128
[   19.622866]  kasan_check_range+0x100/0x1a8
[   19.623070]  __kasan_check_write+0x20/0x30
[   19.623280]  kasan_atomics_helper+0x1414/0x4858
[   19.623366]  kasan_atomics+0x198/0x2e0
[   19.623575]  kunit_try_run_case+0x170/0x3f0
[   19.623655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.623729]  kthread+0x328/0x630
[   19.623773]  ret_from_fork+0x10/0x20
[   19.624042] 
[   19.624129] Allocated by task 265:
[   19.624170]  kasan_save_stack+0x3c/0x68
[   19.624237]  kasan_save_track+0x20/0x40
[   19.624483]  kasan_save_alloc_info+0x40/0x58
[   19.624651]  __kasan_kmalloc+0xd4/0xd8
[   19.624728]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.624963]  kasan_atomics+0xb8/0x2e0
[   19.625191]  kunit_try_run_case+0x170/0x3f0
[   19.625368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.625452]  kthread+0x328/0x630
[   19.625489]  ret_from_fork+0x10/0x20
[   19.625797] 
[   19.625850] The buggy address belongs to the object at fff00000c7ab9600
[   19.625850]  which belongs to the cache kmalloc-64 of size 64
[   19.626251] The buggy address is located 0 bytes to the right of
[   19.626251]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.627054] 
[   19.627425] The buggy address belongs to the physical page:
[   19.627580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.628017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.628266] page_type: f5(slab)
[   19.628333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.628512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.628708] page dumped because: kasan: bad access detected
[   19.629014] 
[   19.629041] Memory state around the buggy address:
[   19.629079]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.629126]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.629557] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.629871]                                      ^
[   19.630059]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.630345]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.630549] ==================================================================
[   19.476254] ==================================================================
[   19.476335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.476390] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.476442] 
[   19.476478] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.476942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.477143] Hardware name: linux,dummy-virt (DT)
[   19.477222] Call trace:
[   19.477250]  show_stack+0x20/0x38 (C)
[   19.477313]  dump_stack_lvl+0x8c/0xd0
[   19.477373]  print_report+0x118/0x5d0
[   19.477426]  kasan_report+0xdc/0x128
[   19.478202]  kasan_check_range+0x100/0x1a8
[   19.478382]  __kasan_check_write+0x20/0x30
[   19.478524]  kasan_atomics_helper+0xe44/0x4858
[   19.478646]  kasan_atomics+0x198/0x2e0
[   19.478834]  kunit_try_run_case+0x170/0x3f0
[   19.479063]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.479349]  kthread+0x328/0x630
[   19.479580]  ret_from_fork+0x10/0x20
[   19.479687] 
[   19.479757] Allocated by task 265:
[   19.479851]  kasan_save_stack+0x3c/0x68
[   19.479898]  kasan_save_track+0x20/0x40
[   19.480119]  kasan_save_alloc_info+0x40/0x58
[   19.480237]  __kasan_kmalloc+0xd4/0xd8
[   19.480465]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.480697]  kasan_atomics+0xb8/0x2e0
[   19.480990]  kunit_try_run_case+0x170/0x3f0
[   19.481085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.481539]  kthread+0x328/0x630
[   19.481737]  ret_from_fork+0x10/0x20
[   19.481864] 
[   19.481946] The buggy address belongs to the object at fff00000c7ab9600
[   19.481946]  which belongs to the cache kmalloc-64 of size 64
[   19.482356] The buggy address is located 0 bytes to the right of
[   19.482356]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.482621] 
[   19.482756] The buggy address belongs to the physical page:
[   19.482821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.483167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.483587] page_type: f5(slab)
[   19.483640] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.484048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.484338] page dumped because: kasan: bad access detected
[   19.484498] 
[   19.484702] Memory state around the buggy address:
[   19.484807]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.485247]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.485303] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.485356]                                      ^
[   19.485393]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.485437]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.485574] ==================================================================
[   19.701277] ==================================================================
[   19.701495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.701576] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.701670] 
[   19.701780] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.701869] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.701897] Hardware name: linux,dummy-virt (DT)
[   19.701930] Call trace:
[   19.701954]  show_stack+0x20/0x38 (C)
[   19.702005]  dump_stack_lvl+0x8c/0xd0
[   19.702054]  print_report+0x118/0x5d0
[   19.702103]  kasan_report+0xdc/0x128
[   19.702478]  __asan_report_load8_noabort+0x20/0x30
[   19.702765]  kasan_atomics_helper+0x3e10/0x4858
[   19.702980]  kasan_atomics+0x198/0x2e0
[   19.703117]  kunit_try_run_case+0x170/0x3f0
[   19.703201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.703362]  kthread+0x328/0x630
[   19.703414]  ret_from_fork+0x10/0x20
[   19.703806] 
[   19.703842] Allocated by task 265:
[   19.704026]  kasan_save_stack+0x3c/0x68
[   19.704114]  kasan_save_track+0x20/0x40
[   19.704387]  kasan_save_alloc_info+0x40/0x58
[   19.704478]  __kasan_kmalloc+0xd4/0xd8
[   19.704587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.704684]  kasan_atomics+0xb8/0x2e0
[   19.704750]  kunit_try_run_case+0x170/0x3f0
[   19.704925]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.705168]  kthread+0x328/0x630
[   19.705562]  ret_from_fork+0x10/0x20
[   19.705846] 
[   19.705915] The buggy address belongs to the object at fff00000c7ab9600
[   19.705915]  which belongs to the cache kmalloc-64 of size 64
[   19.706125] The buggy address is located 0 bytes to the right of
[   19.706125]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.706375] 
[   19.706402] The buggy address belongs to the physical page:
[   19.706673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.706848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.707057] page_type: f5(slab)
[   19.707147] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.707462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.707535] page dumped because: kasan: bad access detected
[   19.707635] 
[   19.707776] Memory state around the buggy address:
[   19.708132]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.708192]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.708583] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.709064]                                      ^
[   19.709116]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.709173]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.709213] ==================================================================
[   19.545721] ==================================================================
[   19.545774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.546051] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.546270] 
[   19.546306] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.546628] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.546715] Hardware name: linux,dummy-virt (DT)
[   19.547017] Call trace:
[   19.547071]  show_stack+0x20/0x38 (C)
[   19.547295]  dump_stack_lvl+0x8c/0xd0
[   19.547457]  print_report+0x118/0x5d0
[   19.547751]  kasan_report+0xdc/0x128
[   19.548211]  kasan_check_range+0x100/0x1a8
[   19.548384]  __kasan_check_write+0x20/0x30
[   19.548482]  kasan_atomics_helper+0x10c0/0x4858
[   19.548634]  kasan_atomics+0x198/0x2e0
[   19.548742]  kunit_try_run_case+0x170/0x3f0
[   19.548794]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.548849]  kthread+0x328/0x630
[   19.548892]  ret_from_fork+0x10/0x20
[   19.549304] 
[   19.549366] Allocated by task 265:
[   19.549607]  kasan_save_stack+0x3c/0x68
[   19.549793]  kasan_save_track+0x20/0x40
[   19.549976]  kasan_save_alloc_info+0x40/0x58
[   19.550099]  __kasan_kmalloc+0xd4/0xd8
[   19.550152]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.550195]  kasan_atomics+0xb8/0x2e0
[   19.550422]  kunit_try_run_case+0x170/0x3f0
[   19.550626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.551546]  kthread+0x328/0x630
[   19.551638]  ret_from_fork+0x10/0x20
[   19.551703] 
[   19.551727] The buggy address belongs to the object at fff00000c7ab9600
[   19.551727]  which belongs to the cache kmalloc-64 of size 64
[   19.551805] The buggy address is located 0 bytes to the right of
[   19.551805]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.551911] 
[   19.552507] The buggy address belongs to the physical page:
[   19.552671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.552729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.552781] page_type: f5(slab)
[   19.552823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.553436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.553513] page dumped because: kasan: bad access detected
[   19.553678] 
[   19.553705] Memory state around the buggy address:
[   19.553743]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.553966]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.554033] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.554288]                                      ^
[   19.554473]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.554695]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.554961] ==================================================================
[   19.666604] ==================================================================
[   19.666825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.666978] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.667083] 
[   19.667118] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.667241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.667271] Hardware name: linux,dummy-virt (DT)
[   19.667473] Call trace:
[   19.667510]  show_stack+0x20/0x38 (C)
[   19.667952]  dump_stack_lvl+0x8c/0xd0
[   19.668014]  print_report+0x118/0x5d0
[   19.668116]  kasan_report+0xdc/0x128
[   19.668174]  __asan_report_load8_noabort+0x20/0x30
[   19.668228]  kasan_atomics_helper+0x3db0/0x4858
[   19.668457]  kasan_atomics+0x198/0x2e0
[   19.668792]  kunit_try_run_case+0x170/0x3f0
[   19.669072]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.669233]  kthread+0x328/0x630
[   19.669375]  ret_from_fork+0x10/0x20
[   19.669481] 
[   19.669559] Allocated by task 265:
[   19.669590]  kasan_save_stack+0x3c/0x68
[   19.669918]  kasan_save_track+0x20/0x40
[   19.670080]  kasan_save_alloc_info+0x40/0x58
[   19.670162]  __kasan_kmalloc+0xd4/0xd8
[   19.670390]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.670607]  kasan_atomics+0xb8/0x2e0
[   19.670677]  kunit_try_run_case+0x170/0x3f0
[   19.670809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.671067]  kthread+0x328/0x630
[   19.671280]  ret_from_fork+0x10/0x20
[   19.671494] 
[   19.671706] The buggy address belongs to the object at fff00000c7ab9600
[   19.671706]  which belongs to the cache kmalloc-64 of size 64
[   19.671840] The buggy address is located 0 bytes to the right of
[   19.671840]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.671911] 
[   19.671995] The buggy address belongs to the physical page:
[   19.672378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.672610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.672817] page_type: f5(slab)
[   19.672865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.672920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.672964] page dumped because: kasan: bad access detected
[   19.673465] 
[   19.673750] Memory state around the buggy address:
[   19.673860]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.673912]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.674074] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.674259]                                      ^
[   19.674304]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.674762]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.674918] ==================================================================
[   19.369509] ==================================================================
[   19.369674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.369734] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.369787] 
[   19.370102] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.370489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.371303]  print_report+0x118/0x5d0
[   19.372889]  kasan_save_alloc_info+0x40/0x58
[   19.374571] 
[   19.375043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.376748]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.378543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.378573] Hardware name: linux,dummy-virt (DT)
[   19.378604] Call trace:
[   19.378629]  show_stack+0x20/0x38 (C)
[   19.378951]  dump_stack_lvl+0x8c/0xd0
[   19.379077]  print_report+0x118/0x5d0
[   19.379408]  kasan_report+0xdc/0x128
[   19.379711]  kasan_check_range+0x100/0x1a8
[   19.379908]  __kasan_check_write+0x20/0x30
[   19.380107]  kasan_atomics_helper+0x934/0x4858
[   19.380465]  kasan_atomics+0x198/0x2e0
[   19.380578]  kunit_try_run_case+0x170/0x3f0
[   19.380785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.381000]  kthread+0x328/0x630
[   19.381156]  ret_from_fork+0x10/0x20
[   19.381273] 
[   19.381374] Allocated by task 265:
[   19.381406]  kasan_save_stack+0x3c/0x68
[   19.381455]  kasan_save_track+0x20/0x40
[   19.381495]  kasan_save_alloc_info+0x40/0x58
[   19.381536]  __kasan_kmalloc+0xd4/0xd8
[   19.381573]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.381615]  kasan_atomics+0xb8/0x2e0
[   19.381652]  kunit_try_run_case+0x170/0x3f0
[   19.381691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.381736]  kthread+0x328/0x630
[   19.381771]  ret_from_fork+0x10/0x20
[   19.381808] 
[   19.381829] The buggy address belongs to the object at fff00000c7ab9600
[   19.381829]  which belongs to the cache kmalloc-64 of size 64
[   19.381887] The buggy address is located 0 bytes to the right of
[   19.381887]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.381952] 
[   19.381974] The buggy address belongs to the physical page:
[   19.382007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.382060] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.382110] page_type: f5(slab)
[   19.382148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.382201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.382244] page dumped because: kasan: bad access detected
[   19.382278] 
[   19.382298] Memory state around the buggy address:
[   19.382354]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.382536]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.382581] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.382646]                                      ^
[   19.382683]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.382728]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.382767] ==================================================================
[   19.446912] ==================================================================
[   19.447336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.447515] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.447579] 
[   19.447623] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.447979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.448264] Hardware name: linux,dummy-virt (DT)
[   19.448349] Call trace:
[   19.448485]  show_stack+0x20/0x38 (C)
[   19.448633]  dump_stack_lvl+0x8c/0xd0
[   19.448721]  print_report+0x118/0x5d0
[   19.448866]  kasan_report+0xdc/0x128
[   19.448977]  __asan_report_load4_noabort+0x20/0x30
[   19.449035]  kasan_atomics_helper+0x3e04/0x4858
[   19.449300]  kasan_atomics+0x198/0x2e0
[   19.449504]  kunit_try_run_case+0x170/0x3f0
[   19.449606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.449666]  kthread+0x328/0x630
[   19.449712]  ret_from_fork+0x10/0x20
[   19.449781] 
[   19.449809] Allocated by task 265:
[   19.449858]  kasan_save_stack+0x3c/0x68
[   19.449921]  kasan_save_track+0x20/0x40
[   19.449970]  kasan_save_alloc_info+0x40/0x58
[   19.450011]  __kasan_kmalloc+0xd4/0xd8
[   19.450056]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.450101]  kasan_atomics+0xb8/0x2e0
[   19.450139]  kunit_try_run_case+0x170/0x3f0
[   19.450179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.450223]  kthread+0x328/0x630
[   19.450259]  ret_from_fork+0x10/0x20
[   19.450297] 
[   19.450518] The buggy address belongs to the object at fff00000c7ab9600
[   19.450518]  which belongs to the cache kmalloc-64 of size 64
[   19.450845] The buggy address is located 0 bytes to the right of
[   19.450845]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.451389] 
[   19.451661] The buggy address belongs to the physical page:
[   19.451735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.451828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.452095] page_type: f5(slab)
[   19.452338] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.452528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.453448] page dumped because: kasan: bad access detected
[   19.453528] 
[   19.453579] Memory state around the buggy address:
[   19.453644]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.453702]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.453778] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.453846]                                      ^
[   19.453908]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.454406]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.454515] ==================================================================
[   19.728846] ==================================================================
[   19.728902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.729230] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.729394] 
[   19.730091] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.730196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.730292] Hardware name: linux,dummy-virt (DT)
[   19.730387] Call trace:
[   19.730532]  show_stack+0x20/0x38 (C)
[   19.730652]  dump_stack_lvl+0x8c/0xd0
[   19.730705]  print_report+0x118/0x5d0
[   19.730957]  kasan_report+0xdc/0x128
[   19.731378]  kasan_check_range+0x100/0x1a8
[   19.731669]  __kasan_check_write+0x20/0x30
[   19.732109]  kasan_atomics_helper+0x17ec/0x4858
[   19.732265]  kasan_atomics+0x198/0x2e0
[   19.732438]  kunit_try_run_case+0x170/0x3f0
[   19.732807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.733091]  kthread+0x328/0x630
[   19.733476]  ret_from_fork+0x10/0x20
[   19.733728] 
[   19.733951] Allocated by task 265:
[   19.734274]  kasan_save_stack+0x3c/0x68
[   19.734445]  kasan_save_track+0x20/0x40
[   19.734674]  kasan_save_alloc_info+0x40/0x58
[   19.734828]  __kasan_kmalloc+0xd4/0xd8
[   19.735087]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.735296]  kasan_atomics+0xb8/0x2e0
[   19.735376]  kunit_try_run_case+0x170/0x3f0
[   19.735449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.735524]  kthread+0x328/0x630
[   19.735700]  ret_from_fork+0x10/0x20
[   19.735946] 
[   19.735991] The buggy address belongs to the object at fff00000c7ab9600
[   19.735991]  which belongs to the cache kmalloc-64 of size 64
[   19.736440] The buggy address is located 0 bytes to the right of
[   19.736440]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.736626] 
[   19.736841] The buggy address belongs to the physical page:
[   19.736910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.737104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.737506] page_type: f5(slab)
[   19.737593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.737812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.737981] page dumped because: kasan: bad access detected
[   19.738268] 
[   19.738296] Memory state around the buggy address:
[   19.738353]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.738552]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.738617] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.738668]                                      ^
[   19.738724]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.738781]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.738819] ==================================================================
[   19.539002] ==================================================================
[   19.539063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.539145] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.539379] 
[   19.539415] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.539669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.539713] Hardware name: linux,dummy-virt (DT)
[   19.539879] Call trace:
[   19.539915]  show_stack+0x20/0x38 (C)
[   19.539970]  dump_stack_lvl+0x8c/0xd0
[   19.540018]  print_report+0x118/0x5d0
[   19.540330]  kasan_report+0xdc/0x128
[   19.540402]  kasan_check_range+0x100/0x1a8
[   19.540455]  __kasan_check_write+0x20/0x30
[   19.540653]  kasan_atomics_helper+0x1058/0x4858
[   19.540935]  kasan_atomics+0x198/0x2e0
[   19.541073]  kunit_try_run_case+0x170/0x3f0
[   19.541122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.541177]  kthread+0x328/0x630
[   19.541221]  ret_from_fork+0x10/0x20
[   19.541808] 
[   19.541995] Allocated by task 265:
[   19.542072]  kasan_save_stack+0x3c/0x68
[   19.542604]  kasan_save_track+0x20/0x40
[   19.542672]  kasan_save_alloc_info+0x40/0x58
[   19.542716]  __kasan_kmalloc+0xd4/0xd8
[   19.542911]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.543021]  kasan_atomics+0xb8/0x2e0
[   19.543162]  kunit_try_run_case+0x170/0x3f0
[   19.543237]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.543316]  kthread+0x328/0x630
[   19.543391]  ret_from_fork+0x10/0x20
[   19.543441] 
[   19.543475] The buggy address belongs to the object at fff00000c7ab9600
[   19.543475]  which belongs to the cache kmalloc-64 of size 64
[   19.543544] The buggy address is located 0 bytes to the right of
[   19.543544]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.543609] 
[   19.543630] The buggy address belongs to the physical page:
[   19.543664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.543735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.543786] page_type: f5(slab)
[   19.543823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.543886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.543953] page dumped because: kasan: bad access detected
[   19.543995] 
[   19.544064] Memory state around the buggy address:
[   19.544110]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.544158]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.544203] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.544250]                                      ^
[   19.544291]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.544813]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.545247] ==================================================================
[   19.558025] ==================================================================
[   19.558148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.558249] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.558301] 
[   19.558351] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.558482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.558540] Hardware name: linux,dummy-virt (DT)
[   19.558575] Call trace:
[   19.558602]  show_stack+0x20/0x38 (C)
[   19.558698]  dump_stack_lvl+0x8c/0xd0
[   19.558751]  print_report+0x118/0x5d0
[   19.558806]  kasan_report+0xdc/0x128
[   19.558862]  kasan_check_range+0x100/0x1a8
[   19.558911]  __kasan_check_write+0x20/0x30
[   19.558957]  kasan_atomics_helper+0x1128/0x4858
[   19.559007]  kasan_atomics+0x198/0x2e0
[   19.559052]  kunit_try_run_case+0x170/0x3f0
[   19.559100]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.559152]  kthread+0x328/0x630
[   19.559196]  ret_from_fork+0x10/0x20
[   19.559244] 
[   19.559266] Allocated by task 265:
[   19.559294]  kasan_save_stack+0x3c/0x68
[   19.559349]  kasan_save_track+0x20/0x40
[   19.559388]  kasan_save_alloc_info+0x40/0x58
[   19.559440]  __kasan_kmalloc+0xd4/0xd8
[   19.559478]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.559519]  kasan_atomics+0xb8/0x2e0
[   19.559571]  kunit_try_run_case+0x170/0x3f0
[   19.559616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.559663]  kthread+0x328/0x630
[   19.559705]  ret_from_fork+0x10/0x20
[   19.559752] 
[   19.559775] The buggy address belongs to the object at fff00000c7ab9600
[   19.559775]  which belongs to the cache kmalloc-64 of size 64
[   19.559843] The buggy address is located 0 bytes to the right of
[   19.559843]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.559910] 
[   19.559940] The buggy address belongs to the physical page:
[   19.559983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.560037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.560088] page_type: f5(slab)
[   19.560127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.560184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.560232] page dumped because: kasan: bad access detected
[   19.560267] 
[   19.560287] Memory state around the buggy address:
[   19.560685]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.560809]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.560857] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.561911]                                      ^
[   19.561978]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.562046]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.562112] ==================================================================
[   19.487553] ==================================================================
[   19.487608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.487660] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.487856] 
[   19.488303] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.488638] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.488842] Hardware name: linux,dummy-virt (DT)
[   19.488993] Call trace:
[   19.489096]  show_stack+0x20/0x38 (C)
[   19.489289]  dump_stack_lvl+0x8c/0xd0
[   19.489362]  print_report+0x118/0x5d0
[   19.489606]  kasan_report+0xdc/0x128
[   19.489725]  __asan_report_store8_noabort+0x20/0x30
[   19.489953]  kasan_atomics_helper+0x3e5c/0x4858
[   19.490121]  kasan_atomics+0x198/0x2e0
[   19.490174]  kunit_try_run_case+0x170/0x3f0
[   19.490225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.490278]  kthread+0x328/0x630
[   19.490776]  ret_from_fork+0x10/0x20
[   19.491413] 
[   19.491463] Allocated by task 265:
[   19.491645]  kasan_save_stack+0x3c/0x68
[   19.492047]  kasan_save_track+0x20/0x40
[   19.492172]  kasan_save_alloc_info+0x40/0x58
[   19.492250]  __kasan_kmalloc+0xd4/0xd8
[   19.492292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.492510]  kasan_atomics+0xb8/0x2e0
[   19.492834]  kunit_try_run_case+0x170/0x3f0
[   19.492945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.493099]  kthread+0x328/0x630
[   19.493140]  ret_from_fork+0x10/0x20
[   19.493485] 
[   19.493609] The buggy address belongs to the object at fff00000c7ab9600
[   19.493609]  which belongs to the cache kmalloc-64 of size 64
[   19.493960] The buggy address is located 0 bytes to the right of
[   19.493960]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.494303] 
[   19.494603] The buggy address belongs to the physical page:
[   19.494650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.494848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.495002] page_type: f5(slab)
[   19.495145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.495216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.495266] page dumped because: kasan: bad access detected
[   19.495302] 
[   19.495335] Memory state around the buggy address:
[   19.495376]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.495424]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.495477] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.495517]                                      ^
[   19.495560]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.495621]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.495663] ==================================================================
[   19.593963] ==================================================================
[   19.594076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.594171] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.594345] 
[   19.594385] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.594471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.594825] Hardware name: linux,dummy-virt (DT)
[   19.594917] Call trace:
[   19.595101]  show_stack+0x20/0x38 (C)
[   19.595290]  dump_stack_lvl+0x8c/0xd0
[   19.595410]  print_report+0x118/0x5d0
[   19.595463]  kasan_report+0xdc/0x128
[   19.595549]  kasan_check_range+0x100/0x1a8
[   19.595778]  __kasan_check_write+0x20/0x30
[   19.595995]  kasan_atomics_helper+0x12d8/0x4858
[   19.596064]  kasan_atomics+0x198/0x2e0
[   19.596330]  kunit_try_run_case+0x170/0x3f0
[   19.596411]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.596606]  kthread+0x328/0x630
[   19.596700]  ret_from_fork+0x10/0x20
[   19.596838] 
[   19.596870] Allocated by task 265:
[   19.596907]  kasan_save_stack+0x3c/0x68
[   19.597424]  kasan_save_track+0x20/0x40
[   19.597672]  kasan_save_alloc_info+0x40/0x58
[   19.597749]  __kasan_kmalloc+0xd4/0xd8
[   19.597924]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.598386]  kasan_atomics+0xb8/0x2e0
[   19.598493]  kunit_try_run_case+0x170/0x3f0
[   19.598557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.598892]  kthread+0x328/0x630
[   19.599035]  ret_from_fork+0x10/0x20
[   19.599702] 
[   19.599898] The buggy address belongs to the object at fff00000c7ab9600
[   19.599898]  which belongs to the cache kmalloc-64 of size 64
[   19.600471] The buggy address is located 0 bytes to the right of
[   19.600471]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.600557] 
[   19.600582] The buggy address belongs to the physical page:
[   19.600617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.600672] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.600730] page_type: f5(slab)
[   19.601068] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.601127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.601306] page dumped because: kasan: bad access detected
[   19.601362] 
[   19.601403] Memory state around the buggy address:
[   19.601469]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.601530]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.601576] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.601616]                                      ^
[   19.601659]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.601719]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.601757] ==================================================================
[   19.496138] ==================================================================
[   19.496199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.496250] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.496317] 
[   19.496361] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.496904] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.497366] Hardware name: linux,dummy-virt (DT)
[   19.497403] Call trace:
[   19.497427]  show_stack+0x20/0x38 (C)
[   19.497483]  dump_stack_lvl+0x8c/0xd0
[   19.497583]  print_report+0x118/0x5d0
[   19.497867]  kasan_report+0xdc/0x128
[   19.498167]  kasan_check_range+0x100/0x1a8
[   19.498294]  __kasan_check_write+0x20/0x30
[   19.498519]  kasan_atomics_helper+0xeb8/0x4858
[   19.498655]  kasan_atomics+0x198/0x2e0
[   19.498943]  kunit_try_run_case+0x170/0x3f0
[   19.499211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.499569]  kthread+0x328/0x630
[   19.499729]  ret_from_fork+0x10/0x20
[   19.499846] 
[   19.500203] Allocated by task 265:
[   19.500423]  kasan_save_stack+0x3c/0x68
[   19.500715]  kasan_save_track+0x20/0x40
[   19.500984]  kasan_save_alloc_info+0x40/0x58
[   19.501147]  __kasan_kmalloc+0xd4/0xd8
[   19.501336]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.501443]  kasan_atomics+0xb8/0x2e0
[   19.501597]  kunit_try_run_case+0x170/0x3f0
[   19.501734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.501815]  kthread+0x328/0x630
[   19.501849]  ret_from_fork+0x10/0x20
[   19.502054] 
[   19.502196] The buggy address belongs to the object at fff00000c7ab9600
[   19.502196]  which belongs to the cache kmalloc-64 of size 64
[   19.502364] The buggy address is located 0 bytes to the right of
[   19.502364]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.502831] 
[   19.502871] The buggy address belongs to the physical page:
[   19.503111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.503459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.503643] page_type: f5(slab)
[   19.503747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.503969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.504182] page dumped because: kasan: bad access detected
[   19.504427] 
[   19.504498] Memory state around the buggy address:
[   19.504809]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.505014]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.505427] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.505625]                                      ^
[   19.505860]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.506022]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.506135] ==================================================================
[   19.466751] ==================================================================
[   19.466804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.466858] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.466909] 
[   19.467117] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.467338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.467371] Hardware name: linux,dummy-virt (DT)
[   19.467405] Call trace:
[   19.467429]  show_stack+0x20/0x38 (C)
[   19.467488]  dump_stack_lvl+0x8c/0xd0
[   19.467538]  print_report+0x118/0x5d0
[   19.467593]  kasan_report+0xdc/0x128
[   19.467650]  __asan_report_load8_noabort+0x20/0x30
[   19.467704]  kasan_atomics_helper+0x3f58/0x4858
[   19.467752]  kasan_atomics+0x198/0x2e0
[   19.467801]  kunit_try_run_case+0x170/0x3f0
[   19.467852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.467908]  kthread+0x328/0x630
[   19.467951]  ret_from_fork+0x10/0x20
[   19.468000] 
[   19.468021] Allocated by task 265:
[   19.468068]  kasan_save_stack+0x3c/0x68
[   19.468120]  kasan_save_track+0x20/0x40
[   19.468175]  kasan_save_alloc_info+0x40/0x58
[   19.468217]  __kasan_kmalloc+0xd4/0xd8
[   19.468256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.468297]  kasan_atomics+0xb8/0x2e0
[   19.468804]  kunit_try_run_case+0x170/0x3f0
[   19.469076]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.470020]  kthread+0x328/0x630
[   19.470094]  ret_from_fork+0x10/0x20
[   19.470157] 
[   19.470218] The buggy address belongs to the object at fff00000c7ab9600
[   19.470218]  which belongs to the cache kmalloc-64 of size 64
[   19.470505] The buggy address is located 0 bytes to the right of
[   19.470505]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.470796] 
[   19.471207] The buggy address belongs to the physical page:
[   19.471419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.471795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.471879] page_type: f5(slab)
[   19.472408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.472472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.472514] page dumped because: kasan: bad access detected
[   19.473263] 
[   19.473384] Memory state around the buggy address:
[   19.473519]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.473788]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.474152] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.474297]                                      ^
[   19.474390]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474441]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.474479] ==================================================================
[   19.574119] ==================================================================
[   19.574183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.574439] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.574501] 
[   19.574622] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.574711] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.574740] Hardware name: linux,dummy-virt (DT)
[   19.574844] Call trace:
[   19.574872]  show_stack+0x20/0x38 (C)
[   19.574926]  dump_stack_lvl+0x8c/0xd0
[   19.574983]  print_report+0x118/0x5d0
[   19.575030]  kasan_report+0xdc/0x128
[   19.575336]  kasan_check_range+0x100/0x1a8
[   19.575742]  __kasan_check_write+0x20/0x30
[   19.575861]  kasan_atomics_helper+0x11f8/0x4858
[   19.575994]  kasan_atomics+0x198/0x2e0
[   19.576241]  kunit_try_run_case+0x170/0x3f0
[   19.576494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.576712]  kthread+0x328/0x630
[   19.576798]  ret_from_fork+0x10/0x20
[   19.577044] 
[   19.577155] Allocated by task 265:
[   19.577234]  kasan_save_stack+0x3c/0x68
[   19.577578]  kasan_save_track+0x20/0x40
[   19.577827]  kasan_save_alloc_info+0x40/0x58
[   19.577911]  __kasan_kmalloc+0xd4/0xd8
[   19.578342]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.578449]  kasan_atomics+0xb8/0x2e0
[   19.578790]  kunit_try_run_case+0x170/0x3f0
[   19.579005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.579103]  kthread+0x328/0x630
[   19.579287]  ret_from_fork+0x10/0x20
[   19.579472] 
[   19.579526] The buggy address belongs to the object at fff00000c7ab9600
[   19.579526]  which belongs to the cache kmalloc-64 of size 64
[   19.579860] The buggy address is located 0 bytes to the right of
[   19.579860]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.579963] 
[   19.580094] The buggy address belongs to the physical page:
[   19.580183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.580262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.580314] page_type: f5(slab)
[   19.580367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.580430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.580472] page dumped because: kasan: bad access detected
[   19.580516] 
[   19.580537] Memory state around the buggy address:
[   19.580578]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.580624]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.580669] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.580717]                                      ^
[   19.580752]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.580796]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.580835] ==================================================================
[   19.684157] ==================================================================
[   19.684249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.684438] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.684513] 
[   19.684709] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.684967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.685020] Hardware name: linux,dummy-virt (DT)
[   19.685177] Call trace:
[   19.685254]  show_stack+0x20/0x38 (C)
[   19.685328]  dump_stack_lvl+0x8c/0xd0
[   19.685572]  print_report+0x118/0x5d0
[   19.685919]  kasan_report+0xdc/0x128
[   19.686199]  __asan_report_load8_noabort+0x20/0x30
[   19.686426]  kasan_atomics_helper+0x3df4/0x4858
[   19.686565]  kasan_atomics+0x198/0x2e0
[   19.686619]  kunit_try_run_case+0x170/0x3f0
[   19.686677]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.686746]  kthread+0x328/0x630
[   19.686808]  ret_from_fork+0x10/0x20
[   19.686867] 
[   19.686897] Allocated by task 265:
[   19.686942]  kasan_save_stack+0x3c/0x68
[   19.686995]  kasan_save_track+0x20/0x40
[   19.687045]  kasan_save_alloc_info+0x40/0x58
[   19.687086]  __kasan_kmalloc+0xd4/0xd8
[   19.687135]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.687191]  kasan_atomics+0xb8/0x2e0
[   19.687227]  kunit_try_run_case+0x170/0x3f0
[   19.687276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.687332]  kthread+0x328/0x630
[   19.687374]  ret_from_fork+0x10/0x20
[   19.687413] 
[   19.687449] The buggy address belongs to the object at fff00000c7ab9600
[   19.687449]  which belongs to the cache kmalloc-64 of size 64
[   19.687510] The buggy address is located 0 bytes to the right of
[   19.687510]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.687577] 
[   19.687607] The buggy address belongs to the physical page:
[   19.687639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.687702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.687755] page_type: f5(slab)
[   19.687794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.687857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.687915] page dumped because: kasan: bad access detected
[   19.687950] 
[   19.687969] Memory state around the buggy address:
[   19.688003]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.688058]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.688105] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.688145]                                      ^
[   19.688197]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688254]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.688302] ==================================================================
[   19.690616] ==================================================================
[   19.690679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.690732] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.690965] 
[   19.691027] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.691121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.691149] Hardware name: linux,dummy-virt (DT)
[   19.691477] Call trace:
[   19.691530]  show_stack+0x20/0x38 (C)
[   19.691957]  dump_stack_lvl+0x8c/0xd0
[   19.692034]  print_report+0x118/0x5d0
[   19.692238]  kasan_report+0xdc/0x128
[   19.692398]  kasan_check_range+0x100/0x1a8
[   19.692616]  __kasan_check_write+0x20/0x30
[   19.692729]  kasan_atomics_helper+0x16d0/0x4858
[   19.692938]  kasan_atomics+0x198/0x2e0
[   19.693130]  kunit_try_run_case+0x170/0x3f0
[   19.693233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.693406]  kthread+0x328/0x630
[   19.693478]  ret_from_fork+0x10/0x20
[   19.693551] 
[   19.693572] Allocated by task 265:
[   19.693788]  kasan_save_stack+0x3c/0x68
[   19.693997]  kasan_save_track+0x20/0x40
[   19.694069]  kasan_save_alloc_info+0x40/0x58
[   19.694475]  __kasan_kmalloc+0xd4/0xd8
[   19.694559]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.694751]  kasan_atomics+0xb8/0x2e0
[   19.694842]  kunit_try_run_case+0x170/0x3f0
[   19.694890]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.695130]  kthread+0x328/0x630
[   19.695351]  ret_from_fork+0x10/0x20
[   19.695913] 
[   19.696222] The buggy address belongs to the object at fff00000c7ab9600
[   19.696222]  which belongs to the cache kmalloc-64 of size 64
[   19.696332] The buggy address is located 0 bytes to the right of
[   19.696332]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.696509] 
[   19.696705] The buggy address belongs to the physical page:
[   19.696893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.696979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.697316] page_type: f5(slab)
[   19.697450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.697881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.698263] page dumped because: kasan: bad access detected
[   19.698436] 
[   19.698542] Memory state around the buggy address:
[   19.698891]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.699021]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.699072] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.699533]                                      ^
[   19.699797]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.700114]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.700200] ==================================================================
[   19.582710] ==================================================================
[   19.582772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.582899] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.582974] 
[   19.583173] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.583716] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.583872] Hardware name: linux,dummy-virt (DT)
[   19.583905] Call trace:
[   19.583932]  show_stack+0x20/0x38 (C)
[   19.583985]  dump_stack_lvl+0x8c/0xd0
[   19.584035]  print_report+0x118/0x5d0
[   19.584081]  kasan_report+0xdc/0x128
[   19.584128]  kasan_check_range+0x100/0x1a8
[   19.584183]  __kasan_check_write+0x20/0x30
[   19.584230]  kasan_atomics_helper+0x126c/0x4858
[   19.584280]  kasan_atomics+0x198/0x2e0
[   19.584336]  kunit_try_run_case+0x170/0x3f0
[   19.586054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.586433]  kthread+0x328/0x630
[   19.586541]  ret_from_fork+0x10/0x20
[   19.586686] 
[   19.586822] Allocated by task 265:
[   19.586884]  kasan_save_stack+0x3c/0x68
[   19.586941]  kasan_save_track+0x20/0x40
[   19.587169]  kasan_save_alloc_info+0x40/0x58
[   19.587299]  __kasan_kmalloc+0xd4/0xd8
[   19.587409]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.587887]  kasan_atomics+0xb8/0x2e0
[   19.588203]  kunit_try_run_case+0x170/0x3f0
[   19.588280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.588365]  kthread+0x328/0x630
[   19.588448]  ret_from_fork+0x10/0x20
[   19.588490] 
[   19.588513] The buggy address belongs to the object at fff00000c7ab9600
[   19.588513]  which belongs to the cache kmalloc-64 of size 64
[   19.588934] The buggy address is located 0 bytes to the right of
[   19.588934]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.589235] 
[   19.589276] The buggy address belongs to the physical page:
[   19.589312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.589378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.589862] page_type: f5(slab)
[   19.590174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.590363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.590419] page dumped because: kasan: bad access detected
[   19.590813] 
[   19.590864] Memory state around the buggy address:
[   19.591355]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591414]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591756] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.592165]                                      ^
[   19.592308]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.592370]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.592410] ==================================================================
[   19.429102] ==================================================================
[   19.429179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.429275] Read of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.429408] 
[   19.429441] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.429529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.429585] Hardware name: linux,dummy-virt (DT)
[   19.429617] Call trace:
[   19.429640]  show_stack+0x20/0x38 (C)
[   19.429716]  dump_stack_lvl+0x8c/0xd0
[   19.429765]  print_report+0x118/0x5d0
[   19.429971]  kasan_report+0xdc/0x128
[   19.430021]  __asan_report_load4_noabort+0x20/0x30
[   19.430076]  kasan_atomics_helper+0x3dd8/0x4858
[   19.430127]  kasan_atomics+0x198/0x2e0
[   19.430174]  kunit_try_run_case+0x170/0x3f0
[   19.430234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.430379]  kthread+0x328/0x630
[   19.430472]  ret_from_fork+0x10/0x20
[   19.430541] 
[   19.430564] Allocated by task 265:
[   19.430593]  kasan_save_stack+0x3c/0x68
[   19.430636]  kasan_save_track+0x20/0x40
[   19.430676]  kasan_save_alloc_info+0x40/0x58
[   19.430718]  __kasan_kmalloc+0xd4/0xd8
[   19.430766]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.430807]  kasan_atomics+0xb8/0x2e0
[   19.430846]  kunit_try_run_case+0x170/0x3f0
[   19.430896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.430952]  kthread+0x328/0x630
[   19.430988]  ret_from_fork+0x10/0x20
[   19.431038] 
[   19.431062] The buggy address belongs to the object at fff00000c7ab9600
[   19.431062]  which belongs to the cache kmalloc-64 of size 64
[   19.431121] The buggy address is located 0 bytes to the right of
[   19.431121]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.431187] 
[   19.431210] The buggy address belongs to the physical page:
[   19.431245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.431300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.431359] page_type: f5(slab)
[   19.431397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.431459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.431510] page dumped because: kasan: bad access detected
[   19.431542] 
[   19.431563] Memory state around the buggy address:
[   19.431594]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.431640]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.431689] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.431728]                                      ^
[   19.431764]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431809]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.431857] ==================================================================
[   19.652009] ==================================================================
[   19.652439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.652519] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.652817] 
[   19.652862] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.653260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.653315] Hardware name: linux,dummy-virt (DT)
[   19.653364] Call trace:
[   19.653389]  show_stack+0x20/0x38 (C)
[   19.653444]  dump_stack_lvl+0x8c/0xd0
[   19.653493]  print_report+0x118/0x5d0
[   19.653922]  kasan_report+0xdc/0x128
[   19.653994]  kasan_check_range+0x100/0x1a8
[   19.654194]  __kasan_check_write+0x20/0x30
[   19.654380]  kasan_atomics_helper+0x154c/0x4858
[   19.654516]  kasan_atomics+0x198/0x2e0
[   19.654590]  kunit_try_run_case+0x170/0x3f0
[   19.654651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.654705]  kthread+0x328/0x630
[   19.654775]  ret_from_fork+0x10/0x20
[   19.654841] 
[   19.654867] Allocated by task 265:
[   19.654918]  kasan_save_stack+0x3c/0x68
[   19.654983]  kasan_save_track+0x20/0x40
[   19.655024]  kasan_save_alloc_info+0x40/0x58
[   19.655064]  __kasan_kmalloc+0xd4/0xd8
[   19.655122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.655165]  kasan_atomics+0xb8/0x2e0
[   19.655204]  kunit_try_run_case+0x170/0x3f0
[   19.655242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.655287]  kthread+0x328/0x630
[   19.655343]  ret_from_fork+0x10/0x20
[   19.655381] 
[   19.655404] The buggy address belongs to the object at fff00000c7ab9600
[   19.655404]  which belongs to the cache kmalloc-64 of size 64
[   19.655465] The buggy address is located 0 bytes to the right of
[   19.655465]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.655551] 
[   19.655588] The buggy address belongs to the physical page:
[   19.655630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.655708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.655758] page_type: f5(slab)
[   19.655798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.655851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.655894] page dumped because: kasan: bad access detected
[   19.655944] 
[   19.655972] Memory state around the buggy address:
[   19.656015]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.656060]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.656105] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.656164]                                      ^
[   19.656206]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.656258]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.656329] ==================================================================
[   19.519108] ==================================================================
[   19.519162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.519214] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.519267] 
[   19.519302] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.519400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.519429] Hardware name: linux,dummy-virt (DT)
[   19.519460] Call trace:
[   19.519797]  show_stack+0x20/0x38 (C)
[   19.519890]  dump_stack_lvl+0x8c/0xd0
[   19.519941]  print_report+0x118/0x5d0
[   19.519998]  kasan_report+0xdc/0x128
[   19.520055]  kasan_check_range+0x100/0x1a8
[   19.520104]  __kasan_check_write+0x20/0x30
[   19.520157]  kasan_atomics_helper+0xf88/0x4858
[   19.520207]  kasan_atomics+0x198/0x2e0
[   19.520252]  kunit_try_run_case+0x170/0x3f0
[   19.520300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.520891]  kthread+0x328/0x630
[   19.521080]  ret_from_fork+0x10/0x20
[   19.521159] 
[   19.521188] Allocated by task 265:
[   19.521221]  kasan_save_stack+0x3c/0x68
[   19.521264]  kasan_save_track+0x20/0x40
[   19.521305]  kasan_save_alloc_info+0x40/0x58
[   19.521356]  __kasan_kmalloc+0xd4/0xd8
[   19.521395]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.521989]  kasan_atomics+0xb8/0x2e0
[   19.522181]  kunit_try_run_case+0x170/0x3f0
[   19.522254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.522644]  kthread+0x328/0x630
[   19.522857]  ret_from_fork+0x10/0x20
[   19.523004] 
[   19.523251] The buggy address belongs to the object at fff00000c7ab9600
[   19.523251]  which belongs to the cache kmalloc-64 of size 64
[   19.523388] The buggy address is located 0 bytes to the right of
[   19.523388]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.523832] 
[   19.523873] The buggy address belongs to the physical page:
[   19.524006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.524107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.524293] page_type: f5(slab)
[   19.524410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.524874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.524944] page dumped because: kasan: bad access detected
[   19.524979] 
[   19.525000] Memory state around the buggy address:
[   19.525038]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.525084]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.525374] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.525915]                                      ^
[   19.526094]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526176]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526564] ==================================================================
[   19.632706] ==================================================================
[   19.632903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.632996] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.633148] 
[   19.633216] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.633378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.633433] Hardware name: linux,dummy-virt (DT)
[   19.633475] Call trace:
[   19.633501]  show_stack+0x20/0x38 (C)
[   19.633792]  dump_stack_lvl+0x8c/0xd0
[   19.633962]  print_report+0x118/0x5d0
[   19.634368]  kasan_report+0xdc/0x128
[   19.634514]  kasan_check_range+0x100/0x1a8
[   19.634619]  __kasan_check_write+0x20/0x30
[   19.634696]  kasan_atomics_helper+0x147c/0x4858
[   19.635106]  kasan_atomics+0x198/0x2e0
[   19.635350]  kunit_try_run_case+0x170/0x3f0
[   19.635712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.635837]  kthread+0x328/0x630
[   19.635908]  ret_from_fork+0x10/0x20
[   19.636327] 
[   19.636380] Allocated by task 265:
[   19.636619]  kasan_save_stack+0x3c/0x68
[   19.636690]  kasan_save_track+0x20/0x40
[   19.637006]  kasan_save_alloc_info+0x40/0x58
[   19.637118]  __kasan_kmalloc+0xd4/0xd8
[   19.637285]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.637346]  kasan_atomics+0xb8/0x2e0
[   19.637497]  kunit_try_run_case+0x170/0x3f0
[   19.637546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.637666]  kthread+0x328/0x630
[   19.637913]  ret_from_fork+0x10/0x20
[   19.637981] 
[   19.638015] The buggy address belongs to the object at fff00000c7ab9600
[   19.638015]  which belongs to the cache kmalloc-64 of size 64
[   19.638082] The buggy address is located 0 bytes to the right of
[   19.638082]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.638148] 
[   19.638172] The buggy address belongs to the physical page:
[   19.638206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.638271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.638333] page_type: f5(slab)
[   19.638385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.638775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.639005] page dumped because: kasan: bad access detected
[   19.639080] 
[   19.639287] Memory state around the buggy address:
[   19.639435]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.639581]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.639953] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.640027]                                      ^
[   19.640296]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.640372]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.640412] ==================================================================
[   19.642504] ==================================================================
[   19.642794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.642986] Write of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.643050] 
[   19.643086] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.643297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.643364] Hardware name: linux,dummy-virt (DT)
[   19.643400] Call trace:
[   19.643712]  show_stack+0x20/0x38 (C)
[   19.643976]  dump_stack_lvl+0x8c/0xd0
[   19.644232]  print_report+0x118/0x5d0
[   19.644300]  kasan_report+0xdc/0x128
[   19.644427]  kasan_check_range+0x100/0x1a8
[   19.644482]  __kasan_check_write+0x20/0x30
[   19.644692]  kasan_atomics_helper+0x14e4/0x4858
[   19.644750]  kasan_atomics+0x198/0x2e0
[   19.644798]  kunit_try_run_case+0x170/0x3f0
[   19.644846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.644900]  kthread+0x328/0x630
[   19.645595]  ret_from_fork+0x10/0x20
[   19.645746] 
[   19.645812] Allocated by task 265:
[   19.645853]  kasan_save_stack+0x3c/0x68
[   19.645904]  kasan_save_track+0x20/0x40
[   19.645945]  kasan_save_alloc_info+0x40/0x58
[   19.646002]  __kasan_kmalloc+0xd4/0xd8
[   19.646041]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.646092]  kasan_atomics+0xb8/0x2e0
[   19.646139]  kunit_try_run_case+0x170/0x3f0
[   19.646187]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.646233]  kthread+0x328/0x630
[   19.646268]  ret_from_fork+0x10/0x20
[   19.646305] 
[   19.646704] The buggy address belongs to the object at fff00000c7ab9600
[   19.646704]  which belongs to the cache kmalloc-64 of size 64
[   19.646777] The buggy address is located 0 bytes to the right of
[   19.646777]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.647632] 
[   19.647867] The buggy address belongs to the physical page:
[   19.647935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.648027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.648101] page_type: f5(slab)
[   19.648373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.648578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.648956] page dumped because: kasan: bad access detected
[   19.649267] 
[   19.649394] Memory state around the buggy address:
[   19.649682]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.649855]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.650011] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.650059]                                      ^
[   19.650113]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.650338]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.650859] ==================================================================
[   19.383243] ==================================================================
[   19.383299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.383365] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.383417] 
[   19.383450] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.383533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.383563] Hardware name: linux,dummy-virt (DT)
[   19.383596] Call trace:
[   19.383621]  show_stack+0x20/0x38 (C)
[   19.383668]  dump_stack_lvl+0x8c/0xd0
[   19.383716]  print_report+0x118/0x5d0
[   19.383765]  kasan_report+0xdc/0x128
[   19.383831]  kasan_check_range+0x100/0x1a8
[   19.383943]  __kasan_check_write+0x20/0x30
[   19.384012]  kasan_atomics_helper+0x99c/0x4858
[   19.384062]  kasan_atomics+0x198/0x2e0
[   19.384109]  kunit_try_run_case+0x170/0x3f0
[   19.384162]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.384225]  kthread+0x328/0x630
[   19.384270]  ret_from_fork+0x10/0x20
[   19.384328] 
[   19.384349] Allocated by task 265:
[   19.384387]  kasan_save_stack+0x3c/0x68
[   19.384440]  kasan_save_track+0x20/0x40
[   19.384515]  kasan_save_alloc_info+0x40/0x58
[   19.384562]  __kasan_kmalloc+0xd4/0xd8
[   19.384601]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.384643]  kasan_atomics+0xb8/0x2e0
[   19.384681]  kunit_try_run_case+0x170/0x3f0
[   19.384720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.384766]  kthread+0x328/0x630
[   19.384800]  ret_from_fork+0x10/0x20
[   19.384838] 
[   19.384859] The buggy address belongs to the object at fff00000c7ab9600
[   19.384859]  which belongs to the cache kmalloc-64 of size 64
[   19.384917] The buggy address is located 0 bytes to the right of
[   19.384917]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.385034] 
[   19.385122] The buggy address belongs to the physical page:
[   19.385162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.385287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.385472] page_type: f5(slab)
[   19.385512] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.385567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.385608] page dumped because: kasan: bad access detected
[   19.385643] 
[   19.385663] Memory state around the buggy address:
[   19.385698]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.386804] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.387914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.387968]  kthread+0x328/0x630
[   19.388012]  ret_from_fork+0x10/0x20
[   19.388059] 
[   19.388080] Allocated by task 265:
[   19.388120]  kasan_save_stack+0x3c/0x68
[   19.388169]  kasan_save_track+0x20/0x40
[   19.388209]  kasan_save_alloc_info+0x40/0x58
[   19.388250]  __kasan_kmalloc+0xd4/0xd8
[   19.388432]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.388500]  kasan_atomics+0xb8/0x2e0
[   19.388540]  kunit_try_run_case+0x170/0x3f0
[   19.388580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.388626]  kthread+0x328/0x630
[   19.388660]  ret_from_fork+0x10/0x20
[   19.388696] 
[   19.388718] The buggy address belongs to the object at fff00000c7ab9600
[   19.388718]  which belongs to the cache kmalloc-64 of size 64
[   19.388776] The buggy address is located 0 bytes to the right of
[   19.388776]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.388842] 
[   19.388885] The buggy address belongs to the physical page:
[   19.388920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.388972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.389021] page_type: f5(slab)
[   19.389059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.389110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.389152] page dumped because: kasan: bad access detected
[   19.389186] 
[   19.389205] Memory state around the buggy address:
[   19.389508] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.390473] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.391380]  __kasan_check_write+0x20/0x30
[   19.391904] 
[   19.391943] Allocated by task 265:
[   19.392001]  kasan_save_stack+0x3c/0x68
[   19.392046]  kasan_save_track+0x20/0x40
[   19.392118]  kasan_save_alloc_info+0x40/0x58
[   19.392196]  __kasan_kmalloc+0xd4/0xd8
[   19.392281]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.392332]  kasan_atomics+0xb8/0x2e0
[   19.392379]  kunit_try_run_case+0x170/0x3f0
[   19.392419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.392473]  kthread+0x328/0x630
[   19.392539]  ret_from_fork+0x10/0x20
[   19.392576] 
[   19.392599] The buggy address belongs to the object at fff00000c7ab9600
[   19.392599]  which belongs to the cache kmalloc-64 of size 64
[   19.392776] The buggy address is located 0 bytes to the right of
[   19.392776]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.392919] 
[   19.393047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.394087]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.394315] ==================================================================
[   19.719765] ==================================================================
[   19.720143] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.720218] Read of size 8 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.720507] 
[   19.720806] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.720938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.721235] Hardware name: linux,dummy-virt (DT)
[   19.721292] Call trace:
[   19.721316]  show_stack+0x20/0x38 (C)
[   19.721383]  dump_stack_lvl+0x8c/0xd0
[   19.721834]  print_report+0x118/0x5d0
[   19.722302]  kasan_report+0xdc/0x128
[   19.722731]  __asan_report_load8_noabort+0x20/0x30
[   19.722897]  kasan_atomics_helper+0x3e20/0x4858
[   19.723057]  kasan_atomics+0x198/0x2e0
[   19.723199]  kunit_try_run_case+0x170/0x3f0
[   19.723250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.723492]  kthread+0x328/0x630
[   19.723704]  ret_from_fork+0x10/0x20
[   19.723988] 
[   19.724148] Allocated by task 265:
[   19.724197]  kasan_save_stack+0x3c/0x68
[   19.724444]  kasan_save_track+0x20/0x40
[   19.724646]  kasan_save_alloc_info+0x40/0x58
[   19.725130]  __kasan_kmalloc+0xd4/0xd8
[   19.725297]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.725412]  kasan_atomics+0xb8/0x2e0
[   19.725451]  kunit_try_run_case+0x170/0x3f0
[   19.725492]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.725536]  kthread+0x328/0x630
[   19.725572]  ret_from_fork+0x10/0x20
[   19.725608] 
[   19.725925] The buggy address belongs to the object at fff00000c7ab9600
[   19.725925]  which belongs to the cache kmalloc-64 of size 64
[   19.726412] The buggy address is located 0 bytes to the right of
[   19.726412]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.726499] 
[   19.726522] The buggy address belongs to the physical page:
[   19.727100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.727185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.727249] page_type: f5(slab)
[   19.727303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.727368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.727422] page dumped because: kasan: bad access detected
[   19.727457] 
[   19.727487] Memory state around the buggy address:
[   19.727532]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.727585]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.727641] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.727681]                                      ^
[   19.727717]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.727763]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.727812] ==================================================================
[   19.273888] ==================================================================
[   19.274899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   19.276181]  kasan_atomics_helper+0x414/0x4858
[   19.276240]  kasan_atomics+0x198/0x2e0
[   19.276845] 
[   19.278895]  __kasan_kmalloc+0xd4/0xd8
[   19.281364] The buggy address is located 0 bytes to the right of
[   19.281364]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.281786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.283145]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.284038]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.286315] Hardware name: linux,dummy-virt (DT)
[   19.287051] 
[   19.288765] 
[   19.289707] 
[   19.289944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.291719]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.292690]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.295024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.295819]  kasan_report+0xdc/0x128
[   19.296866]  kthread+0x328/0x630
[   19.297656]  kasan_save_track+0x20/0x40
[   19.298091]  kunit_try_run_case+0x170/0x3f0
[   19.299615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.300157] page dumped because: kasan: bad access detected
[   19.301013]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.303655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   19.304391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.305344]  __kasan_check_write+0x20/0x30
[   19.305834]  kasan_save_alloc_info+0x40/0x58
[   19.306042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.306372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.306571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.306866]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.307110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   19.307778]  print_report+0x118/0x5d0
[   19.308821]  __kasan_check_write+0x20/0x30
[   19.309505]  kthread+0x328/0x630
[   19.309878]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.310115]  ret_from_fork+0x10/0x20
[   19.311844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.313272]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.314128]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.315898] 
[   19.316440]  __kasan_check_write+0x20/0x30
[   19.318665]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.320201] 
[   19.320230] The buggy address belongs to the physical page:
[   19.320403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.320663] page dumped because: kasan: bad access detected
[   19.320803]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.321052] ==================================================================
[   19.431979] ==================================================================
[   19.432020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.432065] Write of size 4 at addr fff00000c7ab9630 by task kunit_try_catch/265
[   19.432115] 
[   19.432144] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   19.432235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.432262] Hardware name: linux,dummy-virt (DT)
[   19.432295] Call trace:
[   19.436129]  show_stack+0x20/0x38 (C)
[   19.436335]  dump_stack_lvl+0x8c/0xd0
[   19.436392]  print_report+0x118/0x5d0
[   19.436830]  kasan_report+0xdc/0x128
[   19.436895]  kasan_check_range+0x100/0x1a8
[   19.437388]  __kasan_check_write+0x20/0x30
[   19.437902]  kasan_atomics_helper+0xd3c/0x4858
[   19.438154]  kasan_atomics+0x198/0x2e0
[   19.438548]  kunit_try_run_case+0x170/0x3f0
[   19.438785]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.438878]  kthread+0x328/0x630
[   19.438980]  ret_from_fork+0x10/0x20
[   19.439374] 
[   19.439605] Allocated by task 265:
[   19.439769]  kasan_save_stack+0x3c/0x68
[   19.439912]  kasan_save_track+0x20/0x40
[   19.440054]  kasan_save_alloc_info+0x40/0x58
[   19.440313]  __kasan_kmalloc+0xd4/0xd8
[   19.440577]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.440667]  kasan_atomics+0xb8/0x2e0
[   19.440720]  kunit_try_run_case+0x170/0x3f0
[   19.440774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.440821]  kthread+0x328/0x630
[   19.440860]  ret_from_fork+0x10/0x20
[   19.441418] 
[   19.441649] The buggy address belongs to the object at fff00000c7ab9600
[   19.441649]  which belongs to the cache kmalloc-64 of size 64
[   19.441988] The buggy address is located 0 bytes to the right of
[   19.441988]  allocated 48-byte region [fff00000c7ab9600, fff00000c7ab9630)
[   19.442117] 
[   19.442495] The buggy address belongs to the physical page:
[   19.442555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107ab9
[   19.442754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.443282] page_type: f5(slab)
[   19.443403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.443583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.443918] page dumped because: kasan: bad access detected
[   19.444074] 
[   19.444121] Memory state around the buggy address:
[   19.444464]  fff00000c7ab9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.444713]  fff00000c7ab9580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.444780] >fff00000c7ab9600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.445011]                                      ^
[   19.445057]  fff00000c7ab9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445317]  fff00000c7ab9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.445573] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   18.935540] ==================================================================
[   18.936033] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.936095] Read of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.936147] 
[   18.936186] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.936266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.936294] Hardware name: linux,dummy-virt (DT)
[   18.936339] Call trace:
[   18.936363]  show_stack+0x20/0x38 (C)
[   18.936425]  dump_stack_lvl+0x8c/0xd0
[   18.936473]  print_report+0x118/0x5d0
[   18.936529]  kasan_report+0xdc/0x128
[   18.936575]  __asan_report_load8_noabort+0x20/0x30
[   18.936630]  kasan_bitops_modify.constprop.0+0xa44/0xbc0
[   18.936683]  kasan_bitops_generic+0x110/0x1c8
[   18.936792]  kunit_try_run_case+0x170/0x3f0
[   18.936843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.936898]  kthread+0x328/0x630
[   18.936942]  ret_from_fork+0x10/0x20
[   18.936993] 
[   18.937013] Allocated by task 261:
[   18.937066]  kasan_save_stack+0x3c/0x68
[   18.937108]  kasan_save_track+0x20/0x40
[   18.937148]  kasan_save_alloc_info+0x40/0x58
[   18.937189]  __kasan_kmalloc+0xd4/0xd8
[   18.937235]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.937276]  kasan_bitops_generic+0xa0/0x1c8
[   18.937314]  kunit_try_run_case+0x170/0x3f0
[   18.937364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.937529]  kthread+0x328/0x630
[   18.937586]  ret_from_fork+0x10/0x20
[   18.937624] 
[   18.937705] The buggy address belongs to the object at fff00000c5a02c60
[   18.937705]  which belongs to the cache kmalloc-16 of size 16
[   18.937809] The buggy address is located 8 bytes inside of
[   18.937809]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.937871] 
[   18.937893] The buggy address belongs to the physical page:
[   18.937925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.937980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.938027] page_type: f5(slab)
[   18.938068] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.938120] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.938178] page dumped because: kasan: bad access detected
[   18.938274] 
[   18.938361] Memory state around the buggy address:
[   18.938402]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.938525]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.938570] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.938609]                                                           ^
[   18.938651]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.938695]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.938734] ==================================================================
[   18.930477] ==================================================================
[   18.930547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.930612] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.930699] 
[   18.930735] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.930819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.930848] Hardware name: linux,dummy-virt (DT)
[   18.930882] Call trace:
[   18.930913]  show_stack+0x20/0x38 (C)
[   18.931114]  dump_stack_lvl+0x8c/0xd0
[   18.931249]  print_report+0x118/0x5d0
[   18.931364]  kasan_report+0xdc/0x128
[   18.931410]  kasan_check_range+0x100/0x1a8
[   18.931460]  __kasan_check_write+0x20/0x30
[   18.931506]  kasan_bitops_modify.constprop.0+0x100/0xbc0
[   18.931558]  kasan_bitops_generic+0x110/0x1c8
[   18.931605]  kunit_try_run_case+0x170/0x3f0
[   18.931654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.931707]  kthread+0x328/0x630
[   18.931751]  ret_from_fork+0x10/0x20
[   18.931800] 
[   18.931820] Allocated by task 261:
[   18.931849]  kasan_save_stack+0x3c/0x68
[   18.931891]  kasan_save_track+0x20/0x40
[   18.931930]  kasan_save_alloc_info+0x40/0x58
[   18.931972]  __kasan_kmalloc+0xd4/0xd8
[   18.932009]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.932051]  kasan_bitops_generic+0xa0/0x1c8
[   18.932091]  kunit_try_run_case+0x170/0x3f0
[   18.932129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.932209]  kthread+0x328/0x630
[   18.932383]  ret_from_fork+0x10/0x20
[   18.932426] 
[   18.932447] The buggy address belongs to the object at fff00000c5a02c60
[   18.932447]  which belongs to the cache kmalloc-16 of size 16
[   18.932550] The buggy address is located 8 bytes inside of
[   18.932550]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.932614] 
[   18.932636] The buggy address belongs to the physical page:
[   18.932667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.932722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.932772] page_type: f5(slab)
[   18.932812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.932865] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.932920] page dumped because: kasan: bad access detected
[   18.933165] 
[   18.933186] Memory state around the buggy address:
[   18.934011]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.934130]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.934213] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.934277]                                                           ^
[   18.934340]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934386]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.934426] ==================================================================
[   18.940469] ==================================================================
[   18.940581] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.940749] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.940801] 
[   18.940848] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.941120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.941838] Hardware name: linux,dummy-virt (DT)
[   18.942501] Call trace:
[   18.942687]  show_stack+0x20/0x38 (C)
[   18.942880]  dump_stack_lvl+0x8c/0xd0
[   18.942936]  print_report+0x118/0x5d0
[   18.943346]  kasan_report+0xdc/0x128
[   18.943409]  kasan_check_range+0x100/0x1a8
[   18.943890]  __kasan_check_write+0x20/0x30
[   18.943939]  kasan_bitops_modify.constprop.0+0x1dc/0xbc0
[   18.943992]  kasan_bitops_generic+0x110/0x1c8
[   18.944515]  kunit_try_run_case+0x170/0x3f0
[   18.944800]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.944900]  kthread+0x328/0x630
[   18.944946]  ret_from_fork+0x10/0x20
[   18.944994] 
[   18.945016] Allocated by task 261:
[   18.945279]  kasan_save_stack+0x3c/0x68
[   18.945351]  kasan_save_track+0x20/0x40
[   18.945598]  kasan_save_alloc_info+0x40/0x58
[   18.945642]  __kasan_kmalloc+0xd4/0xd8
[   18.945680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.946286]  kasan_bitops_generic+0xa0/0x1c8
[   18.946702]  kunit_try_run_case+0x170/0x3f0
[   18.946749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.946931]  kthread+0x328/0x630
[   18.947269]  ret_from_fork+0x10/0x20
[   18.947557] 
[   18.947587] The buggy address belongs to the object at fff00000c5a02c60
[   18.947587]  which belongs to the cache kmalloc-16 of size 16
[   18.947961] The buggy address is located 8 bytes inside of
[   18.947961]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.948038] 
[   18.948290] The buggy address belongs to the physical page:
[   18.948353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.948411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.949109] page_type: f5(slab)
[   18.949355] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.949450] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.949501] page dumped because: kasan: bad access detected
[   18.949800] 
[   18.950016] Memory state around the buggy address:
[   18.950055]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.950382]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.950723] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.950965]                                                           ^
[   18.951016]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.951429]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.951496] ==================================================================
[   18.963422] ==================================================================
[   18.963477] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.964846] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.964934] 
[   18.964969] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.965442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.965503] Hardware name: linux,dummy-virt (DT)
[   18.965787] Call trace:
[   18.965868]  show_stack+0x20/0x38 (C)
[   18.966160]  dump_stack_lvl+0x8c/0xd0
[   18.966412]  print_report+0x118/0x5d0
[   18.966463]  kasan_report+0xdc/0x128
[   18.966512]  kasan_check_range+0x100/0x1a8
[   18.967228]  __kasan_check_write+0x20/0x30
[   18.967348]  kasan_bitops_modify.constprop.0+0x2b4/0xbc0
[   18.967403]  kasan_bitops_generic+0x110/0x1c8
[   18.967452]  kunit_try_run_case+0x170/0x3f0
[   18.967500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.967555]  kthread+0x328/0x630
[   18.967600]  ret_from_fork+0x10/0x20
[   18.967649] 
[   18.967670] Allocated by task 261:
[   18.967700]  kasan_save_stack+0x3c/0x68
[   18.967743]  kasan_save_track+0x20/0x40
[   18.967782]  kasan_save_alloc_info+0x40/0x58
[   18.967825]  __kasan_kmalloc+0xd4/0xd8
[   18.967862]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.967904]  kasan_bitops_generic+0xa0/0x1c8
[   18.967944]  kunit_try_run_case+0x170/0x3f0
[   18.967982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.968028]  kthread+0x328/0x630
[   18.968063]  ret_from_fork+0x10/0x20
[   18.968471] 
[   18.968531] The buggy address belongs to the object at fff00000c5a02c60
[   18.968531]  which belongs to the cache kmalloc-16 of size 16
[   18.969187] The buggy address is located 8 bytes inside of
[   18.969187]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.969350] 
[   18.969376] The buggy address belongs to the physical page:
[   18.969409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.969463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.969513] page_type: f5(slab)
[   18.969554] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.969606] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.969648] page dumped because: kasan: bad access detected
[   18.969785] 
[   18.970185] Memory state around the buggy address:
[   18.970224]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.970771]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.970844] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.971724]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.974184]  __kasan_check_write+0x20/0x30
[   18.978212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.981207] page dumped because: kasan: bad access detected
[   18.986304] 
[   18.988952]  kasan_bitops_generic+0x110/0x1c8
[   18.992234]  kunit_try_run_case+0x170/0x3f0
[   18.992958] page_type: f5(slab)
[   18.993309]                                                           ^
[   18.995371] Write of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.995422] 
[   18.995458] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.995540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.996005] Hardware name: linux,dummy-virt (DT)
[   18.996054] Call trace:
[   18.996083]  show_stack+0x20/0x38 (C)
[   18.997149]  dump_stack_lvl+0x8c/0xd0
[   18.997222]  print_report+0x118/0x5d0
[   18.997274]  kasan_report+0xdc/0x128
[   18.997666]  kasan_check_range+0x100/0x1a8
[   18.997978]  __kasan_check_write+0x20/0x30
[   18.998152]  kasan_bitops_modify.constprop.0+0x344/0xbc0
[   19.000384]  kasan_save_stack+0x3c/0x68
[   19.000606]  kasan_bitops_generic+0xa0/0x1c8
[   19.002057]  ret_from_fork+0x10/0x20
[   19.002889] The buggy address is located 8 bytes inside of
[   19.002889]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   19.006018]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   19.007096] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   19.011929] ==================================================================
[   18.952570] ==================================================================
[   18.953366] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.953452] Read of size 8 at addr fff00000c5a02c68 by task kunit_try_catch/261
[   18.953606] 
[   18.953650] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.953834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.954047] Hardware name: linux,dummy-virt (DT)
[   18.954081] Call trace:
[   18.954253]  show_stack+0x20/0x38 (C)
[   18.954330]  dump_stack_lvl+0x8c/0xd0
[   18.954380]  print_report+0x118/0x5d0
[   18.954852]  kasan_report+0xdc/0x128
[   18.955088]  __asan_report_load8_noabort+0x20/0x30
[   18.955156]  kasan_bitops_modify.constprop.0+0xa80/0xbc0
[   18.955873]  kasan_bitops_generic+0x110/0x1c8
[   18.955937]  kunit_try_run_case+0x170/0x3f0
[   18.956605]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.956835]  kthread+0x328/0x630
[   18.956882]  ret_from_fork+0x10/0x20
[   18.957334] 
[   18.957437] Allocated by task 261:
[   18.957609]  kasan_save_stack+0x3c/0x68
[   18.957663]  kasan_save_track+0x20/0x40
[   18.957702]  kasan_save_alloc_info+0x40/0x58
[   18.957743]  __kasan_kmalloc+0xd4/0xd8
[   18.957780]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.958366]  kasan_bitops_generic+0xa0/0x1c8
[   18.958415]  kunit_try_run_case+0x170/0x3f0
[   18.958456]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.958502]  kthread+0x328/0x630
[   18.958536]  ret_from_fork+0x10/0x20
[   18.958746] 
[   18.958771] The buggy address belongs to the object at fff00000c5a02c60
[   18.958771]  which belongs to the cache kmalloc-16 of size 16
[   18.959124] The buggy address is located 8 bytes inside of
[   18.959124]  allocated 9-byte region [fff00000c5a02c60, fff00000c5a02c69)
[   18.959227] 
[   18.959532] The buggy address belongs to the physical page:
[   18.959572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   18.959892] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.960097] page_type: f5(slab)
[   18.960221] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   18.960375] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   18.960525] page dumped because: kasan: bad access detected
[   18.960565] 
[   18.960586] Memory state around the buggy address:
[   18.961439]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   18.961541]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   18.961645] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   18.961745]                                                           ^
[   18.961999]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.962215]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.962261] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[   18.922612] ==================================================================
[   18.922676] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   18.922723] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259
[   18.922775] 
[   18.922809] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.922893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.922922] Hardware name: linux,dummy-virt (DT)
[   18.922955] Call trace:
[   18.922980]  show_stack+0x20/0x38 (C)
[   18.923031]  dump_stack_lvl+0x8c/0xd0
[   18.923080]  print_report+0x118/0x5d0
[   18.923129]  kasan_report+0xdc/0x128
[   18.923176]  __asan_report_load1_noabort+0x20/0x30
[   18.923228]  strnlen+0x80/0x88
[   18.923271]  kasan_strings+0x478/0xb00
[   18.923316]  kunit_try_run_case+0x170/0x3f0
[   18.923375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.923430]  kthread+0x328/0x630
[   18.923472]  ret_from_fork+0x10/0x20
[   18.923521] 
[   18.923542] Allocated by task 259:
[   18.923571]  kasan_save_stack+0x3c/0x68
[   18.923612]  kasan_save_track+0x20/0x40
[   18.923652]  kasan_save_alloc_info+0x40/0x58
[   18.923694]  __kasan_kmalloc+0xd4/0xd8
[   18.923732]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.923777]  kasan_strings+0xc8/0xb00
[   18.923814]  kunit_try_run_case+0x170/0x3f0
[   18.923854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.923900]  kthread+0x328/0x630
[   18.923933]  ret_from_fork+0x10/0x20
[   18.923971] 
[   18.923992] Freed by task 259:
[   18.924019]  kasan_save_stack+0x3c/0x68
[   18.924059]  kasan_save_track+0x20/0x40
[   18.924096]  kasan_save_free_info+0x4c/0x78
[   18.924138]  __kasan_slab_free+0x6c/0x98
[   18.924181]  kfree+0x214/0x3c8
[   18.924217]  kasan_strings+0x24c/0xb00
[   18.924252]  kunit_try_run_case+0x170/0x3f0
[   18.924298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.924439]  kthread+0x328/0x630
[   18.924473]  ret_from_fork+0x10/0x20
[   18.924583] 
[   18.924635] The buggy address belongs to the object at fff00000c7a5ef80
[   18.924635]  which belongs to the cache kmalloc-32 of size 32
[   18.924840] The buggy address is located 16 bytes inside of
[   18.924840]  freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0)
[   18.924966] 
[   18.925087] The buggy address belongs to the physical page:
[   18.925145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e
[   18.925201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.925267] page_type: f5(slab)
[   18.925354] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.925487] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   18.925555] page dumped because: kasan: bad access detected
[   18.925701] 
[   18.925722] Memory state around the buggy address:
[   18.925755]  fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.925800]  fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.925844] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.925886]                          ^
[   18.925920]  fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.925964]  fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.926004] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[   18.907359] ==================================================================
[   18.907567] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   18.907784] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259
[   18.908109] 
[   18.908539] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.908781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.909142] Hardware name: linux,dummy-virt (DT)
[   18.909847] Call trace:
[   18.909912]  show_stack+0x20/0x38 (C)
[   18.910169]  dump_stack_lvl+0x8c/0xd0
[   18.910442]  print_report+0x118/0x5d0
[   18.910626]  kasan_report+0xdc/0x128
[   18.910676]  __asan_report_load1_noabort+0x20/0x30
[   18.910730]  strlen+0xa8/0xb0
[   18.911850]  kasan_strings+0x418/0xb00
[   18.912884]  kunit_try_run_case+0x170/0x3f0
[   18.913201]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.913276]  kthread+0x328/0x630
[   18.913334]  ret_from_fork+0x10/0x20
[   18.913387] 
[   18.913408] Allocated by task 259:
[   18.913438]  kasan_save_stack+0x3c/0x68
[   18.913483]  kasan_save_track+0x20/0x40
[   18.913520]  kasan_save_alloc_info+0x40/0x58
[   18.913918]  __kasan_kmalloc+0xd4/0xd8
[   18.913971]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.914014]  kasan_strings+0xc8/0xb00
[   18.914052]  kunit_try_run_case+0x170/0x3f0
[   18.914340]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.914946]  kthread+0x328/0x630
[   18.915096]  ret_from_fork+0x10/0x20
[   18.915138] 
[   18.915161] Freed by task 259:
[   18.915190]  kasan_save_stack+0x3c/0x68
[   18.915384]  kasan_save_track+0x20/0x40
[   18.915955]  kasan_save_free_info+0x4c/0x78
[   18.916310]  __kasan_slab_free+0x6c/0x98
[   18.916682]  kfree+0x214/0x3c8
[   18.916857]  kasan_strings+0x24c/0xb00
[   18.916896]  kunit_try_run_case+0x170/0x3f0
[   18.917167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.917371]  kthread+0x328/0x630
[   18.917465]  ret_from_fork+0x10/0x20
[   18.917779] 
[   18.917872] The buggy address belongs to the object at fff00000c7a5ef80
[   18.917872]  which belongs to the cache kmalloc-32 of size 32
[   18.918066] The buggy address is located 16 bytes inside of
[   18.918066]  freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0)
[   18.918612] 
[   18.918649] The buggy address belongs to the physical page:
[   18.918774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e
[   18.919231] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.919289] page_type: f5(slab)
[   18.919578] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.919888] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   18.920100] page dumped because: kasan: bad access detected
[   18.920139] 
[   18.920364] Memory state around the buggy address:
[   18.920406]  fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.920869]  fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.920921] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.922034]                          ^
[   18.922086]  fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.922134]  fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.922175] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[   18.898411] ==================================================================
[   18.898955] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00
[   18.899011] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259
[   18.899066] 
[   18.899101] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.899185] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.899214] Hardware name: linux,dummy-virt (DT)
[   18.899247] Call trace:
[   18.899274]  show_stack+0x20/0x38 (C)
[   18.899335]  dump_stack_lvl+0x8c/0xd0
[   18.899386]  print_report+0x118/0x5d0
[   18.899434]  kasan_report+0xdc/0x128
[   18.899482]  __asan_report_load1_noabort+0x20/0x30
[   18.899535]  kasan_strings+0x95c/0xb00
[   18.899582]  kunit_try_run_case+0x170/0x3f0
[   18.899631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.899686]  kthread+0x328/0x630
[   18.899728]  ret_from_fork+0x10/0x20
[   18.899778] 
[   18.899800] Allocated by task 259:
[   18.899829]  kasan_save_stack+0x3c/0x68
[   18.899872]  kasan_save_track+0x20/0x40
[   18.899913]  kasan_save_alloc_info+0x40/0x58
[   18.899956]  __kasan_kmalloc+0xd4/0xd8
[   18.899996]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.900038]  kasan_strings+0xc8/0xb00
[   18.900077]  kunit_try_run_case+0x170/0x3f0
[   18.900116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.900167]  kthread+0x328/0x630
[   18.900202]  ret_from_fork+0x10/0x20
[   18.900240] 
[   18.900260] Freed by task 259:
[   18.900286]  kasan_save_stack+0x3c/0x68
[   18.900337]  kasan_save_track+0x20/0x40
[   18.900375]  kasan_save_free_info+0x4c/0x78
[   18.900417]  __kasan_slab_free+0x6c/0x98
[   18.900456]  kfree+0x214/0x3c8
[   18.900491]  kasan_strings+0x24c/0xb00
[   18.901202]  kunit_try_run_case+0x170/0x3f0
[   18.901275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.901344]  kthread+0x328/0x630
[   18.901390]  ret_from_fork+0x10/0x20
[   18.901430] 
[   18.901453] The buggy address belongs to the object at fff00000c7a5ef80
[   18.901453]  which belongs to the cache kmalloc-32 of size 32
[   18.901515] The buggy address is located 16 bytes inside of
[   18.901515]  freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0)
[   18.901577] 
[   18.901601] The buggy address belongs to the physical page:
[   18.901948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e
[   18.902122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.902297] page_type: f5(slab)
[   18.902352] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.902404] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   18.902445] page dumped because: kasan: bad access detected
[   18.902479] 
[   18.903653] Memory state around the buggy address:
[   18.904732]  fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.904787]  fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.905490] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.905538]                          ^
[   18.905570]  fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.905616]  fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.905659] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[   18.891757] ==================================================================
[   18.891908] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   18.892000] Read of size 1 at addr fff00000c7a5ef90 by task kunit_try_catch/259
[   18.892053] 
[   18.892106] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.892198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.892293] Hardware name: linux,dummy-virt (DT)
[   18.892363] Call trace:
[   18.892410]  show_stack+0x20/0x38 (C)
[   18.892465]  dump_stack_lvl+0x8c/0xd0
[   18.892522]  print_report+0x118/0x5d0
[   18.892610]  kasan_report+0xdc/0x128
[   18.892733]  __asan_report_load1_noabort+0x20/0x30
[   18.892799]  strcmp+0xc0/0xc8
[   18.892842]  kasan_strings+0x340/0xb00
[   18.892896]  kunit_try_run_case+0x170/0x3f0
[   18.892946]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.893001]  kthread+0x328/0x630
[   18.893044]  ret_from_fork+0x10/0x20
[   18.893095] 
[   18.893403] Allocated by task 259:
[   18.893472]  kasan_save_stack+0x3c/0x68
[   18.893669]  kasan_save_track+0x20/0x40
[   18.893753]  kasan_save_alloc_info+0x40/0x58
[   18.893904]  __kasan_kmalloc+0xd4/0xd8
[   18.894072]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.894121]  kasan_strings+0xc8/0xb00
[   18.894159]  kunit_try_run_case+0x170/0x3f0
[   18.894200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.894247]  kthread+0x328/0x630
[   18.894283]  ret_from_fork+0x10/0x20
[   18.894330] 
[   18.894425] Freed by task 259:
[   18.894616]  kasan_save_stack+0x3c/0x68
[   18.894680]  kasan_save_track+0x20/0x40
[   18.894905]  kasan_save_free_info+0x4c/0x78
[   18.895095]  __kasan_slab_free+0x6c/0x98
[   18.895203]  kfree+0x214/0x3c8
[   18.895388]  kasan_strings+0x24c/0xb00
[   18.895444]  kunit_try_run_case+0x170/0x3f0
[   18.895496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.895543]  kthread+0x328/0x630
[   18.895584]  ret_from_fork+0x10/0x20
[   18.895625] 
[   18.895666] The buggy address belongs to the object at fff00000c7a5ef80
[   18.895666]  which belongs to the cache kmalloc-32 of size 32
[   18.895741] The buggy address is located 16 bytes inside of
[   18.895741]  freed 32-byte region [fff00000c7a5ef80, fff00000c7a5efa0)
[   18.895804] 
[   18.895845] The buggy address belongs to the physical page:
[   18.895881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e
[   18.895947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.896000] page_type: f5(slab)
[   18.896042] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.896095] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   18.896148] page dumped because: kasan: bad access detected
[   18.896184] 
[   18.896206] Memory state around the buggy address:
[   18.896250]  fff00000c7a5ee80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.896296]  fff00000c7a5ef00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.896827] >fff00000c7a5ef80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   18.896925]                          ^
[   18.897088]  fff00000c7a5f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.897151]  fff00000c7a5f080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.898027] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   18.879292] ==================================================================
[   18.879512] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8
[   18.879666] Read of size 1 at addr fff00000c7a5edd8 by task kunit_try_catch/257
[   18.879722] 
[   18.879806] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.879962] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.880047] Hardware name: linux,dummy-virt (DT)
[   18.880085] Call trace:
[   18.880123]  show_stack+0x20/0x38 (C)
[   18.880211]  dump_stack_lvl+0x8c/0xd0
[   18.880262]  print_report+0x118/0x5d0
[   18.880357]  kasan_report+0xdc/0x128
[   18.880433]  __asan_report_load1_noabort+0x20/0x30
[   18.880508]  memcmp+0x198/0x1d8
[   18.880568]  kasan_memcmp+0x16c/0x300
[   18.880674]  kunit_try_run_case+0x170/0x3f0
[   18.880799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.880856]  kthread+0x328/0x630
[   18.880914]  ret_from_fork+0x10/0x20
[   18.880966] 
[   18.880988] Allocated by task 257:
[   18.881019]  kasan_save_stack+0x3c/0x68
[   18.881063]  kasan_save_track+0x20/0x40
[   18.881103]  kasan_save_alloc_info+0x40/0x58
[   18.881291]  __kasan_kmalloc+0xd4/0xd8
[   18.881529]  __kmalloc_cache_noprof+0x16c/0x3c0
[   18.881647]  kasan_memcmp+0xbc/0x300
[   18.881744]  kunit_try_run_case+0x170/0x3f0
[   18.881852]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.881957]  kthread+0x328/0x630
[   18.882076]  ret_from_fork+0x10/0x20
[   18.882163] 
[   18.882206] The buggy address belongs to the object at fff00000c7a5edc0
[   18.882206]  which belongs to the cache kmalloc-32 of size 32
[   18.882296] The buggy address is located 0 bytes to the right of
[   18.882296]  allocated 24-byte region [fff00000c7a5edc0, fff00000c7a5edd8)
[   18.882405] 
[   18.882428] The buggy address belongs to the physical page:
[   18.882602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5e
[   18.882709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.882933] page_type: f5(slab)
[   18.883005] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   18.883097] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   18.883180] page dumped because: kasan: bad access detected
[   18.883232] 
[   18.883264] Memory state around the buggy address:
[   18.883315]  fff00000c7a5ec80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.883370]  fff00000c7a5ed00: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc
[   18.883423] >fff00000c7a5ed80: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   18.883466]                                                     ^
[   18.883505]  fff00000c7a5ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.883559]  fff00000c7a5ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.883620] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   18.866969] ==================================================================
[   18.867029] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340
[   18.867082] Read of size 1 at addr ffff800080b27b4a by task kunit_try_catch/253
[   18.867133] 
[   18.867167] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.867251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.867280] Hardware name: linux,dummy-virt (DT)
[   18.867313] Call trace:
[   18.867360]  show_stack+0x20/0x38 (C)
[   18.867411]  dump_stack_lvl+0x8c/0xd0
[   18.867476]  print_report+0x310/0x5d0
[   18.867526]  kasan_report+0xdc/0x128
[   18.867572]  __asan_report_load1_noabort+0x20/0x30
[   18.867627]  kasan_alloca_oob_right+0x2dc/0x340
[   18.867697]  kunit_try_run_case+0x170/0x3f0
[   18.867748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.867802]  kthread+0x328/0x630
[   18.867847]  ret_from_fork+0x10/0x20
[   18.867897] 
[   18.867922] The buggy address belongs to stack of task kunit_try_catch/253
[   18.867975] 
[   18.867997] The buggy address ffff800080b27b4a belongs to a vmalloc virtual mapping
[   18.868039] The buggy address belongs to the physical page:
[   18.868077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a58
[   18.868134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.868208] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.868261] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.868303] page dumped because: kasan: bad access detected
[   18.868347] 
[   18.868375] Memory state around the buggy address:
[   18.868419]  ffff800080b27a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.868481]  ffff800080b27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.868525] >ffff800080b27b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   18.868565]                                               ^
[   18.868604]  ffff800080b27b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2
[   18.868647]  ffff800080b27c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.868688] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   18.847954] ==================================================================
[   18.848058] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270
[   18.848114] Read of size 1 at addr ffff800080ac7c2a by task kunit_try_catch/249
[   18.848170] 
[   18.848206] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.848289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.848937] Hardware name: linux,dummy-virt (DT)
[   18.848977] Call trace:
[   18.849001]  show_stack+0x20/0x38 (C)
[   18.849050]  dump_stack_lvl+0x8c/0xd0
[   18.849117]  print_report+0x310/0x5d0
[   18.849302]  kasan_report+0xdc/0x128
[   18.849419]  __asan_report_load1_noabort+0x20/0x30
[   18.849607]  kasan_stack_oob+0x238/0x270
[   18.849721]  kunit_try_run_case+0x170/0x3f0
[   18.849978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.850036]  kthread+0x328/0x630
[   18.850101]  ret_from_fork+0x10/0x20
[   18.850282] 
[   18.850353] The buggy address belongs to stack of task kunit_try_catch/249
[   18.850670]  and is located at offset 138 in frame:
[   18.850813]  kasan_stack_oob+0x0/0x270
[   18.851297] 
[   18.851409] This frame has 4 objects:
[   18.851688]  [48, 49) '__assertion'
[   18.851732]  [64, 72) 'array'
[   18.851767]  [96, 112) '__assertion'
[   18.851871]  [128, 138) 'stack_array'
[   18.852089] 
[   18.852160] The buggy address ffff800080ac7c2a belongs to a vmalloc virtual mapping
[   18.852287] The buggy address belongs to the physical page:
[   18.852363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794b
[   18.852451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.852865] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.852919] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.852983] page dumped because: kasan: bad access detected
[   18.853018] 
[   18.853039] Memory state around the buggy address:
[   18.853074]  ffff800080ac7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.853274]  ffff800080ac7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2
[   18.853332] >ffff800080ac7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00
[   18.853370]                                   ^
[   18.853552]  ffff800080ac7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2
[   18.853646]  ffff800080ac7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00
[   18.853732] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   18.834414] ==================================================================
[   18.834479] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270
[   18.834536] Read of size 1 at addr ffffaeee5cb4f58d by task kunit_try_catch/245
[   18.834599] 
[   18.834726] CPU: 1 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.834809] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.834836] Hardware name: linux,dummy-virt (DT)
[   18.834868] Call trace:
[   18.834910]  show_stack+0x20/0x38 (C)
[   18.834962]  dump_stack_lvl+0x8c/0xd0
[   18.835511]  print_report+0x310/0x5d0
[   18.835569]  kasan_report+0xdc/0x128
[   18.835669]  __asan_report_load1_noabort+0x20/0x30
[   18.835799]  kasan_global_oob_right+0x230/0x270
[   18.835847]  kunit_try_run_case+0x170/0x3f0
[   18.835904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.836011]  kthread+0x328/0x630
[   18.836112]  ret_from_fork+0x10/0x20
[   18.836176] 
[   18.836226] The buggy address belongs to the variable:
[   18.836268]  global_array+0xd/0x40
[   18.836446] 
[   18.836528] The buggy address ffffaeee5cb4f58d belongs to a vmalloc virtual mapping
[   18.836677] The buggy address belongs to the physical page:
[   18.836721] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4f
[   18.836777] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[   18.837104] raw: 03fffe0000002000 ffffc1ffc01f53c8 ffffc1ffc01f53c8 0000000000000000
[   18.837202] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.837242] page dumped because: kasan: bad access detected
[   18.837294] 
[   18.837312] Memory state around the buggy address:
[   18.837354]  ffffaeee5cb4f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.837398]  ffffaeee5cb4f500: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9
[   18.837475] >ffffaeee5cb4f580: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
[   18.837534]                       ^
[   18.837562]  ffffaeee5cb4f600: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
[   18.837604]  ffffaeee5cb4f680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.837643] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[   18.821432] ==================================================================
[   18.821578] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.821642] Free of addr fff00000c7a74001 by task kunit_try_catch/243
[   18.821836] 
[   18.821875] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.821957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.821984] Hardware name: linux,dummy-virt (DT)
[   18.822042] Call trace:
[   18.822175]  show_stack+0x20/0x38 (C)
[   18.822301]  dump_stack_lvl+0x8c/0xd0
[   18.822443]  print_report+0x118/0x5d0
[   18.822491]  kasan_report_invalid_free+0xc0/0xe8
[   18.822541]  __kasan_mempool_poison_object+0xfc/0x150
[   18.822594]  mempool_free+0x28c/0x328
[   18.822842]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.822898]  mempool_kmalloc_large_invalid_free+0xc0/0x118
[   18.822950]  kunit_try_run_case+0x170/0x3f0
[   18.822997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.823060]  kthread+0x328/0x630
[   18.823183]  ret_from_fork+0x10/0x20
[   18.823232] 
[   18.823252] The buggy address belongs to the physical page:
[   18.823286] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74
[   18.823350] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.823594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.823712] page_type: f8(unknown)
[   18.823858] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.824024] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.824098] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.824159] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.824483] head: 0bfffe0000000002 ffffc1ffc31e9d01 00000000ffffffff 00000000ffffffff
[   18.824573] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.824672] page dumped because: kasan: bad access detected
[   18.824704] 
[   18.824753] Memory state around the buggy address:
[   18.824931]  fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.824975]  fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.825161] >fff00000c7a74000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.825200]                    ^
[   18.825228]  fff00000c7a74080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.826654]  fff00000c7a74100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.826816] ==================================================================
[   18.809210] ==================================================================
[   18.809290] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.809495] Free of addr fff00000c7a4e901 by task kunit_try_catch/241
[   18.809538] 
[   18.809577] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.809687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.809714] Hardware name: linux,dummy-virt (DT)
[   18.809746] Call trace:
[   18.809770]  show_stack+0x20/0x38 (C)
[   18.809822]  dump_stack_lvl+0x8c/0xd0
[   18.809891]  print_report+0x118/0x5d0
[   18.809967]  kasan_report_invalid_free+0xc0/0xe8
[   18.810128]  check_slab_allocation+0xfc/0x108
[   18.810189]  __kasan_mempool_poison_object+0x78/0x150
[   18.810240]  mempool_free+0x28c/0x328
[   18.810287]  mempool_kmalloc_invalid_free_helper+0x118/0x2a8
[   18.810348]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.810398]  kunit_try_run_case+0x170/0x3f0
[   18.810447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.810500]  kthread+0x328/0x630
[   18.810545]  ret_from_fork+0x10/0x20
[   18.810595] 
[   18.810613] Allocated by task 241:
[   18.810643]  kasan_save_stack+0x3c/0x68
[   18.810695]  kasan_save_track+0x20/0x40
[   18.810734]  kasan_save_alloc_info+0x40/0x58
[   18.810772]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.810836]  remove_element+0x130/0x1f8
[   18.810884]  mempool_alloc_preallocated+0x58/0xc0
[   18.810923]  mempool_kmalloc_invalid_free_helper+0x94/0x2a8
[   18.810966]  mempool_kmalloc_invalid_free+0xc0/0x118
[   18.811008]  kunit_try_run_case+0x170/0x3f0
[   18.811044]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.811115]  kthread+0x328/0x630
[   18.811148]  ret_from_fork+0x10/0x20
[   18.811184] 
[   18.811203] The buggy address belongs to the object at fff00000c7a4e900
[   18.811203]  which belongs to the cache kmalloc-128 of size 128
[   18.811262] The buggy address is located 1 bytes inside of
[   18.811262]  128-byte region [fff00000c7a4e900, fff00000c7a4e980)
[   18.811331] 
[   18.811353] The buggy address belongs to the physical page:
[   18.811383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   18.811437] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.811487] page_type: f5(slab)
[   18.811529] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.811579] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.811619] page dumped because: kasan: bad access detected
[   18.811662] 
[   18.811681] Memory state around the buggy address:
[   18.811714]  fff00000c7a4e800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.811776]  fff00000c7a4e880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.811819] >fff00000c7a4e900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.811858]                    ^
[   18.811884]  fff00000c7a4e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.811953]  fff00000c7a4ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.812026] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[   18.788028] ==================================================================
[   18.788099] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.788491] Free of addr fff00000c7a74000 by task kunit_try_catch/239
[   18.788673] 
[   18.788825] CPU: 1 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.788947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.788986] Hardware name: linux,dummy-virt (DT)
[   18.789017] Call trace:
[   18.789043]  show_stack+0x20/0x38 (C)
[   18.789096]  dump_stack_lvl+0x8c/0xd0
[   18.789686]  print_report+0x118/0x5d0
[   18.789917]  kasan_report_invalid_free+0xc0/0xe8
[   18.790018]  __kasan_mempool_poison_pages+0xe0/0xe8
[   18.790628]  mempool_free+0x24c/0x328
[   18.790714]  mempool_double_free_helper+0x150/0x2e8
[   18.790928]  mempool_page_alloc_double_free+0xbc/0x118
[   18.791061]  kunit_try_run_case+0x170/0x3f0
[   18.791159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.791433]  kthread+0x328/0x630
[   18.791550]  ret_from_fork+0x10/0x20
[   18.791876] 
[   18.791944] The buggy address belongs to the physical page:
[   18.791997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74
[   18.792068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.792312] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.792564] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.792648] page dumped because: kasan: bad access detected
[   18.792706] 
[   18.792742] Memory state around the buggy address:
[   18.792817]  fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.792951]  fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.793002] >fff00000c7a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.793040]                    ^
[   18.793068]  fff00000c7a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.793587]  fff00000c7a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.793683] ==================================================================
[   18.774265] ==================================================================
[   18.774351] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.774409] Free of addr fff00000c7a74000 by task kunit_try_catch/237
[   18.774451] 
[   18.774499] CPU: 1 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.774581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.774611] Hardware name: linux,dummy-virt (DT)
[   18.774644] Call trace:
[   18.774666]  show_stack+0x20/0x38 (C)
[   18.774715]  dump_stack_lvl+0x8c/0xd0
[   18.774774]  print_report+0x118/0x5d0
[   18.774825]  kasan_report_invalid_free+0xc0/0xe8
[   18.774876]  __kasan_mempool_poison_object+0x14c/0x150
[   18.774929]  mempool_free+0x28c/0x328
[   18.774983]  mempool_double_free_helper+0x150/0x2e8
[   18.775033]  mempool_kmalloc_large_double_free+0xc0/0x118
[   18.775084]  kunit_try_run_case+0x170/0x3f0
[   18.775131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.775191]  kthread+0x328/0x630
[   18.775234]  ret_from_fork+0x10/0x20
[   18.775283] 
[   18.775303] The buggy address belongs to the physical page:
[   18.775346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74
[   18.775679] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.775935] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.776628] page_type: f8(unknown)
[   18.776712] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.776765] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.776843] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.777694] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.777777] head: 0bfffe0000000002 ffffc1ffc31e9d01 00000000ffffffff 00000000ffffffff
[   18.777849] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.777924] page dumped because: kasan: bad access detected
[   18.777984] 
[   18.778019] Memory state around the buggy address:
[   18.778072]  fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778140]  fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778185] >fff00000c7a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778539]                    ^
[   18.778740]  fff00000c7a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778817]  fff00000c7a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.778893] ==================================================================
[   18.755153] ==================================================================
[   18.755232] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8
[   18.755295] Free of addr fff00000c7a4e500 by task kunit_try_catch/235
[   18.755349] 
[   18.755652] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.755785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.755826] Hardware name: linux,dummy-virt (DT)
[   18.755865] Call trace:
[   18.755892]  show_stack+0x20/0x38 (C)
[   18.755949]  dump_stack_lvl+0x8c/0xd0
[   18.756217]  print_report+0x118/0x5d0
[   18.756296]  kasan_report_invalid_free+0xc0/0xe8
[   18.756358]  check_slab_allocation+0xd4/0x108
[   18.756740]  __kasan_mempool_poison_object+0x78/0x150
[   18.756829]  mempool_free+0x28c/0x328
[   18.756961]  mempool_double_free_helper+0x150/0x2e8
[   18.757087]  mempool_kmalloc_double_free+0xc0/0x118
[   18.757147]  kunit_try_run_case+0x170/0x3f0
[   18.757496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.757640]  kthread+0x328/0x630
[   18.757716]  ret_from_fork+0x10/0x20
[   18.758069] 
[   18.758124] Allocated by task 235:
[   18.758176]  kasan_save_stack+0x3c/0x68
[   18.758309]  kasan_save_track+0x20/0x40
[   18.758384]  kasan_save_alloc_info+0x40/0x58
[   18.758426]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.758762]  remove_element+0x130/0x1f8
[   18.758834]  mempool_alloc_preallocated+0x58/0xc0
[   18.758932]  mempool_double_free_helper+0x94/0x2e8
[   18.759047]  mempool_kmalloc_double_free+0xc0/0x118
[   18.759106]  kunit_try_run_case+0x170/0x3f0
[   18.759145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.759410]  kthread+0x328/0x630
[   18.759590]  ret_from_fork+0x10/0x20
[   18.759637] 
[   18.759699] Freed by task 235:
[   18.759983]  kasan_save_stack+0x3c/0x68
[   18.760127]  kasan_save_track+0x20/0x40
[   18.760182]  kasan_save_free_info+0x4c/0x78
[   18.760486]  __kasan_mempool_poison_object+0xc0/0x150
[   18.760573]  mempool_free+0x28c/0x328
[   18.760650]  mempool_double_free_helper+0x100/0x2e8
[   18.760993]  mempool_kmalloc_double_free+0xc0/0x118
[   18.761109]  kunit_try_run_case+0x170/0x3f0
[   18.761198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.761314]  kthread+0x328/0x630
[   18.761381]  ret_from_fork+0x10/0x20
[   18.761439] 
[   18.761779] The buggy address belongs to the object at fff00000c7a4e500
[   18.761779]  which belongs to the cache kmalloc-128 of size 128
[   18.761961] The buggy address is located 0 bytes inside of
[   18.761961]  128-byte region [fff00000c7a4e500, fff00000c7a4e580)
[   18.762032] 
[   18.762055] The buggy address belongs to the physical page:
[   18.762088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   18.762433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.762589] page_type: f5(slab)
[   18.762648] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.762743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.762851] page dumped because: kasan: bad access detected
[   18.762917] 
[   18.762958] Memory state around the buggy address:
[   18.763350]  fff00000c7a4e400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.763449]  fff00000c7a4e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.763493] >fff00000c7a4e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.763531]                    ^
[   18.763578]  fff00000c7a4e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.763655]  fff00000c7a4e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.763733] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[   18.684233] ==================================================================
[   18.684303] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   18.684436] Read of size 1 at addr fff00000c7a6c000 by task kunit_try_catch/229
[   18.684579] 
[   18.684745] CPU: 1 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.684865] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.684893] Hardware name: linux,dummy-virt (DT)
[   18.684951] Call trace:
[   18.684978]  show_stack+0x20/0x38 (C)
[   18.685030]  dump_stack_lvl+0x8c/0xd0
[   18.685188]  print_report+0x118/0x5d0
[   18.685299]  kasan_report+0xdc/0x128
[   18.685413]  __asan_report_load1_noabort+0x20/0x30
[   18.685526]  mempool_uaf_helper+0x314/0x340
[   18.685584]  mempool_kmalloc_large_uaf+0xc4/0x120
[   18.685632]  kunit_try_run_case+0x170/0x3f0
[   18.685679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.685733]  kthread+0x328/0x630
[   18.685912]  ret_from_fork+0x10/0x20
[   18.686047] 
[   18.686186] The buggy address belongs to the physical page:
[   18.686291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a6c
[   18.686460] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.686517] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.686579] page_type: f8(unknown)
[   18.686619] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.686669] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.686741] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.686797] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.686855] head: 0bfffe0000000002 ffffc1ffc31e9b01 00000000ffffffff 00000000ffffffff
[   18.686904] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.686944] page dumped because: kasan: bad access detected
[   18.686976] 
[   18.686993] Memory state around the buggy address:
[   18.687025]  fff00000c7a6bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.687078]  fff00000c7a6bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.687125] >fff00000c7a6c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.687162]                    ^
[   18.687189]  fff00000c7a6c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.687230]  fff00000c7a6c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.687268] ==================================================================
[   18.738564] ==================================================================
[   18.738688] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340
[   18.738887] Read of size 1 at addr fff00000c7a74000 by task kunit_try_catch/233
[   18.739062] 
[   18.739116] CPU: 1 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.739200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.739238] Hardware name: linux,dummy-virt (DT)
[   18.739271] Call trace:
[   18.739305]  show_stack+0x20/0x38 (C)
[   18.739630]  dump_stack_lvl+0x8c/0xd0
[   18.739720]  print_report+0x118/0x5d0
[   18.739768]  kasan_report+0xdc/0x128
[   18.739814]  __asan_report_load1_noabort+0x20/0x30
[   18.740128]  mempool_uaf_helper+0x314/0x340
[   18.740212]  mempool_page_alloc_uaf+0xc0/0x118
[   18.740284]  kunit_try_run_case+0x170/0x3f0
[   18.740345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.740614]  kthread+0x328/0x630
[   18.740803]  ret_from_fork+0x10/0x20
[   18.740966] 
[   18.740993] The buggy address belongs to the physical page:
[   18.741050] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a74
[   18.741115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.741468] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000
[   18.745148] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   18.745200] page dumped because: kasan: bad access detected
[   18.745234] 
[   18.745253] Memory state around the buggy address:
[   18.745288]  fff00000c7a73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.745345]  fff00000c7a73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.745391] >fff00000c7a74000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.745430]                    ^
[   18.745458]  fff00000c7a74080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.745500]  fff00000c7a74100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   18.745537] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[   18.648005] ==================================================================
[   18.648111] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.648213] Read of size 1 at addr fff00000c7a4e100 by task kunit_try_catch/227
[   18.648271] 
[   18.648311] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.648486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.648835] Hardware name: linux,dummy-virt (DT)
[   18.648886] Call trace:
[   18.648965]  show_stack+0x20/0x38 (C)
[   18.649037]  dump_stack_lvl+0x8c/0xd0
[   18.649117]  print_report+0x118/0x5d0
[   18.649166]  kasan_report+0xdc/0x128
[   18.649211]  __asan_report_load1_noabort+0x20/0x30
[   18.649261]  mempool_uaf_helper+0x314/0x340
[   18.649308]  mempool_kmalloc_uaf+0xc4/0x120
[   18.649502]  kunit_try_run_case+0x170/0x3f0
[   18.649588]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.649693]  kthread+0x328/0x630
[   18.649767]  ret_from_fork+0x10/0x20
[   18.649831] 
[   18.649921] Allocated by task 227:
[   18.649979]  kasan_save_stack+0x3c/0x68
[   18.651008]  kasan_save_track+0x20/0x40
[   18.651067]  kasan_save_alloc_info+0x40/0x58
[   18.651109]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.651445]  remove_element+0x130/0x1f8
[   18.651521]  mempool_alloc_preallocated+0x58/0xc0
[   18.651664]  mempool_uaf_helper+0xa4/0x340
[   18.651767]  mempool_kmalloc_uaf+0xc4/0x120
[   18.651817]  kunit_try_run_case+0x170/0x3f0
[   18.652276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.652541]  kthread+0x328/0x630
[   18.652575]  ret_from_fork+0x10/0x20
[   18.653264] 
[   18.653293] Freed by task 227:
[   18.653335]  kasan_save_stack+0x3c/0x68
[   18.654012]  kasan_save_track+0x20/0x40
[   18.654402]  kasan_save_free_info+0x4c/0x78
[   18.654717]  __kasan_mempool_poison_object+0xc0/0x150
[   18.655393]  mempool_free+0x28c/0x328
[   18.655570]  mempool_uaf_helper+0x104/0x340
[   18.655607]  mempool_kmalloc_uaf+0xc4/0x120
[   18.655647]  kunit_try_run_case+0x170/0x3f0
[   18.656276]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.656821]  kthread+0x328/0x630
[   18.656998]  ret_from_fork+0x10/0x20
[   18.657039] 
[   18.657531] The buggy address belongs to the object at fff00000c7a4e100
[   18.657531]  which belongs to the cache kmalloc-128 of size 128
[   18.658015] The buggy address is located 0 bytes inside of
[   18.658015]  freed 128-byte region [fff00000c7a4e100, fff00000c7a4e180)
[   18.658725] 
[   18.659109] The buggy address belongs to the physical page:
[   18.659147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   18.661461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.661529] page_type: f5(slab)
[   18.661687] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.662327] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.663551] page dumped because: kasan: bad access detected
[   18.663603] 
[   18.663657] Memory state around the buggy address:
[   18.663694]  fff00000c7a4e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.663903]  fff00000c7a4e080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.664053] >fff00000c7a4e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.664546]                    ^
[   18.665173]  fff00000c7a4e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.665237]  fff00000c7a4e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.665501] ==================================================================
[   18.699249] ==================================================================
[   18.699313] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340
[   18.699749] Read of size 1 at addr fff00000c7a5b240 by task kunit_try_catch/231
[   18.700165] 
[   18.700214] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.700316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.700363] Hardware name: linux,dummy-virt (DT)
[   18.700397] Call trace:
[   18.700429]  show_stack+0x20/0x38 (C)
[   18.700481]  dump_stack_lvl+0x8c/0xd0
[   18.701965]  print_report+0x118/0x5d0
[   18.702514]  kasan_report+0xdc/0x128
[   18.703063]  __asan_report_load1_noabort+0x20/0x30
[   18.703260]  mempool_uaf_helper+0x314/0x340
[   18.703315]  mempool_slab_uaf+0xc0/0x118
[   18.703417]  kunit_try_run_case+0x170/0x3f0
[   18.704110]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.704234]  kthread+0x328/0x630
[   18.704380]  ret_from_fork+0x10/0x20
[   18.704552] 
[   18.704692] Allocated by task 231:
[   18.704726]  kasan_save_stack+0x3c/0x68
[   18.704791]  kasan_save_track+0x20/0x40
[   18.705042]  kasan_save_alloc_info+0x40/0x58
[   18.705211]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.705356]  remove_element+0x16c/0x1f8
[   18.705425]  mempool_alloc_preallocated+0x58/0xc0
[   18.705794]  mempool_uaf_helper+0xa4/0x340
[   18.705863]  mempool_slab_uaf+0xc0/0x118
[   18.705935]  kunit_try_run_case+0x170/0x3f0
[   18.706059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.706128]  kthread+0x328/0x630
[   18.706477]  ret_from_fork+0x10/0x20
[   18.706923] 
[   18.707004] Freed by task 231:
[   18.707036]  kasan_save_stack+0x3c/0x68
[   18.707357]  kasan_save_track+0x20/0x40
[   18.707437]  kasan_save_free_info+0x4c/0x78
[   18.707520]  __kasan_mempool_poison_object+0xc0/0x150
[   18.707566]  mempool_free+0x28c/0x328
[   18.707907]  mempool_uaf_helper+0x104/0x340
[   18.707962]  mempool_slab_uaf+0xc0/0x118
[   18.708000]  kunit_try_run_case+0x170/0x3f0
[   18.708038]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.708082]  kthread+0x328/0x630
[   18.708115]  ret_from_fork+0x10/0x20
[   18.708156] 
[   18.708177] The buggy address belongs to the object at fff00000c7a5b240
[   18.708177]  which belongs to the cache test_cache of size 123
[   18.708240] The buggy address is located 0 bytes inside of
[   18.708240]  freed 123-byte region [fff00000c7a5b240, fff00000c7a5b2bb)
[   18.708308] 
[   18.708338] The buggy address belongs to the physical page:
[   18.708372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a5b
[   18.708424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.708474] page_type: f5(slab)
[   18.708519] raw: 0bfffe0000000000 fff00000c598d8c0 dead000000000122 0000000000000000
[   18.708569] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.708607] page dumped because: kasan: bad access detected
[   18.708645] 
[   18.708662] Memory state around the buggy address:
[   18.708697]  fff00000c7a5b100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.708737]  fff00000c7a5b180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.708872] >fff00000c7a5b200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   18.708947]                                            ^
[   18.708985]  fff00000c7a5b280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.709428]  fff00000c7a5b300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.709494] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[   18.619380] ==================================================================
[   18.619488] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.619564] Read of size 1 at addr fff00000c7a4e2bb by task kunit_try_catch/225
[   18.619615] 
[   18.619662] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.619754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.619782] Hardware name: linux,dummy-virt (DT)
[   18.619817] Call trace:
[   18.619845]  show_stack+0x20/0x38 (C)
[   18.619898]  dump_stack_lvl+0x8c/0xd0
[   18.619958]  print_report+0x118/0x5d0
[   18.620009]  kasan_report+0xdc/0x128
[   18.620055]  __asan_report_load1_noabort+0x20/0x30
[   18.620108]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.620162]  mempool_slab_oob_right+0xc0/0x118
[   18.620211]  kunit_try_run_case+0x170/0x3f0
[   18.620261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.620315]  kthread+0x328/0x630
[   18.620371]  ret_from_fork+0x10/0x20
[   18.620422] 
[   18.620440] Allocated by task 225:
[   18.620472]  kasan_save_stack+0x3c/0x68
[   18.620882]  kasan_save_track+0x20/0x40
[   18.620930]  kasan_save_alloc_info+0x40/0x58
[   18.620971]  __kasan_mempool_unpoison_object+0xbc/0x180
[   18.621014]  remove_element+0x16c/0x1f8
[   18.621053]  mempool_alloc_preallocated+0x58/0xc0
[   18.621094]  mempool_oob_right_helper+0x98/0x2f0
[   18.621132]  mempool_slab_oob_right+0xc0/0x118
[   18.621169]  kunit_try_run_case+0x170/0x3f0
[   18.621208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.621250]  kthread+0x328/0x630
[   18.621282]  ret_from_fork+0x10/0x20
[   18.621335] 
[   18.621356] The buggy address belongs to the object at fff00000c7a4e240
[   18.621356]  which belongs to the cache test_cache of size 123
[   18.621415] The buggy address is located 0 bytes to the right of
[   18.621415]  allocated 123-byte region [fff00000c7a4e240, fff00000c7a4e2bb)
[   18.621478] 
[   18.621499] The buggy address belongs to the physical page:
[   18.621533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107a4e
[   18.621588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.621637] page_type: f5(slab)
[   18.621682] raw: 0bfffe0000000000 fff00000ffe8ef00 dead000000000122 0000000000000000
[   18.621731] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000
[   18.621772] page dumped because: kasan: bad access detected
[   18.621804] 
[   18.621822] Memory state around the buggy address:
[   18.621854]  fff00000c7a4e180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.621898]  fff00000c7a4e200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00
[   18.621941] >fff00000c7a4e280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc
[   18.621978]                                         ^
[   18.622010]  fff00000c7a4e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.622051]  fff00000c7a4e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.622090] ==================================================================
[   18.571979] ==================================================================
[   18.572059] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.572126] Read of size 1 at addr fff00000c65ce001 by task kunit_try_catch/223
[   18.572183] 
[   18.572223] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.572316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.572436] Hardware name: linux,dummy-virt (DT)
[   18.572605] Call trace:
[   18.572749]  show_stack+0x20/0x38 (C)
[   18.572812]  dump_stack_lvl+0x8c/0xd0
[   18.572866]  print_report+0x118/0x5d0
[   18.572913]  kasan_report+0xdc/0x128
[   18.572957]  __asan_report_load1_noabort+0x20/0x30
[   18.575195]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.575284]  mempool_kmalloc_large_oob_right+0xc4/0x120
[   18.575530]  kunit_try_run_case+0x170/0x3f0
[   18.576182]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.576546]  kthread+0x328/0x630
[   18.577273]  ret_from_fork+0x10/0x20
[   18.577538] 
[   18.577755] The buggy address belongs to the physical page:
[   18.578402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065cc
[   18.578481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   18.578531] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   18.578588] page_type: f8(unknown)
[   18.578632] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.578682] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.578732] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   18.578780] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   18.578829] head: 0bfffe0000000002 ffffc1ffc3197301 00000000ffffffff 00000000ffffffff
[   18.578878] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   18.578921] page dumped because: kasan: bad access detected
[   18.578954] 
[   18.578973] Memory state around the buggy address:
[   18.579008]  fff00000c65cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.579050]  fff00000c65cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   18.579093] >fff00000c65ce000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.579129]                    ^
[   18.581811]  fff00000c65ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.581925]  fff00000c65ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   18.582493] ==================================================================
[   18.555840] ==================================================================
[   18.555940] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0
[   18.556022] Read of size 1 at addr fff00000c790a273 by task kunit_try_catch/221
[   18.556074] 
[   18.556125] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   18.556220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.556246] Hardware name: linux,dummy-virt (DT)
[   18.556281] Call trace:
[   18.556307]  show_stack+0x20/0x38 (C)
[   18.556372]  dump_stack_lvl+0x8c/0xd0
[   18.556424]  print_report+0x118/0x5d0
[   18.556470]  kasan_report+0xdc/0x128
[   18.556630]  __asan_report_load1_noabort+0x20/0x30
[   18.556686]  mempool_oob_right_helper+0x2ac/0x2f0
[   18.556735]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.556783]  kunit_try_run_case+0x170/0x3f0
[   18.556843]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.556897]  kthread+0x328/0x630
[   18.556940]  ret_from_fork+0x10/0x20
[   18.556989] 
[   18.557010] Allocated by task 221:
[   18.557039]  kasan_save_stack+0x3c/0x68
[   18.557083]  kasan_save_track+0x20/0x40
[   18.557120]  kasan_save_alloc_info+0x40/0x58
[   18.557160]  __kasan_mempool_unpoison_object+0x11c/0x180
[   18.557202]  remove_element+0x130/0x1f8
[   18.557247]  mempool_alloc_preallocated+0x58/0xc0
[   18.557285]  mempool_oob_right_helper+0x98/0x2f0
[   18.557336]  mempool_kmalloc_oob_right+0xc4/0x120
[   18.557376]  kunit_try_run_case+0x170/0x3f0
[   18.557415]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   18.557459]  kthread+0x328/0x630
[   18.557491]  ret_from_fork+0x10/0x20
[   18.557528] 
[   18.557548] The buggy address belongs to the object at fff00000c790a200
[   18.557548]  which belongs to the cache kmalloc-128 of size 128
[   18.557614] The buggy address is located 0 bytes to the right of
[   18.557614]  allocated 115-byte region [fff00000c790a200, fff00000c790a273)
[   18.557678] 
[   18.557700] The buggy address belongs to the physical page:
[   18.557733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790a
[   18.557788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   18.557842] page_type: f5(slab)
[   18.557886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   18.557935] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   18.557975] page dumped because: kasan: bad access detected
[   18.558009] 
[   18.558027] Memory state around the buggy address:
[   18.558060]  fff00000c790a100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   18.558103]  fff00000c790a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.558146] >fff00000c790a200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.558185]                                                              ^
[   18.558225]  fff00000c790a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.558266]  fff00000c790a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   18.558305] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[   17.995434] ==================================================================
[   17.995516] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300
[   17.995588] Read of size 1 at addr fff00000c598d640 by task kunit_try_catch/215
[   17.995640] 
[   17.995683] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.995769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.995797] Hardware name: linux,dummy-virt (DT)
[   17.995830] Call trace:
[   17.995854]  show_stack+0x20/0x38 (C)
[   17.995910]  dump_stack_lvl+0x8c/0xd0
[   17.995962]  print_report+0x118/0x5d0
[   17.996009]  kasan_report+0xdc/0x128
[   17.996053]  __kasan_check_byte+0x54/0x70
[   17.996099]  kmem_cache_destroy+0x34/0x218
[   17.996147]  kmem_cache_double_destroy+0x174/0x300
[   17.996202]  kunit_try_run_case+0x170/0x3f0
[   17.996252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.996304]  kthread+0x328/0x630
[   17.996360]  ret_from_fork+0x10/0x20
[   17.996408] 
[   17.996426] Allocated by task 215:
[   17.996457]  kasan_save_stack+0x3c/0x68
[   17.996526]  kasan_save_track+0x20/0x40
[   17.996565]  kasan_save_alloc_info+0x40/0x58
[   17.996604]  __kasan_slab_alloc+0xa8/0xb0
[   17.996643]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.996683]  __kmem_cache_create_args+0x178/0x280
[   17.996723]  kmem_cache_double_destroy+0xc0/0x300
[   17.996761]  kunit_try_run_case+0x170/0x3f0
[   17.996799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.996840]  kthread+0x328/0x630
[   17.996873]  ret_from_fork+0x10/0x20
[   17.996908] 
[   17.996927] Freed by task 215:
[   17.996954]  kasan_save_stack+0x3c/0x68
[   17.996990]  kasan_save_track+0x20/0x40
[   17.997027]  kasan_save_free_info+0x4c/0x78
[   17.997065]  __kasan_slab_free+0x6c/0x98
[   17.997103]  kmem_cache_free+0x260/0x468
[   17.997138]  slab_kmem_cache_release+0x38/0x50
[   17.997178]  kmem_cache_release+0x1c/0x30
[   17.997215]  kobject_put+0x17c/0x420
[   17.997249]  sysfs_slab_release+0x1c/0x30
[   17.997287]  kmem_cache_destroy+0x118/0x218
[   17.997333]  kmem_cache_double_destroy+0x128/0x300
[   17.997373]  kunit_try_run_case+0x170/0x3f0
[   17.997409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.997452]  kthread+0x328/0x630
[   17.997485]  ret_from_fork+0x10/0x20
[   17.997520] 
[   17.997539] The buggy address belongs to the object at fff00000c598d640
[   17.997539]  which belongs to the cache kmem_cache of size 208
[   17.997595] The buggy address is located 0 bytes inside of
[   17.997595]  freed 208-byte region [fff00000c598d640, fff00000c598d710)
[   17.997654] 
[   17.997677] The buggy address belongs to the physical page:
[   17.997709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598d
[   17.997763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.997815] page_type: f5(slab)
[   17.997857] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000
[   17.997909] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   17.997950] page dumped because: kasan: bad access detected
[   17.997983] 
[   17.998000] Memory state around the buggy address:
[   17.998035]  fff00000c598d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.998078]  fff00000c598d580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   17.998121] >fff00000c598d600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   17.998159]                                            ^
[   17.998193]  fff00000c598d680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.998236]  fff00000c598d700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.998275] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[   17.924989] ==================================================================
[   17.925118] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468
[   17.925201] Read of size 1 at addr fff00000c7997000 by task kunit_try_catch/213
[   17.925253] 
[   17.925300] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.925408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.925434] Hardware name: linux,dummy-virt (DT)
[   17.925472] Call trace:
[   17.925496]  show_stack+0x20/0x38 (C)
[   17.925552]  dump_stack_lvl+0x8c/0xd0
[   17.925603]  print_report+0x118/0x5d0
[   17.925651]  kasan_report+0xdc/0x128
[   17.925696]  __asan_report_load1_noabort+0x20/0x30
[   17.925748]  kmem_cache_rcu_uaf+0x388/0x468
[   17.925797]  kunit_try_run_case+0x170/0x3f0
[   17.925846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.925899]  kthread+0x328/0x630
[   17.925944]  ret_from_fork+0x10/0x20
[   17.925995] 
[   17.926013] Allocated by task 213:
[   17.926044]  kasan_save_stack+0x3c/0x68
[   17.926086]  kasan_save_track+0x20/0x40
[   17.926124]  kasan_save_alloc_info+0x40/0x58
[   17.926164]  __kasan_slab_alloc+0xa8/0xb0
[   17.926202]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.926244]  kmem_cache_rcu_uaf+0x12c/0x468
[   17.926281]  kunit_try_run_case+0x170/0x3f0
[   17.926332]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.926375]  kthread+0x328/0x630
[   17.926407]  ret_from_fork+0x10/0x20
[   17.926443] 
[   17.926462] Freed by task 0:
[   17.926489]  kasan_save_stack+0x3c/0x68
[   17.926526]  kasan_save_track+0x20/0x40
[   17.926564]  kasan_save_free_info+0x4c/0x78
[   17.926605]  __kasan_slab_free+0x6c/0x98
[   17.926642]  slab_free_after_rcu_debug+0xd4/0x2f8
[   17.926683]  rcu_core+0x9f4/0x1e20
[   17.926719]  rcu_core_si+0x18/0x30
[   17.926754]  handle_softirqs+0x374/0xb28
[   17.926791]  __do_softirq+0x1c/0x28
[   17.926826] 
[   17.926845] Last potentially related work creation:
[   17.926871]  kasan_save_stack+0x3c/0x68
[   17.926910]  kasan_record_aux_stack+0xb4/0xc8
[   17.926948]  kmem_cache_free+0x120/0x468
[   17.926986]  kmem_cache_rcu_uaf+0x16c/0x468
[   17.927021]  kunit_try_run_case+0x170/0x3f0
[   17.927060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.927102]  kthread+0x328/0x630
[   17.927133]  ret_from_fork+0x10/0x20
[   17.927169] 
[   17.927187] The buggy address belongs to the object at fff00000c7997000
[   17.927187]  which belongs to the cache test_cache of size 200
[   17.927246] The buggy address is located 0 bytes inside of
[   17.927246]  freed 200-byte region [fff00000c7997000, fff00000c79970c8)
[   17.927306] 
[   17.927337] The buggy address belongs to the physical page:
[   17.927371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107997
[   17.927427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.927480] page_type: f5(slab)
[   17.927524] raw: 0bfffe0000000000 fff00000c598d500 dead000000000122 0000000000000000
[   17.927575] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.927615] page dumped because: kasan: bad access detected
[   17.927647] 
[   17.927665] Memory state around the buggy address:
[   17.927700]  fff00000c7996f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927745]  fff00000c7996f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927788] >fff00000c7997000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.927828]                    ^
[   17.927855]  fff00000c7997080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.927897]  fff00000c7997100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.927936] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   17.361716] ==================================================================
[   17.362107] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8
[   17.362263] Free of addr fff00000c7994001 by task kunit_try_catch/211
[   17.362386] 
[   17.362431] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.362549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.362603] Hardware name: linux,dummy-virt (DT)
[   17.362639] Call trace:
[   17.362662]  show_stack+0x20/0x38 (C)
[   17.362747]  dump_stack_lvl+0x8c/0xd0
[   17.363045]  print_report+0x118/0x5d0
[   17.363112]  kasan_report_invalid_free+0xc0/0xe8
[   17.363164]  check_slab_allocation+0xfc/0x108
[   17.363213]  __kasan_slab_pre_free+0x2c/0x48
[   17.363372]  kmem_cache_free+0xf0/0x468
[   17.363460]  kmem_cache_invalid_free+0x184/0x3c8
[   17.363646]  kunit_try_run_case+0x170/0x3f0
[   17.363759]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.363823]  kthread+0x328/0x630
[   17.363869]  ret_from_fork+0x10/0x20
[   17.364148] 
[   17.364187] Allocated by task 211:
[   17.364219]  kasan_save_stack+0x3c/0x68
[   17.364481]  kasan_save_track+0x20/0x40
[   17.364744]  kasan_save_alloc_info+0x40/0x58
[   17.364898]  __kasan_slab_alloc+0xa8/0xb0
[   17.364973]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.365075]  kmem_cache_invalid_free+0x12c/0x3c8
[   17.365165]  kunit_try_run_case+0x170/0x3f0
[   17.365250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.365398]  kthread+0x328/0x630
[   17.365816]  ret_from_fork+0x10/0x20
[   17.365946] 
[   17.366015] The buggy address belongs to the object at fff00000c7994000
[   17.366015]  which belongs to the cache test_cache of size 200
[   17.366163] The buggy address is located 1 bytes inside of
[   17.366163]  200-byte region [fff00000c7994000, fff00000c79940c8)
[   17.366231] 
[   17.366253] The buggy address belongs to the physical page:
[   17.366286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107994
[   17.366379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.366433] page_type: f5(slab)
[   17.366475] raw: 0bfffe0000000000 fff00000c598d3c0 dead000000000122 0000000000000000
[   17.366526] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.366857] page dumped because: kasan: bad access detected
[   17.366944] 
[   17.367079] Memory state around the buggy address:
[   17.367132]  fff00000c7993f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.367208]  fff00000c7993f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.367355] >fff00000c7994000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.367664]                    ^
[   17.367839]  fff00000c7994080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.367929]  fff00000c7994100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.368007] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   17.311521] ==================================================================
[   17.311607] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8
[   17.311680] Free of addr fff00000c7992000 by task kunit_try_catch/209
[   17.311726] 
[   17.311768] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.311854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.311881] Hardware name: linux,dummy-virt (DT)
[   17.311915] Call trace:
[   17.311939]  show_stack+0x20/0x38 (C)
[   17.311993]  dump_stack_lvl+0x8c/0xd0
[   17.312044]  print_report+0x118/0x5d0
[   17.312093]  kasan_report_invalid_free+0xc0/0xe8
[   17.312144]  check_slab_allocation+0xd4/0x108
[   17.312200]  __kasan_slab_pre_free+0x2c/0x48
[   17.312248]  kmem_cache_free+0xf0/0x468
[   17.312295]  kmem_cache_double_free+0x190/0x3c8
[   17.312354]  kunit_try_run_case+0x170/0x3f0
[   17.312403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.312456]  kthread+0x328/0x630
[   17.312729]  ret_from_fork+0x10/0x20
[   17.313598] 
[   17.313739] Allocated by task 209:
[   17.313799]  kasan_save_stack+0x3c/0x68
[   17.314443]  kasan_save_track+0x20/0x40
[   17.314697]  kasan_save_alloc_info+0x40/0x58
[   17.314840]  __kasan_slab_alloc+0xa8/0xb0
[   17.314938]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.315073]  kmem_cache_double_free+0x12c/0x3c8
[   17.315197]  kunit_try_run_case+0x170/0x3f0
[   17.315262]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.315640]  kthread+0x328/0x630
[   17.315772]  ret_from_fork+0x10/0x20
[   17.315840] 
[   17.315860] Freed by task 209:
[   17.316238]  kasan_save_stack+0x3c/0x68
[   17.316375]  kasan_save_track+0x20/0x40
[   17.316454]  kasan_save_free_info+0x4c/0x78
[   17.316774]  __kasan_slab_free+0x6c/0x98
[   17.316818]  kmem_cache_free+0x260/0x468
[   17.316856]  kmem_cache_double_free+0x140/0x3c8
[   17.316893]  kunit_try_run_case+0x170/0x3f0
[   17.317366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.318257]  kthread+0x328/0x630
[   17.318769]  ret_from_fork+0x10/0x20
[   17.318855] 
[   17.318875] The buggy address belongs to the object at fff00000c7992000
[   17.318875]  which belongs to the cache test_cache of size 200
[   17.319262] The buggy address is located 0 bytes inside of
[   17.319262]  200-byte region [fff00000c7992000, fff00000c79920c8)
[   17.319386] 
[   17.319457] The buggy address belongs to the physical page:
[   17.319842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107992
[   17.320306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.320435] page_type: f5(slab)
[   17.320798] raw: 0bfffe0000000000 fff00000c598d280 dead000000000122 0000000000000000
[   17.320943] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.320989] page dumped because: kasan: bad access detected
[   17.321200] 
[   17.321307] Memory state around the buggy address:
[   17.321571]  fff00000c7991f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.321666]  fff00000c7991f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.321711] >fff00000c7992000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   17.321802]                    ^
[   17.321845]  fff00000c7992080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   17.321897]  fff00000c7992100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.321936] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   17.015542] ==================================================================
[   17.015600] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430
[   17.015681] Read of size 1 at addr fff00000c79900c8 by task kunit_try_catch/207
[   17.015741] 
[   17.015776] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   17.015877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.015920] Hardware name: linux,dummy-virt (DT)
[   17.015969] Call trace:
[   17.016027]  show_stack+0x20/0x38 (C)
[   17.016080]  dump_stack_lvl+0x8c/0xd0
[   17.016181]  print_report+0x118/0x5d0
[   17.016236]  kasan_report+0xdc/0x128
[   17.016283]  __asan_report_load1_noabort+0x20/0x30
[   17.016348]  kmem_cache_oob+0x344/0x430
[   17.016393]  kunit_try_run_case+0x170/0x3f0
[   17.016439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.016492]  kthread+0x328/0x630
[   17.016533]  ret_from_fork+0x10/0x20
[   17.016609] 
[   17.016627] Allocated by task 207:
[   17.016813]  kasan_save_stack+0x3c/0x68
[   17.016945]  kasan_save_track+0x20/0x40
[   17.017044]  kasan_save_alloc_info+0x40/0x58
[   17.017098]  __kasan_slab_alloc+0xa8/0xb0
[   17.017204]  kmem_cache_alloc_noprof+0x10c/0x398
[   17.017265]  kmem_cache_oob+0x12c/0x430
[   17.017391]  kunit_try_run_case+0x170/0x3f0
[   17.017455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.017552]  kthread+0x328/0x630
[   17.017675]  ret_from_fork+0x10/0x20
[   17.017761] 
[   17.017781] The buggy address belongs to the object at fff00000c7990000
[   17.017781]  which belongs to the cache test_cache of size 200
[   17.017890] The buggy address is located 0 bytes to the right of
[   17.017890]  allocated 200-byte region [fff00000c7990000, fff00000c79900c8)
[   17.017966] 
[   17.017986] The buggy address belongs to the physical page:
[   17.018016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107990
[   17.018094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.018143] page_type: f5(slab)
[   17.018183] raw: 0bfffe0000000000 fff00000c598d140 dead000000000122 0000000000000000
[   17.018233] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   17.018273] page dumped because: kasan: bad access detected
[   17.018304] 
[   17.018357] Memory state around the buggy address:
[   17.018391]  fff00000c798ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.018436]  fff00000c7990000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   17.018479] >fff00000c7990080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   17.018562]                                               ^
[   17.018676]  fff00000c7990100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.018718]  fff00000c7990180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.018780] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[   16.996297] ==================================================================
[   16.996420] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8
[   16.996475] Read of size 8 at addr fff00000c794c800 by task kunit_try_catch/200
[   16.996595] 
[   16.996737] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.996871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.996912] Hardware name: linux,dummy-virt (DT)
[   16.996945] Call trace:
[   16.996990]  show_stack+0x20/0x38 (C)
[   16.997041]  dump_stack_lvl+0x8c/0xd0
[   16.997230]  print_report+0x118/0x5d0
[   16.997279]  kasan_report+0xdc/0x128
[   16.997336]  __asan_report_load8_noabort+0x20/0x30
[   16.997388]  workqueue_uaf+0x480/0x4a8
[   16.997433]  kunit_try_run_case+0x170/0x3f0
[   16.997479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.997532]  kthread+0x328/0x630
[   16.997573]  ret_from_fork+0x10/0x20
[   16.997796] 
[   16.997815] Allocated by task 200:
[   16.997890]  kasan_save_stack+0x3c/0x68
[   16.997971]  kasan_save_track+0x20/0x40
[   16.998061]  kasan_save_alloc_info+0x40/0x58
[   16.998214]  __kasan_kmalloc+0xd4/0xd8
[   16.998353]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.998398]  workqueue_uaf+0x13c/0x4a8
[   16.998489]  kunit_try_run_case+0x170/0x3f0
[   16.998530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.998575]  kthread+0x328/0x630
[   16.998607]  ret_from_fork+0x10/0x20
[   16.998836] 
[   16.998906] Freed by task 48:
[   16.999017]  kasan_save_stack+0x3c/0x68
[   16.999184]  kasan_save_track+0x20/0x40
[   16.999232]  kasan_save_free_info+0x4c/0x78
[   16.999274]  __kasan_slab_free+0x6c/0x98
[   16.999310]  kfree+0x214/0x3c8
[   16.999351]  workqueue_uaf_work+0x18/0x30
[   16.999387]  process_one_work+0x530/0xf98
[   16.999447]  worker_thread+0x618/0xf38
[   16.999481]  kthread+0x328/0x630
[   16.999513]  ret_from_fork+0x10/0x20
[   16.999550] 
[   16.999568] Last potentially related work creation:
[   16.999596]  kasan_save_stack+0x3c/0x68
[   16.999683]  kasan_record_aux_stack+0xb4/0xc8
[   16.999790]  __queue_work+0x65c/0x1008
[   16.999862]  queue_work_on+0xbc/0xf8
[   16.999951]  workqueue_uaf+0x210/0x4a8
[   17.000017]  kunit_try_run_case+0x170/0x3f0
[   17.000053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   17.000131]  kthread+0x328/0x630
[   17.000183]  ret_from_fork+0x10/0x20
[   17.000226] 
[   17.000247] The buggy address belongs to the object at fff00000c794c800
[   17.000247]  which belongs to the cache kmalloc-32 of size 32
[   17.000308] The buggy address is located 0 bytes inside of
[   17.000308]  freed 32-byte region [fff00000c794c800, fff00000c794c820)
[   17.000400] 
[   17.000422] The buggy address belongs to the physical page:
[   17.000453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794c
[   17.000505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   17.000554] page_type: f5(slab)
[   17.000638] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   17.000727] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   17.000778] page dumped because: kasan: bad access detected
[   17.000809] 
[   17.000827] Memory state around the buggy address:
[   17.000877]  fff00000c794c700: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   17.000920]  fff00000c794c780: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc
[   17.000963] >fff00000c794c800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   17.001054]                    ^
[   17.001081]  fff00000c794c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.001123]  fff00000c794c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.001161] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[   16.973969] ==================================================================
[   16.974095] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   16.974166] Read of size 4 at addr fff00000c794c600 by task swapper/1/0
[   16.974213] 
[   16.974255] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.974353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.974380] Hardware name: linux,dummy-virt (DT)
[   16.974412] Call trace:
[   16.974436]  show_stack+0x20/0x38 (C)
[   16.974486]  dump_stack_lvl+0x8c/0xd0
[   16.974535]  print_report+0x118/0x5d0
[   16.974580]  kasan_report+0xdc/0x128
[   16.974625]  __asan_report_load4_noabort+0x20/0x30
[   16.974673]  rcu_uaf_reclaim+0x64/0x70
[   16.980249]  rcu_core+0x9f4/0x1e20
[   16.980663]  rcu_core_si+0x18/0x30
[   16.980714]  handle_softirqs+0x374/0xb28
[   16.980766]  __do_softirq+0x1c/0x28
[   16.981263]  ____do_softirq+0x18/0x30
[   16.982351]  call_on_irq_stack+0x24/0x30
[   16.982411]  do_softirq_own_stack+0x24/0x38
[   16.982460]  __irq_exit_rcu+0x1fc/0x318
[   16.982529]  irq_exit_rcu+0x1c/0x80
[   16.982574]  el1_interrupt+0x38/0x58
[   16.982625]  el1h_64_irq_handler+0x18/0x28
[   16.982673]  el1h_64_irq+0x6c/0x70
[   16.982775]  arch_local_irq_enable+0x4/0x8 (P)
[   16.982827]  do_idle+0x384/0x4e8
[   16.982870]  cpu_startup_entry+0x64/0x80
[   16.982916]  secondary_start_kernel+0x288/0x340
[   16.982963]  __secondary_switched+0xc0/0xc8
[   16.983017] 
[   16.983035] Allocated by task 198:
[   16.983065]  kasan_save_stack+0x3c/0x68
[   16.983107]  kasan_save_track+0x20/0x40
[   16.983146]  kasan_save_alloc_info+0x40/0x58
[   16.983185]  __kasan_kmalloc+0xd4/0xd8
[   16.983223]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.983261]  rcu_uaf+0xb0/0x2d8
[   16.983294]  kunit_try_run_case+0x170/0x3f0
[   16.983345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.983456]  kthread+0x328/0x630
[   16.983526]  ret_from_fork+0x10/0x20
[   16.983563] 
[   16.983620] Freed by task 0:
[   16.983707]  kasan_save_stack+0x3c/0x68
[   16.983756]  kasan_save_track+0x20/0x40
[   16.983832]  kasan_save_free_info+0x4c/0x78
[   16.983873]  __kasan_slab_free+0x6c/0x98
[   16.984243]  kfree+0x214/0x3c8
[   16.984423]  rcu_uaf_reclaim+0x28/0x70
[   16.984491]  rcu_core+0x9f4/0x1e20
[   16.984525]  rcu_core_si+0x18/0x30
[   16.984611]  handle_softirqs+0x374/0xb28
[   16.984688]  __do_softirq+0x1c/0x28
[   16.984803] 
[   16.984864] Last potentially related work creation:
[   16.984899]  kasan_save_stack+0x3c/0x68
[   16.985058]  kasan_record_aux_stack+0xb4/0xc8
[   16.985187]  __call_rcu_common.constprop.0+0x74/0x8c8
[   16.985253]  call_rcu+0x18/0x30
[   16.985285]  rcu_uaf+0x14c/0x2d8
[   16.985330]  kunit_try_run_case+0x170/0x3f0
[   16.985368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.985412]  kthread+0x328/0x630
[   16.985444]  ret_from_fork+0x10/0x20
[   16.985523] 
[   16.985552] The buggy address belongs to the object at fff00000c794c600
[   16.985552]  which belongs to the cache kmalloc-32 of size 32
[   16.985612] The buggy address is located 0 bytes inside of
[   16.985612]  freed 32-byte region [fff00000c794c600, fff00000c794c620)
[   16.985671] 
[   16.985691] The buggy address belongs to the physical page:
[   16.985724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10794c
[   16.985801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.985853] page_type: f5(slab)
[   16.985907] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000
[   16.985957] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   16.986050] page dumped because: kasan: bad access detected
[   16.986120] 
[   16.986138] Memory state around the buggy address:
[   16.986200]  fff00000c794c500: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   16.986308]  fff00000c794c580: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   16.986363] >fff00000c794c600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   16.986433]                    ^
[   16.986491]  fff00000c794c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.986533]  fff00000c794c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.986571] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[   16.883190] ==================================================================
[   16.883595] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8
[   16.883675] Read of size 1 at addr fff00000c5b7de00 by task kunit_try_catch/196
[   16.883727] 
[   16.883769] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.884113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.884171] Hardware name: linux,dummy-virt (DT)
[   16.884204] Call trace:
[   16.884232]  show_stack+0x20/0x38 (C)
[   16.884569]  dump_stack_lvl+0x8c/0xd0
[   16.884779]  print_report+0x118/0x5d0
[   16.884993]  kasan_report+0xdc/0x128
[   16.885535]  __kasan_check_byte+0x54/0x70
[   16.885617]  ksize+0x30/0x88
[   16.885764]  ksize_uaf+0x168/0x5f8
[   16.885834]  kunit_try_run_case+0x170/0x3f0
[   16.886155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.886256]  kthread+0x328/0x630
[   16.886647]  ret_from_fork+0x10/0x20
[   16.886885] 
[   16.886953] Allocated by task 196:
[   16.887040]  kasan_save_stack+0x3c/0x68
[   16.887143]  kasan_save_track+0x20/0x40
[   16.887211]  kasan_save_alloc_info+0x40/0x58
[   16.887664]  __kasan_kmalloc+0xd4/0xd8
[   16.887741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.887807]  ksize_uaf+0xb8/0x5f8
[   16.887843]  kunit_try_run_case+0x170/0x3f0
[   16.887880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.887925]  kthread+0x328/0x630
[   16.887957]  ret_from_fork+0x10/0x20
[   16.887996] 
[   16.888025] Freed by task 196:
[   16.888053]  kasan_save_stack+0x3c/0x68
[   16.888105]  kasan_save_track+0x20/0x40
[   16.888160]  kasan_save_free_info+0x4c/0x78
[   16.888199]  __kasan_slab_free+0x6c/0x98
[   16.888237]  kfree+0x214/0x3c8
[   16.888268]  ksize_uaf+0x11c/0x5f8
[   16.888309]  kunit_try_run_case+0x170/0x3f0
[   16.888368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.888423]  kthread+0x328/0x630
[   16.888456]  ret_from_fork+0x10/0x20
[   16.888765] 
[   16.888790] The buggy address belongs to the object at fff00000c5b7de00
[   16.888790]  which belongs to the cache kmalloc-128 of size 128
[   16.889367] The buggy address is located 0 bytes inside of
[   16.889367]  freed 128-byte region [fff00000c5b7de00, fff00000c5b7de80)
[   16.889449] 
[   16.889818] The buggy address belongs to the physical page:
[   16.889882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.889969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.890178] page_type: f5(slab)
[   16.890429] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.890493] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.890535] page dumped because: kasan: bad access detected
[   16.890838] 
[   16.890917] Memory state around the buggy address:
[   16.891056]  fff00000c5b7dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.891179]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.891262] >fff00000c5b7de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.891580]                    ^
[   16.891642]  fff00000c5b7de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.891728]  fff00000c5b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.891797] ==================================================================
[   16.895670] ==================================================================
[   16.895724] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8
[   16.895772] Read of size 1 at addr fff00000c5b7de00 by task kunit_try_catch/196
[   16.896202] 
[   16.896341] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.896467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.896638] Hardware name: linux,dummy-virt (DT)
[   16.896673] Call trace:
[   16.896822]  show_stack+0x20/0x38 (C)
[   16.897035]  dump_stack_lvl+0x8c/0xd0
[   16.897147]  print_report+0x118/0x5d0
[   16.897197]  kasan_report+0xdc/0x128
[   16.897260]  __asan_report_load1_noabort+0x20/0x30
[   16.897328]  ksize_uaf+0x598/0x5f8
[   16.897372]  kunit_try_run_case+0x170/0x3f0
[   16.897419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.897471]  kthread+0x328/0x630
[   16.897511]  ret_from_fork+0x10/0x20
[   16.897568] 
[   16.897594] Allocated by task 196:
[   16.897642]  kasan_save_stack+0x3c/0x68
[   16.897700]  kasan_save_track+0x20/0x40
[   16.897737]  kasan_save_alloc_info+0x40/0x58
[   16.897785]  __kasan_kmalloc+0xd4/0xd8
[   16.897820]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.897859]  ksize_uaf+0xb8/0x5f8
[   16.897896]  kunit_try_run_case+0x170/0x3f0
[   16.897947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.897992]  kthread+0x328/0x630
[   16.898025]  ret_from_fork+0x10/0x20
[   16.898060] 
[   16.898079] Freed by task 196:
[   16.898115]  kasan_save_stack+0x3c/0x68
[   16.898152]  kasan_save_track+0x20/0x40
[   16.898189]  kasan_save_free_info+0x4c/0x78
[   16.898226]  __kasan_slab_free+0x6c/0x98
[   16.898264]  kfree+0x214/0x3c8
[   16.898306]  ksize_uaf+0x11c/0x5f8
[   16.898813]  kunit_try_run_case+0x170/0x3f0
[   16.898897]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.899097]  kthread+0x328/0x630
[   16.899313]  ret_from_fork+0x10/0x20
[   16.899379] 
[   16.899429] The buggy address belongs to the object at fff00000c5b7de00
[   16.899429]  which belongs to the cache kmalloc-128 of size 128
[   16.899635] The buggy address is located 0 bytes inside of
[   16.899635]  freed 128-byte region [fff00000c5b7de00, fff00000c5b7de80)
[   16.899795] 
[   16.899845] The buggy address belongs to the physical page:
[   16.900125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.900224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.900403] page_type: f5(slab)
[   16.900451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.900629] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.900694] page dumped because: kasan: bad access detected
[   16.900827] 
[   16.900970] Memory state around the buggy address:
[   16.901172]  fff00000c5b7dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.901378]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.901519] >fff00000c5b7de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.901658]                    ^
[   16.901719]  fff00000c5b7de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.901793]  fff00000c5b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.901901] ==================================================================
[   16.902972] ==================================================================
[   16.903312] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8
[   16.903477] Read of size 1 at addr fff00000c5b7de78 by task kunit_try_catch/196
[   16.903561] 
[   16.903595] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.903744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.903772] Hardware name: linux,dummy-virt (DT)
[   16.903828] Call trace:
[   16.903860]  show_stack+0x20/0x38 (C)
[   16.904147]  dump_stack_lvl+0x8c/0xd0
[   16.904305]  print_report+0x118/0x5d0
[   16.904479]  kasan_report+0xdc/0x128
[   16.904566]  __asan_report_load1_noabort+0x20/0x30
[   16.904677]  ksize_uaf+0x544/0x5f8
[   16.904723]  kunit_try_run_case+0x170/0x3f0
[   16.904769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.904821]  kthread+0x328/0x630
[   16.905159]  ret_from_fork+0x10/0x20
[   16.905253] 
[   16.905301] Allocated by task 196:
[   16.905490]  kasan_save_stack+0x3c/0x68
[   16.905643]  kasan_save_track+0x20/0x40
[   16.906048]  kasan_save_alloc_info+0x40/0x58
[   16.906138]  __kasan_kmalloc+0xd4/0xd8
[   16.906225]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.906442]  ksize_uaf+0xb8/0x5f8
[   16.906529]  kunit_try_run_case+0x170/0x3f0
[   16.906685]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.906732]  kthread+0x328/0x630
[   16.906797]  ret_from_fork+0x10/0x20
[   16.907112] 
[   16.907150] Freed by task 196:
[   16.907207]  kasan_save_stack+0x3c/0x68
[   16.907346]  kasan_save_track+0x20/0x40
[   16.907444]  kasan_save_free_info+0x4c/0x78
[   16.907595]  __kasan_slab_free+0x6c/0x98
[   16.907647]  kfree+0x214/0x3c8
[   16.907708]  ksize_uaf+0x11c/0x5f8
[   16.908060]  kunit_try_run_case+0x170/0x3f0
[   16.908126]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.908272]  kthread+0x328/0x630
[   16.908377]  ret_from_fork+0x10/0x20
[   16.908581] 
[   16.908613] The buggy address belongs to the object at fff00000c5b7de00
[   16.908613]  which belongs to the cache kmalloc-128 of size 128
[   16.908687] The buggy address is located 120 bytes inside of
[   16.908687]  freed 128-byte region [fff00000c5b7de00, fff00000c5b7de80)
[   16.909070] 
[   16.909114] The buggy address belongs to the physical page:
[   16.909243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.909342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.909475] page_type: f5(slab)
[   16.909580] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.910033] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.910197] page dumped because: kasan: bad access detected
[   16.910255] 
[   16.910404] Memory state around the buggy address:
[   16.910492]  fff00000c5b7dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.910565]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.910885] >fff00000c5b7de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.910989]                                                                 ^
[   16.911066]  fff00000c5b7de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.911154]  fff00000c5b7df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.911295] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   16.848351] ==================================================================
[   16.848550] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740
[   16.848611] Read of size 1 at addr fff00000c5b7dd73 by task kunit_try_catch/194
[   16.848663] 
[   16.848706] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.849027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.849249] Hardware name: linux,dummy-virt (DT)
[   16.849286] Call trace:
[   16.849509]  show_stack+0x20/0x38 (C)
[   16.849671]  dump_stack_lvl+0x8c/0xd0
[   16.849808]  print_report+0x118/0x5d0
[   16.850066]  kasan_report+0xdc/0x128
[   16.850277]  __asan_report_load1_noabort+0x20/0x30
[   16.850343]  ksize_unpoisons_memory+0x628/0x740
[   16.850638]  kunit_try_run_case+0x170/0x3f0
[   16.850847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.850995]  kthread+0x328/0x630
[   16.851041]  ret_from_fork+0x10/0x20
[   16.851416] 
[   16.851459] Allocated by task 194:
[   16.851559]  kasan_save_stack+0x3c/0x68
[   16.851662]  kasan_save_track+0x20/0x40
[   16.851701]  kasan_save_alloc_info+0x40/0x58
[   16.852008]  __kasan_kmalloc+0xd4/0xd8
[   16.852076]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.852465]  ksize_unpoisons_memory+0xc0/0x740
[   16.852547]  kunit_try_run_case+0x170/0x3f0
[   16.852593]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.852665]  kthread+0x328/0x630
[   16.852979]  ret_from_fork+0x10/0x20
[   16.853062] 
[   16.853189] The buggy address belongs to the object at fff00000c5b7dd00
[   16.853189]  which belongs to the cache kmalloc-128 of size 128
[   16.853366] The buggy address is located 0 bytes to the right of
[   16.853366]  allocated 115-byte region [fff00000c5b7dd00, fff00000c5b7dd73)
[   16.853484] 
[   16.853506] The buggy address belongs to the physical page:
[   16.853839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.854091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.854264] page_type: f5(slab)
[   16.854331] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.854465] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.854507] page dumped because: kasan: bad access detected
[   16.854563] 
[   16.854851] Memory state around the buggy address:
[   16.854912]  fff00000c5b7dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.854967]  fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855181] >fff00000c5b7dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.855555]                                                              ^
[   16.855632]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855968]  fff00000c5b7de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.856050] ==================================================================
[   16.866971] ==================================================================
[   16.867025] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740
[   16.867422] Read of size 1 at addr fff00000c5b7dd7f by task kunit_try_catch/194
[   16.867491] 
[   16.867545] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.867701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.867789] Hardware name: linux,dummy-virt (DT)
[   16.867898] Call trace:
[   16.867925]  show_stack+0x20/0x38 (C)
[   16.868173]  dump_stack_lvl+0x8c/0xd0
[   16.868622]  print_report+0x118/0x5d0
[   16.868731]  kasan_report+0xdc/0x128
[   16.868917]  __asan_report_load1_noabort+0x20/0x30
[   16.869105]  ksize_unpoisons_memory+0x690/0x740
[   16.869230]  kunit_try_run_case+0x170/0x3f0
[   16.869336]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.869442]  kthread+0x328/0x630
[   16.869777]  ret_from_fork+0x10/0x20
[   16.869921] 
[   16.870011] Allocated by task 194:
[   16.870078]  kasan_save_stack+0x3c/0x68
[   16.870182]  kasan_save_track+0x20/0x40
[   16.870279]  kasan_save_alloc_info+0x40/0x58
[   16.870414]  __kasan_kmalloc+0xd4/0xd8
[   16.870493]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.870558]  ksize_unpoisons_memory+0xc0/0x740
[   16.870891]  kunit_try_run_case+0x170/0x3f0
[   16.870964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.871063]  kthread+0x328/0x630
[   16.871244]  ret_from_fork+0x10/0x20
[   16.871448] 
[   16.871528] The buggy address belongs to the object at fff00000c5b7dd00
[   16.871528]  which belongs to the cache kmalloc-128 of size 128
[   16.871881] The buggy address is located 12 bytes to the right of
[   16.871881]  allocated 115-byte region [fff00000c5b7dd00, fff00000c5b7dd73)
[   16.871989] 
[   16.872075] The buggy address belongs to the physical page:
[   16.872158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.872253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.872403] page_type: f5(slab)
[   16.872532] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.872866] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.873136] page dumped because: kasan: bad access detected
[   16.873259] 
[   16.873330] Memory state around the buggy address:
[   16.873389]  fff00000c5b7dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.873454]  fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.873640] >fff00000c5b7dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.873705]                                                                 ^
[   16.874050]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.874133]  fff00000c5b7de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.874211] ==================================================================
[   16.858259] ==================================================================
[   16.858312] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740
[   16.858387] Read of size 1 at addr fff00000c5b7dd78 by task kunit_try_catch/194
[   16.858456] 
[   16.858488] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.858570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.858596] Hardware name: linux,dummy-virt (DT)
[   16.858647] Call trace:
[   16.858681]  show_stack+0x20/0x38 (C)
[   16.858731]  dump_stack_lvl+0x8c/0xd0
[   16.858778]  print_report+0x118/0x5d0
[   16.858825]  kasan_report+0xdc/0x128
[   16.858870]  __asan_report_load1_noabort+0x20/0x30
[   16.858931]  ksize_unpoisons_memory+0x618/0x740
[   16.858986]  kunit_try_run_case+0x170/0x3f0
[   16.859037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.859091]  kthread+0x328/0x630
[   16.859132]  ret_from_fork+0x10/0x20
[   16.859179] 
[   16.859199] Allocated by task 194:
[   16.859228]  kasan_save_stack+0x3c/0x68
[   16.859277]  kasan_save_track+0x20/0x40
[   16.859315]  kasan_save_alloc_info+0x40/0x58
[   16.859814]  __kasan_kmalloc+0xd4/0xd8
[   16.860130]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.860768]  ksize_unpoisons_memory+0xc0/0x740
[   16.860850]  kunit_try_run_case+0x170/0x3f0
[   16.860922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.861088]  kthread+0x328/0x630
[   16.861615]  ret_from_fork+0x10/0x20
[   16.861697] 
[   16.861744] The buggy address belongs to the object at fff00000c5b7dd00
[   16.861744]  which belongs to the cache kmalloc-128 of size 128
[   16.861841] The buggy address is located 5 bytes to the right of
[   16.861841]  allocated 115-byte region [fff00000c5b7dd00, fff00000c5b7dd73)
[   16.861999] 
[   16.862069] The buggy address belongs to the physical page:
[   16.862099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.862215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.862582] page_type: f5(slab)
[   16.862670] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.862785] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.862958] page dumped because: kasan: bad access detected
[   16.863024] 
[   16.863380] Memory state around the buggy address:
[   16.863453]  fff00000c5b7dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.863645]  fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.863811] >fff00000c5b7dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.863890]                                                                 ^
[   16.863932]  fff00000c5b7dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.864289]  fff00000c5b7de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.864381] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[   16.832307] ==================================================================
[   16.832691] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   16.832775] Free of addr fff00000c5a02c40 by task kunit_try_catch/192
[   16.832828] 
[   16.833008] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.833217] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.833542] Hardware name: linux,dummy-virt (DT)
[   16.833580] Call trace:
[   16.833603]  show_stack+0x20/0x38 (C)
[   16.833732]  dump_stack_lvl+0x8c/0xd0
[   16.833832]  print_report+0x118/0x5d0
[   16.834004]  kasan_report_invalid_free+0xc0/0xe8
[   16.834111]  check_slab_allocation+0xd4/0x108
[   16.834281]  __kasan_slab_pre_free+0x2c/0x48
[   16.834346]  kfree+0xe8/0x3c8
[   16.834693]  kfree_sensitive+0x3c/0xb0
[   16.834946]  kmalloc_double_kzfree+0x168/0x308
[   16.835097]  kunit_try_run_case+0x170/0x3f0
[   16.835181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.835301]  kthread+0x328/0x630
[   16.835391]  ret_from_fork+0x10/0x20
[   16.835630] 
[   16.835719] Allocated by task 192:
[   16.835751]  kasan_save_stack+0x3c/0x68
[   16.835824]  kasan_save_track+0x20/0x40
[   16.835864]  kasan_save_alloc_info+0x40/0x58
[   16.835905]  __kasan_kmalloc+0xd4/0xd8
[   16.835941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.835982]  kmalloc_double_kzfree+0xb8/0x308
[   16.836084]  kunit_try_run_case+0x170/0x3f0
[   16.836125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.836185]  kthread+0x328/0x630
[   16.836229]  ret_from_fork+0x10/0x20
[   16.836265] 
[   16.836284] Freed by task 192:
[   16.836309]  kasan_save_stack+0x3c/0x68
[   16.836703]  kasan_save_track+0x20/0x40
[   16.836768]  kasan_save_free_info+0x4c/0x78
[   16.837145]  __kasan_slab_free+0x6c/0x98
[   16.837254]  kfree+0x214/0x3c8
[   16.837397]  kfree_sensitive+0x80/0xb0
[   16.837503]  kmalloc_double_kzfree+0x11c/0x308
[   16.837664]  kunit_try_run_case+0x170/0x3f0
[   16.837765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.837993]  kthread+0x328/0x630
[   16.838062]  ret_from_fork+0x10/0x20
[   16.838248] 
[   16.838307] The buggy address belongs to the object at fff00000c5a02c40
[   16.838307]  which belongs to the cache kmalloc-16 of size 16
[   16.838499] The buggy address is located 0 bytes inside of
[   16.838499]  16-byte region [fff00000c5a02c40, fff00000c5a02c50)
[   16.838652] 
[   16.838736] The buggy address belongs to the physical page:
[   16.838806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   16.839143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.839370] page_type: f5(slab)
[   16.839534] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.839640] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.839786] page dumped because: kasan: bad access detected
[   16.839826] 
[   16.839844] Memory state around the buggy address:
[   16.840140]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.840329]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.840384] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   16.840514]                                            ^
[   16.840648]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.840736]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.840853] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[   16.825065] ==================================================================
[   16.825125] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   16.825178] Read of size 1 at addr fff00000c5a02c40 by task kunit_try_catch/192
[   16.825228] 
[   16.825262] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.825364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.825392] Hardware name: linux,dummy-virt (DT)
[   16.825424] Call trace:
[   16.825449]  show_stack+0x20/0x38 (C)
[   16.825498]  dump_stack_lvl+0x8c/0xd0
[   16.825546]  print_report+0x118/0x5d0
[   16.825593]  kasan_report+0xdc/0x128
[   16.825636]  __kasan_check_byte+0x54/0x70
[   16.825682]  kfree_sensitive+0x30/0xb0
[   16.825729]  kmalloc_double_kzfree+0x168/0x308
[   16.825774]  kunit_try_run_case+0x170/0x3f0
[   16.825822]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.825875]  kthread+0x328/0x630
[   16.825916]  ret_from_fork+0x10/0x20
[   16.825963] 
[   16.825982] Allocated by task 192:
[   16.826010]  kasan_save_stack+0x3c/0x68
[   16.826049]  kasan_save_track+0x20/0x40
[   16.826087]  kasan_save_alloc_info+0x40/0x58
[   16.826128]  __kasan_kmalloc+0xd4/0xd8
[   16.826165]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.826205]  kmalloc_double_kzfree+0xb8/0x308
[   16.826243]  kunit_try_run_case+0x170/0x3f0
[   16.826280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.826456]  kthread+0x328/0x630
[   16.826502]  ret_from_fork+0x10/0x20
[   16.826548] 
[   16.826997] Freed by task 192:
[   16.827067]  kasan_save_stack+0x3c/0x68
[   16.827241]  kasan_save_track+0x20/0x40
[   16.827395]  kasan_save_free_info+0x4c/0x78
[   16.827520]  __kasan_slab_free+0x6c/0x98
[   16.827699]  kfree+0x214/0x3c8
[   16.827784]  kfree_sensitive+0x80/0xb0
[   16.827825]  kmalloc_double_kzfree+0x11c/0x308
[   16.828093]  kunit_try_run_case+0x170/0x3f0
[   16.828272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.828923]  kthread+0x328/0x630
[   16.828961]  ret_from_fork+0x10/0x20
[   16.829005] 
[   16.829027] The buggy address belongs to the object at fff00000c5a02c40
[   16.829027]  which belongs to the cache kmalloc-16 of size 16
[   16.829334] The buggy address is located 0 bytes inside of
[   16.829334]  freed 16-byte region [fff00000c5a02c40, fff00000c5a02c50)
[   16.829517] 
[   16.829578] The buggy address belongs to the physical page:
[   16.829670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   16.829748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.829909] page_type: f5(slab)
[   16.829992] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.830121] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.830163] page dumped because: kasan: bad access detected
[   16.830231] 
[   16.830421] Memory state around the buggy address:
[   16.830559]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.830699]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.830775] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   16.830869]                                            ^
[   16.830946]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.831014]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.831127] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[   16.801149] ==================================================================
[   16.801212] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468
[   16.801267] Read of size 1 at addr fff00000c7951628 by task kunit_try_catch/188
[   16.801333] 
[   16.801373] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.802144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.802232] Hardware name: linux,dummy-virt (DT)
[   16.802427] Call trace:
[   16.802734]  show_stack+0x20/0x38 (C)
[   16.802829]  dump_stack_lvl+0x8c/0xd0
[   16.802908]  print_report+0x118/0x5d0
[   16.802996]  kasan_report+0xdc/0x128
[   16.803068]  __asan_report_load1_noabort+0x20/0x30
[   16.803140]  kmalloc_uaf2+0x3f4/0x468
[   16.803228]  kunit_try_run_case+0x170/0x3f0
[   16.803810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.803910]  kthread+0x328/0x630
[   16.803972]  ret_from_fork+0x10/0x20
[   16.804061] 
[   16.804104] Allocated by task 188:
[   16.804135]  kasan_save_stack+0x3c/0x68
[   16.804455]  kasan_save_track+0x20/0x40
[   16.804580]  kasan_save_alloc_info+0x40/0x58
[   16.804620]  __kasan_kmalloc+0xd4/0xd8
[   16.804658]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.804698]  kmalloc_uaf2+0xc4/0x468
[   16.805166]  kunit_try_run_case+0x170/0x3f0
[   16.805252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.805461]  kthread+0x328/0x630
[   16.805619]  ret_from_fork+0x10/0x20
[   16.805687] 
[   16.805744] Freed by task 188:
[   16.805783]  kasan_save_stack+0x3c/0x68
[   16.805898]  kasan_save_track+0x20/0x40
[   16.806246]  kasan_save_free_info+0x4c/0x78
[   16.806454]  __kasan_slab_free+0x6c/0x98
[   16.806626]  kfree+0x214/0x3c8
[   16.806693]  kmalloc_uaf2+0x134/0x468
[   16.806818]  kunit_try_run_case+0x170/0x3f0
[   16.806879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.807163]  kthread+0x328/0x630
[   16.807230]  ret_from_fork+0x10/0x20
[   16.807305] 
[   16.807440] The buggy address belongs to the object at fff00000c7951600
[   16.807440]  which belongs to the cache kmalloc-64 of size 64
[   16.807828] The buggy address is located 40 bytes inside of
[   16.807828]  freed 64-byte region [fff00000c7951600, fff00000c7951640)
[   16.807970] 
[   16.808007] The buggy address belongs to the physical page:
[   16.808077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107951
[   16.808224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.808335] page_type: f5(slab)
[   16.808537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.808767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.808815] page dumped because: kasan: bad access detected
[   16.809025] 
[   16.809151] Memory state around the buggy address:
[   16.809240]  fff00000c7951500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.809413]  fff00000c7951580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.809797] >fff00000c7951600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.809889]                                   ^
[   16.809948]  fff00000c7951680: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   16.810058]  fff00000c7951700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.810127] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[   16.783606] ==================================================================
[   16.783699] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310
[   16.783862] Write of size 33 at addr fff00000c7951480 by task kunit_try_catch/186
[   16.783917] 
[   16.783978] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.784411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.784447] Hardware name: linux,dummy-virt (DT)
[   16.784557] Call trace:
[   16.784615]  show_stack+0x20/0x38 (C)
[   16.784694]  dump_stack_lvl+0x8c/0xd0
[   16.784909]  print_report+0x118/0x5d0
[   16.785134]  kasan_report+0xdc/0x128
[   16.785248]  kasan_check_range+0x100/0x1a8
[   16.785376]  __asan_memset+0x34/0x78
[   16.785425]  kmalloc_uaf_memset+0x170/0x310
[   16.785675]  kunit_try_run_case+0x170/0x3f0
[   16.785853]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.785938]  kthread+0x328/0x630
[   16.786081]  ret_from_fork+0x10/0x20
[   16.786192] 
[   16.786298] Allocated by task 186:
[   16.786398]  kasan_save_stack+0x3c/0x68
[   16.786825]  kasan_save_track+0x20/0x40
[   16.786914]  kasan_save_alloc_info+0x40/0x58
[   16.787077]  __kasan_kmalloc+0xd4/0xd8
[   16.787174]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.787335]  kmalloc_uaf_memset+0xb8/0x310
[   16.787549]  kunit_try_run_case+0x170/0x3f0
[   16.787748]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.787828]  kthread+0x328/0x630
[   16.787940]  ret_from_fork+0x10/0x20
[   16.788063] 
[   16.788143] Freed by task 186:
[   16.788344]  kasan_save_stack+0x3c/0x68
[   16.788503]  kasan_save_track+0x20/0x40
[   16.788583]  kasan_save_free_info+0x4c/0x78
[   16.788975]  __kasan_slab_free+0x6c/0x98
[   16.789067]  kfree+0x214/0x3c8
[   16.789158]  kmalloc_uaf_memset+0x11c/0x310
[   16.789301]  kunit_try_run_case+0x170/0x3f0
[   16.789476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.789524]  kthread+0x328/0x630
[   16.789872]  ret_from_fork+0x10/0x20
[   16.790053] 
[   16.790123] The buggy address belongs to the object at fff00000c7951480
[   16.790123]  which belongs to the cache kmalloc-64 of size 64
[   16.790295] The buggy address is located 0 bytes inside of
[   16.790295]  freed 64-byte region [fff00000c7951480, fff00000c79514c0)
[   16.790504] 
[   16.790565] The buggy address belongs to the physical page:
[   16.790621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107951
[   16.790851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.790947] page_type: f5(slab)
[   16.791080] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.791189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.791242] page dumped because: kasan: bad access detected
[   16.791274] 
[   16.791313] Memory state around the buggy address:
[   16.791364]  fff00000c7951380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.791408]  fff00000c7951400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.791457] >fff00000c7951480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.791511]                    ^
[   16.791551]  fff00000c7951500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.791613]  fff00000c7951580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.791651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[   16.764167] ==================================================================
[   16.764232] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   16.764295] Read of size 1 at addr fff00000c5a02c28 by task kunit_try_catch/184
[   16.764358] 
[   16.764393] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.764476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.765205] Hardware name: linux,dummy-virt (DT)
[   16.765243] Call trace:
[   16.765270]  show_stack+0x20/0x38 (C)
[   16.765345]  dump_stack_lvl+0x8c/0xd0
[   16.765422]  print_report+0x118/0x5d0
[   16.765612]  kasan_report+0xdc/0x128
[   16.765901]  __asan_report_load1_noabort+0x20/0x30
[   16.766072]  kmalloc_uaf+0x300/0x338
[   16.766201]  kunit_try_run_case+0x170/0x3f0
[   16.766445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.766635]  kthread+0x328/0x630
[   16.766744]  ret_from_fork+0x10/0x20
[   16.767077] 
[   16.767129] Allocated by task 184:
[   16.767209]  kasan_save_stack+0x3c/0x68
[   16.767378]  kasan_save_track+0x20/0x40
[   16.767519]  kasan_save_alloc_info+0x40/0x58
[   16.767601]  __kasan_kmalloc+0xd4/0xd8
[   16.767810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.767970]  kmalloc_uaf+0xb8/0x338
[   16.768034]  kunit_try_run_case+0x170/0x3f0
[   16.768163]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.768244]  kthread+0x328/0x630
[   16.768600]  ret_from_fork+0x10/0x20
[   16.768672] 
[   16.768742] Freed by task 184:
[   16.768792]  kasan_save_stack+0x3c/0x68
[   16.768832]  kasan_save_track+0x20/0x40
[   16.768870]  kasan_save_free_info+0x4c/0x78
[   16.769378]  __kasan_slab_free+0x6c/0x98
[   16.769513]  kfree+0x214/0x3c8
[   16.769549]  kmalloc_uaf+0x11c/0x338
[   16.769770]  kunit_try_run_case+0x170/0x3f0
[   16.769955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.770018]  kthread+0x328/0x630
[   16.770213]  ret_from_fork+0x10/0x20
[   16.770283] 
[   16.770616] The buggy address belongs to the object at fff00000c5a02c20
[   16.770616]  which belongs to the cache kmalloc-16 of size 16
[   16.771068] The buggy address is located 8 bytes inside of
[   16.771068]  freed 16-byte region [fff00000c5a02c20, fff00000c5a02c30)
[   16.771211] 
[   16.771282] The buggy address belongs to the physical page:
[   16.771540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   16.771618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.772038] page_type: f5(slab)
[   16.772100] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.772343] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.772404] page dumped because: kasan: bad access detected
[   16.772677] 
[   16.772704] Memory state around the buggy address:
[   16.772763]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.772840]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   16.773190] >fff00000c5a02c00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   16.773348]                                   ^
[   16.773388]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.773473]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.773646] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   16.746860] ==================================================================
[   16.746985] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.747088] Read of size 64 at addr fff00000c7951184 by task kunit_try_catch/182
[   16.747490] 
[   16.747577] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.747665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.747692] Hardware name: linux,dummy-virt (DT)
[   16.747794] Call trace:
[   16.747862]  show_stack+0x20/0x38 (C)
[   16.747936]  dump_stack_lvl+0x8c/0xd0
[   16.748034]  print_report+0x118/0x5d0
[   16.748083]  kasan_report+0xdc/0x128
[   16.748127]  kasan_check_range+0x100/0x1a8
[   16.748332]  __asan_memmove+0x3c/0x98
[   16.748532]  kmalloc_memmove_invalid_size+0x154/0x2e0
[   16.748604]  kunit_try_run_case+0x170/0x3f0
[   16.748744]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.748873]  kthread+0x328/0x630
[   16.748978]  ret_from_fork+0x10/0x20
[   16.749027] 
[   16.749046] Allocated by task 182:
[   16.749100]  kasan_save_stack+0x3c/0x68
[   16.749144]  kasan_save_track+0x20/0x40
[   16.749362]  kasan_save_alloc_info+0x40/0x58
[   16.749546]  __kasan_kmalloc+0xd4/0xd8
[   16.749614]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.749725]  kmalloc_memmove_invalid_size+0xb0/0x2e0
[   16.749835]  kunit_try_run_case+0x170/0x3f0
[   16.749955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.750082]  kthread+0x328/0x630
[   16.750131]  ret_from_fork+0x10/0x20
[   16.750168] 
[   16.750536] The buggy address belongs to the object at fff00000c7951180
[   16.750536]  which belongs to the cache kmalloc-64 of size 64
[   16.750667] The buggy address is located 4 bytes inside of
[   16.750667]  allocated 64-byte region [fff00000c7951180, fff00000c79511c0)
[   16.750730] 
[   16.750757] The buggy address belongs to the physical page:
[   16.750800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107951
[   16.750871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.750930] page_type: f5(slab)
[   16.750977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.751034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.751076] page dumped because: kasan: bad access detected
[   16.751107] 
[   16.751125] Memory state around the buggy address:
[   16.751170]  fff00000c7951080: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc
[   16.751232]  fff00000c7951100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.751280] >fff00000c7951180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.751348]                                            ^
[   16.751383]  fff00000c7951200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.751434]  fff00000c7951280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.751471] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   16.724426] ==================================================================
[   16.724682] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0
[   16.724752] Read of size 18446744073709551614 at addr fff00000c7965f84 by task kunit_try_catch/180
[   16.725443] 
[   16.725730] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.726102] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.726427] Hardware name: linux,dummy-virt (DT)
[   16.726819] Call trace:
[   16.726942]  show_stack+0x20/0x38 (C)
[   16.727111]  dump_stack_lvl+0x8c/0xd0
[   16.727211]  print_report+0x118/0x5d0
[   16.727637]  kasan_report+0xdc/0x128
[   16.727736]  kasan_check_range+0x100/0x1a8
[   16.727800]  __asan_memmove+0x3c/0x98
[   16.727870]  kmalloc_memmove_negative_size+0x154/0x2e0
[   16.728203]  kunit_try_run_case+0x170/0x3f0
[   16.728619]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.728814]  kthread+0x328/0x630
[   16.728942]  ret_from_fork+0x10/0x20
[   16.729128] 
[   16.729344] Allocated by task 180:
[   16.729392]  kasan_save_stack+0x3c/0x68
[   16.729569]  kasan_save_track+0x20/0x40
[   16.729714]  kasan_save_alloc_info+0x40/0x58
[   16.729864]  __kasan_kmalloc+0xd4/0xd8
[   16.729904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.731236]  kmalloc_memmove_negative_size+0xb0/0x2e0
[   16.731309]  kunit_try_run_case+0x170/0x3f0
[   16.731543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.731692]  kthread+0x328/0x630
[   16.731736]  ret_from_fork+0x10/0x20
[   16.731909] 
[   16.732138] The buggy address belongs to the object at fff00000c7965f80
[   16.732138]  which belongs to the cache kmalloc-64 of size 64
[   16.732470] The buggy address is located 4 bytes inside of
[   16.732470]  64-byte region [fff00000c7965f80, fff00000c7965fc0)
[   16.732687] 
[   16.732821] The buggy address belongs to the physical page:
[   16.732863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107965
[   16.732950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.733358] page_type: f5(slab)
[   16.733511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   16.733595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.733984] page dumped because: kasan: bad access detected
[   16.734095] 
[   16.734154] Memory state around the buggy address:
[   16.734192]  fff00000c7965e80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   16.734440]  fff00000c7965f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.734618] >fff00000c7965f80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   16.734685]                    ^
[   16.735008]  fff00000c7966000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.735086]  fff00000c7966080: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.735262] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   16.709031] ==================================================================
[   16.709147] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8
[   16.709396] Write of size 16 at addr fff00000c5b7dc69 by task kunit_try_catch/178
[   16.709513] 
[   16.709591] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.709694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.710063] Hardware name: linux,dummy-virt (DT)
[   16.710218] Call trace:
[   16.710385]  show_stack+0x20/0x38 (C)
[   16.710530]  dump_stack_lvl+0x8c/0xd0
[   16.710648]  print_report+0x118/0x5d0
[   16.711002]  kasan_report+0xdc/0x128
[   16.711096]  kasan_check_range+0x100/0x1a8
[   16.711244]  __asan_memset+0x34/0x78
[   16.711299]  kmalloc_oob_memset_16+0x150/0x2f8
[   16.711357]  kunit_try_run_case+0x170/0x3f0
[   16.711410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.711498]  kthread+0x328/0x630
[   16.711539]  ret_from_fork+0x10/0x20
[   16.711598] 
[   16.711628] Allocated by task 178:
[   16.711665]  kasan_save_stack+0x3c/0x68
[   16.711707]  kasan_save_track+0x20/0x40
[   16.711753]  kasan_save_alloc_info+0x40/0x58
[   16.711806]  __kasan_kmalloc+0xd4/0xd8
[   16.711842]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.711881]  kmalloc_oob_memset_16+0xb0/0x2f8
[   16.711917]  kunit_try_run_case+0x170/0x3f0
[   16.711954]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.711996]  kthread+0x328/0x630
[   16.712027]  ret_from_fork+0x10/0x20
[   16.712063] 
[   16.712083] The buggy address belongs to the object at fff00000c5b7dc00
[   16.712083]  which belongs to the cache kmalloc-128 of size 128
[   16.712138] The buggy address is located 105 bytes inside of
[   16.712138]  allocated 120-byte region [fff00000c5b7dc00, fff00000c5b7dc78)
[   16.712213] 
[   16.712240] The buggy address belongs to the physical page:
[   16.712281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.712903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.713004] page_type: f5(slab)
[   16.713067] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.713168] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.713254] page dumped because: kasan: bad access detected
[   16.713284] 
[   16.713310] Memory state around the buggy address:
[   16.713716]  fff00000c5b7db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.713788]  fff00000c5b7db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.713861] >fff00000c5b7dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.713939]                                                                 ^
[   16.714066]  fff00000c5b7dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.714159]  fff00000c5b7dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.714298] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   16.688912] ==================================================================
[   16.689261] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8
[   16.689396] Write of size 8 at addr fff00000c5b7db71 by task kunit_try_catch/176
[   16.689445] 
[   16.689754] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.689857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.689965] Hardware name: linux,dummy-virt (DT)
[   16.690046] Call trace:
[   16.690215]  show_stack+0x20/0x38 (C)
[   16.690428]  dump_stack_lvl+0x8c/0xd0
[   16.690535]  print_report+0x118/0x5d0
[   16.690590]  kasan_report+0xdc/0x128
[   16.690691]  kasan_check_range+0x100/0x1a8
[   16.691302]  __asan_memset+0x34/0x78
[   16.691380]  kmalloc_oob_memset_8+0x150/0x2f8
[   16.691459]  kunit_try_run_case+0x170/0x3f0
[   16.691699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.691855]  kthread+0x328/0x630
[   16.691903]  ret_from_fork+0x10/0x20
[   16.692337] 
[   16.692381] Allocated by task 176:
[   16.692584]  kasan_save_stack+0x3c/0x68
[   16.692784]  kasan_save_track+0x20/0x40
[   16.692910]  kasan_save_alloc_info+0x40/0x58
[   16.693053]  __kasan_kmalloc+0xd4/0xd8
[   16.693096]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.693136]  kmalloc_oob_memset_8+0xb0/0x2f8
[   16.693174]  kunit_try_run_case+0x170/0x3f0
[   16.693506]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.693669]  kthread+0x328/0x630
[   16.693730]  ret_from_fork+0x10/0x20
[   16.693989] 
[   16.694244] The buggy address belongs to the object at fff00000c5b7db00
[   16.694244]  which belongs to the cache kmalloc-128 of size 128
[   16.694639] The buggy address is located 113 bytes inside of
[   16.694639]  allocated 120-byte region [fff00000c5b7db00, fff00000c5b7db78)
[   16.694804] 
[   16.694885] The buggy address belongs to the physical page:
[   16.695043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.695140] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.695371] page_type: f5(slab)
[   16.695434] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.695597] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.695641] page dumped because: kasan: bad access detected
[   16.695848] 
[   16.695989] Memory state around the buggy address:
[   16.696047]  fff00000c5b7da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.696211]  fff00000c5b7da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.696255] >fff00000c5b7db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.696529]                                                                 ^
[   16.696742]  fff00000c5b7db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.696853]  fff00000c5b7dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.696938] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   16.674336] ==================================================================
[   16.674400] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300
[   16.674450] Write of size 4 at addr fff00000c5b7da75 by task kunit_try_catch/174
[   16.674497] 
[   16.674531] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.674610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.674636] Hardware name: linux,dummy-virt (DT)
[   16.674665] Call trace:
[   16.674688]  show_stack+0x20/0x38 (C)
[   16.674734]  dump_stack_lvl+0x8c/0xd0
[   16.674779]  print_report+0x118/0x5d0
[   16.674823]  kasan_report+0xdc/0x128
[   16.674876]  kasan_check_range+0x100/0x1a8
[   16.674923]  __asan_memset+0x34/0x78
[   16.674963]  kmalloc_oob_memset_4+0x150/0x300
[   16.675008]  kunit_try_run_case+0x170/0x3f0
[   16.675053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.675108]  kthread+0x328/0x630
[   16.675159]  ret_from_fork+0x10/0x20
[   16.675208] 
[   16.675226] Allocated by task 174:
[   16.675254]  kasan_save_stack+0x3c/0x68
[   16.675293]  kasan_save_track+0x20/0x40
[   16.675728]  kasan_save_alloc_info+0x40/0x58
[   16.676115]  __kasan_kmalloc+0xd4/0xd8
[   16.676196]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.676244]  kmalloc_oob_memset_4+0xb0/0x300
[   16.676289]  kunit_try_run_case+0x170/0x3f0
[   16.676586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.676748]  kthread+0x328/0x630
[   16.676802]  ret_from_fork+0x10/0x20
[   16.676990] 
[   16.677031] The buggy address belongs to the object at fff00000c5b7da00
[   16.677031]  which belongs to the cache kmalloc-128 of size 128
[   16.677234] The buggy address is located 117 bytes inside of
[   16.677234]  allocated 120-byte region [fff00000c5b7da00, fff00000c5b7da78)
[   16.677650] 
[   16.677701] The buggy address belongs to the physical page:
[   16.677740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.677819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.677944] page_type: f5(slab)
[   16.678042] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.678220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.678298] page dumped because: kasan: bad access detected
[   16.678422] 
[   16.678468] Memory state around the buggy address:
[   16.678501]  fff00000c5b7d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.678559]  fff00000c5b7d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.678799] >fff00000c5b7da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.678984]                                                                 ^
[   16.679031]  fff00000c5b7da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.679075]  fff00000c5b7db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.679581] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   16.654416] ==================================================================
[   16.654546] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8
[   16.654601] Write of size 2 at addr fff00000c5b7d977 by task kunit_try_catch/172
[   16.655127] 
[   16.655235] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.655336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.655363] Hardware name: linux,dummy-virt (DT)
[   16.655666] Call trace:
[   16.655738]  show_stack+0x20/0x38 (C)
[   16.655793]  dump_stack_lvl+0x8c/0xd0
[   16.655839]  print_report+0x118/0x5d0
[   16.656239]  kasan_report+0xdc/0x128
[   16.656332]  kasan_check_range+0x100/0x1a8
[   16.656548]  __asan_memset+0x34/0x78
[   16.656610]  kmalloc_oob_memset_2+0x150/0x2f8
[   16.656656]  kunit_try_run_case+0x170/0x3f0
[   16.656932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.657169]  kthread+0x328/0x630
[   16.657366]  ret_from_fork+0x10/0x20
[   16.657481] 
[   16.657818] Allocated by task 172:
[   16.657948]  kasan_save_stack+0x3c/0x68
[   16.658092]  kasan_save_track+0x20/0x40
[   16.658172]  kasan_save_alloc_info+0x40/0x58
[   16.658419]  __kasan_kmalloc+0xd4/0xd8
[   16.658619]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.658697]  kmalloc_oob_memset_2+0xb0/0x2f8
[   16.658771]  kunit_try_run_case+0x170/0x3f0
[   16.658959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.659075]  kthread+0x328/0x630
[   16.659382]  ret_from_fork+0x10/0x20
[   16.659620] 
[   16.659663] The buggy address belongs to the object at fff00000c5b7d900
[   16.659663]  which belongs to the cache kmalloc-128 of size 128
[   16.659799] The buggy address is located 119 bytes inside of
[   16.659799]  allocated 120-byte region [fff00000c5b7d900, fff00000c5b7d978)
[   16.659929] 
[   16.660075] The buggy address belongs to the physical page:
[   16.660108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.660466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.660833] page_type: f5(slab)
[   16.660895] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.661058] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.661125] page dumped because: kasan: bad access detected
[   16.661164] 
[   16.661182] Memory state around the buggy address:
[   16.661556]  fff00000c5b7d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.661634]  fff00000c5b7d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.661782] >fff00000c5b7d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.661956]                                                                 ^
[   16.662030]  fff00000c5b7d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.662085]  fff00000c5b7da00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.662177] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   16.639074] ==================================================================
[   16.639146] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0
[   16.639198] Write of size 128 at addr fff00000c5b7d800 by task kunit_try_catch/170
[   16.639359] 
[   16.639398] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.639983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.640313] Hardware name: linux,dummy-virt (DT)
[   16.640366] Call trace:
[   16.640391]  show_stack+0x20/0x38 (C)
[   16.640441]  dump_stack_lvl+0x8c/0xd0
[   16.640487]  print_report+0x118/0x5d0
[   16.640539]  kasan_report+0xdc/0x128
[   16.640615]  kasan_check_range+0x100/0x1a8
[   16.641317]  __asan_memset+0x34/0x78
[   16.641435]  kmalloc_oob_in_memset+0x144/0x2d0
[   16.641484]  kunit_try_run_case+0x170/0x3f0
[   16.641557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.641610]  kthread+0x328/0x630
[   16.641812]  ret_from_fork+0x10/0x20
[   16.642066] 
[   16.642295] Allocated by task 170:
[   16.642507]  kasan_save_stack+0x3c/0x68
[   16.642603]  kasan_save_track+0x20/0x40
[   16.642746]  kasan_save_alloc_info+0x40/0x58
[   16.642907]  __kasan_kmalloc+0xd4/0xd8
[   16.642994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.643102]  kmalloc_oob_in_memset+0xb0/0x2d0
[   16.643204]  kunit_try_run_case+0x170/0x3f0
[   16.643247]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.643445]  kthread+0x328/0x630
[   16.643625]  ret_from_fork+0x10/0x20
[   16.643719] 
[   16.643795] The buggy address belongs to the object at fff00000c5b7d800
[   16.643795]  which belongs to the cache kmalloc-128 of size 128
[   16.644040] The buggy address is located 0 bytes inside of
[   16.644040]  allocated 120-byte region [fff00000c5b7d800, fff00000c5b7d878)
[   16.644254] 
[   16.644379] The buggy address belongs to the physical page:
[   16.644455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.644881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.644937] page_type: f5(slab)
[   16.645259] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.645374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.645498] page dumped because: kasan: bad access detected
[   16.645533] 
[   16.645552] Memory state around the buggy address:
[   16.645852]  fff00000c5b7d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.645935]  fff00000c5b7d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646000] >fff00000c5b7d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.646066]                                                                 ^
[   16.646107]  fff00000c5b7d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646278]  fff00000c5b7d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.646434] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[   16.622263] ==================================================================
[   16.622337] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   16.622389] Read of size 16 at addr fff00000c5a02c00 by task kunit_try_catch/168
[   16.622646] 
[   16.622733] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.622866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.622921] Hardware name: linux,dummy-virt (DT)
[   16.622959] Call trace:
[   16.622983]  show_stack+0x20/0x38 (C)
[   16.623335]  dump_stack_lvl+0x8c/0xd0
[   16.623391]  print_report+0x118/0x5d0
[   16.623502]  kasan_report+0xdc/0x128
[   16.623596]  __asan_report_load16_noabort+0x20/0x30
[   16.623650]  kmalloc_uaf_16+0x3bc/0x438
[   16.623695]  kunit_try_run_case+0x170/0x3f0
[   16.623741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.623837]  kthread+0x328/0x630
[   16.623877]  ret_from_fork+0x10/0x20
[   16.624178] 
[   16.624213] Allocated by task 168:
[   16.624252]  kasan_save_stack+0x3c/0x68
[   16.624296]  kasan_save_track+0x20/0x40
[   16.624354]  kasan_save_alloc_info+0x40/0x58
[   16.624403]  __kasan_kmalloc+0xd4/0xd8
[   16.624439]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.624555]  kmalloc_uaf_16+0x140/0x438
[   16.624663]  kunit_try_run_case+0x170/0x3f0
[   16.624804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.625110]  kthread+0x328/0x630
[   16.625222]  ret_from_fork+0x10/0x20
[   16.625393] 
[   16.625594] Freed by task 168:
[   16.625684]  kasan_save_stack+0x3c/0x68
[   16.625799]  kasan_save_track+0x20/0x40
[   16.625881]  kasan_save_free_info+0x4c/0x78
[   16.626058]  __kasan_slab_free+0x6c/0x98
[   16.626140]  kfree+0x214/0x3c8
[   16.626295]  kmalloc_uaf_16+0x190/0x438
[   16.626342]  kunit_try_run_case+0x170/0x3f0
[   16.626543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.626720]  kthread+0x328/0x630
[   16.626776]  ret_from_fork+0x10/0x20
[   16.626840] 
[   16.626979] The buggy address belongs to the object at fff00000c5a02c00
[   16.626979]  which belongs to the cache kmalloc-16 of size 16
[   16.627158] The buggy address is located 0 bytes inside of
[   16.627158]  freed 16-byte region [fff00000c5a02c00, fff00000c5a02c10)
[   16.627277] 
[   16.627333] The buggy address belongs to the physical page:
[   16.627654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   16.627743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.627894] page_type: f5(slab)
[   16.627964] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.628077] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.628182] page dumped because: kasan: bad access detected
[   16.628268] 
[   16.628626] Memory state around the buggy address:
[   16.628701]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.628850]  fff00000c5a02b80: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc
[   16.628939] >fff00000c5a02c00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.629067]                    ^
[   16.629115]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.629261]  fff00000c5a02d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.629449] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   16.603288] ==================================================================
[   16.603642] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   16.603721] Write of size 16 at addr fff00000c5a02ba0 by task kunit_try_catch/166
[   16.603780] 
[   16.603815] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.604051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.604112] Hardware name: linux,dummy-virt (DT)
[   16.604284] Call trace:
[   16.604340]  show_stack+0x20/0x38 (C)
[   16.604462]  dump_stack_lvl+0x8c/0xd0
[   16.604563]  print_report+0x118/0x5d0
[   16.604621]  kasan_report+0xdc/0x128
[   16.604667]  __asan_report_store16_noabort+0x20/0x30
[   16.605074]  kmalloc_oob_16+0x3a0/0x3f8
[   16.605470]  kunit_try_run_case+0x170/0x3f0
[   16.605603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.605662]  kthread+0x328/0x630
[   16.605729]  ret_from_fork+0x10/0x20
[   16.606080] 
[   16.606136] Allocated by task 166:
[   16.606182]  kasan_save_stack+0x3c/0x68
[   16.606508]  kasan_save_track+0x20/0x40
[   16.606644]  kasan_save_alloc_info+0x40/0x58
[   16.606726]  __kasan_kmalloc+0xd4/0xd8
[   16.607020]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.607138]  kmalloc_oob_16+0xb4/0x3f8
[   16.607279]  kunit_try_run_case+0x170/0x3f0
[   16.607371]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.607739]  kthread+0x328/0x630
[   16.607824]  ret_from_fork+0x10/0x20
[   16.607895] 
[   16.607951] The buggy address belongs to the object at fff00000c5a02ba0
[   16.607951]  which belongs to the cache kmalloc-16 of size 16
[   16.608355] The buggy address is located 0 bytes inside of
[   16.608355]  allocated 13-byte region [fff00000c5a02ba0, fff00000c5a02bad)
[   16.608522] 
[   16.608591] The buggy address belongs to the physical page:
[   16.608641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   16.608695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.608743] page_type: f5(slab)
[   16.609093] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.609253] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.609298] page dumped because: kasan: bad access detected
[   16.609656] 
[   16.609777] Memory state around the buggy address:
[   16.609832]  fff00000c5a02a80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.609902]  fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.610119] >fff00000c5a02b80: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc
[   16.610263]                                   ^
[   16.610388]  fff00000c5a02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.610520]  fff00000c5a02c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.610598] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[   16.575080] ==================================================================
[   16.575193] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520
[   16.575246] Read of size 1 at addr fff00000c45d0000 by task kunit_try_catch/164
[   16.575700] 
[   16.575751] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.575861] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.575898] Hardware name: linux,dummy-virt (DT)
[   16.575929] Call trace:
[   16.575953]  show_stack+0x20/0x38 (C)
[   16.576013]  dump_stack_lvl+0x8c/0xd0
[   16.576063]  print_report+0x118/0x5d0
[   16.576111]  kasan_report+0xdc/0x128
[   16.576161]  __kasan_check_byte+0x54/0x70
[   16.576209]  krealloc_noprof+0x44/0x360
[   16.576255]  krealloc_uaf+0x180/0x520
[   16.576308]  kunit_try_run_case+0x170/0x3f0
[   16.576375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.576426]  kthread+0x328/0x630
[   16.576467]  ret_from_fork+0x10/0x20
[   16.576804] 
[   16.577619] Allocated by task 164:
[   16.577682]  kasan_save_stack+0x3c/0x68
[   16.578045]  kasan_save_track+0x20/0x40
[   16.578119]  kasan_save_alloc_info+0x40/0x58
[   16.578428]  __kasan_kmalloc+0xd4/0xd8
[   16.578586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.578902]  krealloc_uaf+0xc8/0x520
[   16.578992]  kunit_try_run_case+0x170/0x3f0
[   16.579090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.579261]  kthread+0x328/0x630
[   16.579376]  ret_from_fork+0x10/0x20
[   16.579455] 
[   16.579551] Freed by task 164:
[   16.580014]  kasan_save_stack+0x3c/0x68
[   16.580095]  kasan_save_track+0x20/0x40
[   16.580221]  kasan_save_free_info+0x4c/0x78
[   16.580292]  __kasan_slab_free+0x6c/0x98
[   16.580767]  kfree+0x214/0x3c8
[   16.580992]  krealloc_uaf+0x12c/0x520
[   16.581062]  kunit_try_run_case+0x170/0x3f0
[   16.581260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.581401]  kthread+0x328/0x630
[   16.581438]  ret_from_fork+0x10/0x20
[   16.581837] 
[   16.581909] The buggy address belongs to the object at fff00000c45d0000
[   16.581909]  which belongs to the cache kmalloc-256 of size 256
[   16.582011] The buggy address is located 0 bytes inside of
[   16.582011]  freed 256-byte region [fff00000c45d0000, fff00000c45d0100)
[   16.582378] 
[   16.582439] The buggy address belongs to the physical page:
[   16.582484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d0
[   16.582673] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.582878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.583005] page_type: f5(slab)
[   16.583047] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.583404] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.583539] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.583598] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.583683] head: 0bfffe0000000001 ffffc1ffc3117401 00000000ffffffff 00000000ffffffff
[   16.584048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.584165] page dumped because: kasan: bad access detected
[   16.584227] 
[   16.584246] Memory state around the buggy address:
[   16.584613]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.584696]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.584801] >fff00000c45d0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.584840]                    ^
[   16.584885]  fff00000c45d0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.585196]  fff00000c45d0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.585272] ==================================================================
[   16.588764] ==================================================================
[   16.588819] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520
[   16.588877] Read of size 1 at addr fff00000c45d0000 by task kunit_try_catch/164
[   16.588924] 
[   16.588958] CPU: 1 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.589036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.589062] Hardware name: linux,dummy-virt (DT)
[   16.589363] Call trace:
[   16.589415]  show_stack+0x20/0x38 (C)
[   16.589491]  dump_stack_lvl+0x8c/0xd0
[   16.589831]  print_report+0x118/0x5d0
[   16.589913]  kasan_report+0xdc/0x128
[   16.589982]  __asan_report_load1_noabort+0x20/0x30
[   16.590062]  krealloc_uaf+0x4c8/0x520
[   16.590124]  kunit_try_run_case+0x170/0x3f0
[   16.590432]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.590529]  kthread+0x328/0x630
[   16.590577]  ret_from_fork+0x10/0x20
[   16.590645] 
[   16.590664] Allocated by task 164:
[   16.590702]  kasan_save_stack+0x3c/0x68
[   16.590742]  kasan_save_track+0x20/0x40
[   16.590779]  kasan_save_alloc_info+0x40/0x58
[   16.590817]  __kasan_kmalloc+0xd4/0xd8
[   16.590853]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.590891]  krealloc_uaf+0xc8/0x520
[   16.590935]  kunit_try_run_case+0x170/0x3f0
[   16.590972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.591013]  kthread+0x328/0x630
[   16.591054]  ret_from_fork+0x10/0x20
[   16.591099] 
[   16.591117] Freed by task 164:
[   16.591152]  kasan_save_stack+0x3c/0x68
[   16.591194]  kasan_save_track+0x20/0x40
[   16.591229]  kasan_save_free_info+0x4c/0x78
[   16.591276]  __kasan_slab_free+0x6c/0x98
[   16.591313]  kfree+0x214/0x3c8
[   16.591357]  krealloc_uaf+0x12c/0x520
[   16.591400]  kunit_try_run_case+0x170/0x3f0
[   16.591441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.591493]  kthread+0x328/0x630
[   16.591533]  ret_from_fork+0x10/0x20
[   16.591573] 
[   16.591591] The buggy address belongs to the object at fff00000c45d0000
[   16.591591]  which belongs to the cache kmalloc-256 of size 256
[   16.591645] The buggy address is located 0 bytes inside of
[   16.591645]  freed 256-byte region [fff00000c45d0000, fff00000c45d0100)
[   16.591704] 
[   16.591722] The buggy address belongs to the physical page:
[   16.591752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045d0
[   16.591812] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.591858] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.591912] page_type: f5(slab)
[   16.591960] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.592008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.592055] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.592111] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.592165] head: 0bfffe0000000001 ffffc1ffc3117401 00000000ffffffff 00000000ffffffff
[   16.592213] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.592250] page dumped because: kasan: bad access detected
[   16.592290] 
[   16.592307] Memory state around the buggy address:
[   16.592692]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.592741]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.593106] >fff00000c45d0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.593485]                    ^
[   16.593537]  fff00000c45d0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.593617]  fff00000c45d0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.593671] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   16.491440] ==================================================================
[   16.491499] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.491545] Write of size 1 at addr fff00000c45cfed0 by task kunit_try_catch/158
[   16.491600] 
[   16.491630] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.491715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.491855] Hardware name: linux,dummy-virt (DT)
[   16.492029] Call trace:
[   16.492104]  show_stack+0x20/0x38 (C)
[   16.492194]  dump_stack_lvl+0x8c/0xd0
[   16.492332]  print_report+0x118/0x5d0
[   16.492380]  kasan_report+0xdc/0x128
[   16.492425]  __asan_report_store1_noabort+0x20/0x30
[   16.492498]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.492566]  krealloc_less_oob+0x20/0x38
[   16.492611]  kunit_try_run_case+0x170/0x3f0
[   16.492693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.492756]  kthread+0x328/0x630
[   16.492797]  ret_from_fork+0x10/0x20
[   16.492927] 
[   16.492981] Allocated by task 158:
[   16.493009]  kasan_save_stack+0x3c/0x68
[   16.493103]  kasan_save_track+0x20/0x40
[   16.493189]  kasan_save_alloc_info+0x40/0x58
[   16.493267]  __kasan_krealloc+0x118/0x178
[   16.493378]  krealloc_noprof+0x128/0x360
[   16.493435]  krealloc_less_oob_helper+0x168/0xc50
[   16.493573]  krealloc_less_oob+0x20/0x38
[   16.493668]  kunit_try_run_case+0x170/0x3f0
[   16.493733]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.493775]  kthread+0x328/0x630
[   16.493806]  ret_from_fork+0x10/0x20
[   16.493854] 
[   16.493871] The buggy address belongs to the object at fff00000c45cfe00
[   16.493871]  which belongs to the cache kmalloc-256 of size 256
[   16.493925] The buggy address is located 7 bytes to the right of
[   16.493925]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.494021] 
[   16.494040] The buggy address belongs to the physical page:
[   16.494081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.494131] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.494177] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.494242] page_type: f5(slab)
[   16.494285] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.494462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.494511] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.494558] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.494605] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.494652] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.494690] page dumped because: kasan: bad access detected
[   16.494729] 
[   16.494747] Memory state around the buggy address:
[   16.494777]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.494845]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.494887] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.494935]                                                  ^
[   16.495090]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495211]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.495283] ==================================================================
[   16.486724] ==================================================================
[   16.486967] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.487089] Write of size 1 at addr fff00000c45cfec9 by task kunit_try_catch/158
[   16.487343] 
[   16.487384] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.487569] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.487595] Hardware name: linux,dummy-virt (DT)
[   16.487625] Call trace:
[   16.487647]  show_stack+0x20/0x38 (C)
[   16.487695]  dump_stack_lvl+0x8c/0xd0
[   16.487749]  print_report+0x118/0x5d0
[   16.487907]  kasan_report+0xdc/0x128
[   16.488038]  __asan_report_store1_noabort+0x20/0x30
[   16.488304]  krealloc_less_oob_helper+0xa48/0xc50
[   16.488375]  krealloc_less_oob+0x20/0x38
[   16.488420]  kunit_try_run_case+0x170/0x3f0
[   16.488467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.488518]  kthread+0x328/0x630
[   16.488560]  ret_from_fork+0x10/0x20
[   16.488606] 
[   16.488624] Allocated by task 158:
[   16.488693]  kasan_save_stack+0x3c/0x68
[   16.488735]  kasan_save_track+0x20/0x40
[   16.488784]  kasan_save_alloc_info+0x40/0x58
[   16.488823]  __kasan_krealloc+0x118/0x178
[   16.488859]  krealloc_noprof+0x128/0x360
[   16.488896]  krealloc_less_oob_helper+0x168/0xc50
[   16.488951]  krealloc_less_oob+0x20/0x38
[   16.489001]  kunit_try_run_case+0x170/0x3f0
[   16.489054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.489109]  kthread+0x328/0x630
[   16.489150]  ret_from_fork+0x10/0x20
[   16.489185] 
[   16.489215] The buggy address belongs to the object at fff00000c45cfe00
[   16.489215]  which belongs to the cache kmalloc-256 of size 256
[   16.489270] The buggy address is located 0 bytes to the right of
[   16.489270]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.489339] 
[   16.489359] The buggy address belongs to the physical page:
[   16.489389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.489441] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.489488] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.489641] page_type: f5(slab)
[   16.489694] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.489794] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.489843] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.489890] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.489937] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.490027] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.490088] page dumped because: kasan: bad access detected
[   16.490118] 
[   16.490136] Memory state around the buggy address:
[   16.490166]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490336]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.490378] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.490471]                                               ^
[   16.490583]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490625]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.490703] ==================================================================
[   16.538302] ==================================================================
[   16.538545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50
[   16.538626] Write of size 1 at addr fff00000c79ba0c9 by task kunit_try_catch/162
[   16.538678] 
[   16.538871] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.539002] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.539110] Hardware name: linux,dummy-virt (DT)
[   16.539147] Call trace:
[   16.539431]  show_stack+0x20/0x38 (C)
[   16.539632]  dump_stack_lvl+0x8c/0xd0
[   16.539755]  print_report+0x118/0x5d0
[   16.539807]  kasan_report+0xdc/0x128
[   16.539853]  __asan_report_store1_noabort+0x20/0x30
[   16.539951]  krealloc_less_oob_helper+0xa48/0xc50
[   16.540014]  krealloc_large_less_oob+0x20/0x38
[   16.540351]  kunit_try_run_case+0x170/0x3f0
[   16.540427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.540480]  kthread+0x328/0x630
[   16.540700]  ret_from_fork+0x10/0x20
[   16.540832] 
[   16.540905] The buggy address belongs to the physical page:
[   16.540974] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.541067] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.541114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.541461] page_type: f8(unknown)
[   16.541582] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.541655] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.541730] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.541812] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.541860] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.541914] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.541964] page dumped because: kasan: bad access detected
[   16.542009] 
[   16.542045] Memory state around the buggy address:
[   16.542078]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.542121]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.542162] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.542208]                                               ^
[   16.542244]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.542292]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.542340] ==================================================================
[   16.501425] ==================================================================
[   16.501472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.501517] Write of size 1 at addr fff00000c45cfeea by task kunit_try_catch/158
[   16.501564] 
[   16.501594] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.501671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.501706] Hardware name: linux,dummy-virt (DT)
[   16.501852] Call trace:
[   16.501964]  show_stack+0x20/0x38 (C)
[   16.502136]  dump_stack_lvl+0x8c/0xd0
[   16.502229]  print_report+0x118/0x5d0
[   16.502481]  kasan_report+0xdc/0x128
[   16.502709]  __asan_report_store1_noabort+0x20/0x30
[   16.502865]  krealloc_less_oob_helper+0xae4/0xc50
[   16.503036]  krealloc_less_oob+0x20/0x38
[   16.503272]  kunit_try_run_case+0x170/0x3f0
[   16.503959]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.504020]  kthread+0x328/0x630
[   16.504064]  ret_from_fork+0x10/0x20
[   16.504112] 
[   16.504129] Allocated by task 158:
[   16.504161]  kasan_save_stack+0x3c/0x68
[   16.504200]  kasan_save_track+0x20/0x40
[   16.504236]  kasan_save_alloc_info+0x40/0x58
[   16.504285]  __kasan_krealloc+0x118/0x178
[   16.504333]  krealloc_noprof+0x128/0x360
[   16.504371]  krealloc_less_oob_helper+0x168/0xc50
[   16.504602]  krealloc_less_oob+0x20/0x38
[   16.504773]  kunit_try_run_case+0x170/0x3f0
[   16.504811]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.504852]  kthread+0x328/0x630
[   16.504939]  ret_from_fork+0x10/0x20
[   16.504986] 
[   16.505005] The buggy address belongs to the object at fff00000c45cfe00
[   16.505005]  which belongs to the cache kmalloc-256 of size 256
[   16.505060] The buggy address is located 33 bytes to the right of
[   16.505060]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.505237] 
[   16.505265] The buggy address belongs to the physical page:
[   16.505294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.505362] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.505408] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.505458] page_type: f5(slab)
[   16.505530] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.505643] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.505806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.505855] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.505902] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.505949] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.505988] page dumped because: kasan: bad access detected
[   16.506244] 
[   16.506264] Memory state around the buggy address:
[   16.506300]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506409]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.506451] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.506486]                                                           ^
[   16.506524]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506582]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.506770] ==================================================================
[   16.543953] ==================================================================
[   16.544018] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50
[   16.544357] Write of size 1 at addr fff00000c79ba0d0 by task kunit_try_catch/162
[   16.544409] 
[   16.544448] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.544705] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.544962] Hardware name: linux,dummy-virt (DT)
[   16.545049] Call trace:
[   16.545129]  show_stack+0x20/0x38 (C)
[   16.545409]  dump_stack_lvl+0x8c/0xd0
[   16.545638]  print_report+0x118/0x5d0
[   16.545705]  kasan_report+0xdc/0x128
[   16.545852]  __asan_report_store1_noabort+0x20/0x30
[   16.545930]  krealloc_less_oob_helper+0xb9c/0xc50
[   16.546084]  krealloc_large_less_oob+0x20/0x38
[   16.546136]  kunit_try_run_case+0x170/0x3f0
[   16.546345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.546563]  kthread+0x328/0x630
[   16.546649]  ret_from_fork+0x10/0x20
[   16.546825] 
[   16.546875] The buggy address belongs to the physical page:
[   16.546906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.547266] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.547474] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.547760] page_type: f8(unknown)
[   16.547975] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.548032] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.548531] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.548818] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.548913] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.549050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.549215] page dumped because: kasan: bad access detected
[   16.549289] 
[   16.549315] Memory state around the buggy address:
[   16.549359]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.549634]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.549698] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.549844]                                                  ^
[   16.549889]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.549951]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.549997] ==================================================================
[   16.554523] ==================================================================
[   16.554660] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50
[   16.554714] Write of size 1 at addr fff00000c79ba0ea by task kunit_try_catch/162
[   16.554781] 
[   16.554817] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.554895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.554921] Hardware name: linux,dummy-virt (DT)
[   16.554951] Call trace:
[   16.555386]  show_stack+0x20/0x38 (C)
[   16.555492]  dump_stack_lvl+0x8c/0xd0
[   16.555681]  print_report+0x118/0x5d0
[   16.555745]  kasan_report+0xdc/0x128
[   16.555926]  __asan_report_store1_noabort+0x20/0x30
[   16.556001]  krealloc_less_oob_helper+0xae4/0xc50
[   16.556183]  krealloc_large_less_oob+0x20/0x38
[   16.556469]  kunit_try_run_case+0x170/0x3f0
[   16.556696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.556778]  kthread+0x328/0x630
[   16.556862]  ret_from_fork+0x10/0x20
[   16.557219] 
[   16.557265] The buggy address belongs to the physical page:
[   16.557380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.557726] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.557845] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.557937] page_type: f8(unknown)
[   16.558025] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.558162] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.558333] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.558418] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.558495] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.558674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.558837] page dumped because: kasan: bad access detected
[   16.558935] 
[   16.558994] Memory state around the buggy address:
[   16.559055]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.559195]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.559261] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.559385]                                                           ^
[   16.559446]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559487]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.559682] ==================================================================
[   16.561368] ==================================================================
[   16.561510] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.561562] Write of size 1 at addr fff00000c79ba0eb by task kunit_try_catch/162
[   16.561627] 
[   16.561691] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.561773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.561833] Hardware name: linux,dummy-virt (DT)
[   16.561905] Call trace:
[   16.561955]  show_stack+0x20/0x38 (C)
[   16.562005]  dump_stack_lvl+0x8c/0xd0
[   16.562058]  print_report+0x118/0x5d0
[   16.562102]  kasan_report+0xdc/0x128
[   16.562146]  __asan_report_store1_noabort+0x20/0x30
[   16.562474]  krealloc_less_oob_helper+0xa58/0xc50
[   16.562645]  krealloc_large_less_oob+0x20/0x38
[   16.562698]  kunit_try_run_case+0x170/0x3f0
[   16.562764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.562901]  kthread+0x328/0x630
[   16.562955]  ret_from_fork+0x10/0x20
[   16.563002] 
[   16.563030] The buggy address belongs to the physical page:
[   16.563211] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.563398] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.563464] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.563577] page_type: f8(unknown)
[   16.563635] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.563712] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.563803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.563899] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.563947] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.564168] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.564222] page dumped because: kasan: bad access detected
[   16.564380] 
[   16.564406] Memory state around the buggy address:
[   16.564485]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.564701]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.564813] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.564909]                                                           ^
[   16.564965]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.565274]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.565442] ==================================================================
[   16.507282] ==================================================================
[   16.507337] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50
[   16.507383] Write of size 1 at addr fff00000c45cfeeb by task kunit_try_catch/158
[   16.507430] 
[   16.507459] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.507535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.507561] Hardware name: linux,dummy-virt (DT)
[   16.507591] Call trace:
[   16.507613]  show_stack+0x20/0x38 (C)
[   16.507659]  dump_stack_lvl+0x8c/0xd0
[   16.507704]  print_report+0x118/0x5d0
[   16.507750]  kasan_report+0xdc/0x128
[   16.507807]  __asan_report_store1_noabort+0x20/0x30
[   16.507859]  krealloc_less_oob_helper+0xa58/0xc50
[   16.507906]  krealloc_less_oob+0x20/0x38
[   16.508013]  kunit_try_run_case+0x170/0x3f0
[   16.508066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.508129]  kthread+0x328/0x630
[   16.508314]  ret_from_fork+0x10/0x20
[   16.508378] 
[   16.508474] Allocated by task 158:
[   16.508510]  kasan_save_stack+0x3c/0x68
[   16.508578]  kasan_save_track+0x20/0x40
[   16.508696]  kasan_save_alloc_info+0x40/0x58
[   16.508735]  __kasan_krealloc+0x118/0x178
[   16.508772]  krealloc_noprof+0x128/0x360
[   16.508808]  krealloc_less_oob_helper+0x168/0xc50
[   16.508847]  krealloc_less_oob+0x20/0x38
[   16.508881]  kunit_try_run_case+0x170/0x3f0
[   16.508917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.508960]  kthread+0x328/0x630
[   16.508990]  ret_from_fork+0x10/0x20
[   16.509035] 
[   16.509053] The buggy address belongs to the object at fff00000c45cfe00
[   16.509053]  which belongs to the cache kmalloc-256 of size 256
[   16.509109] The buggy address is located 34 bytes to the right of
[   16.509109]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.509384] 
[   16.509484] The buggy address belongs to the physical page:
[   16.509514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.509739] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.509912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.509961] page_type: f5(slab)
[   16.510276] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.510398] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.510495] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.510563] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.510701] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.510774] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.510856] page dumped because: kasan: bad access detected
[   16.510975] 
[   16.511004] Memory state around the buggy address:
[   16.511034]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511340]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.511399] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.511436]                                                           ^
[   16.511473]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511515]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.511578] ==================================================================
[   16.550910] ==================================================================
[   16.550956] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.551004] Write of size 1 at addr fff00000c79ba0da by task kunit_try_catch/162
[   16.551061] 
[   16.551092] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.551170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.551206] Hardware name: linux,dummy-virt (DT)
[   16.551241] Call trace:
[   16.551264]  show_stack+0x20/0x38 (C)
[   16.551310]  dump_stack_lvl+0x8c/0xd0
[   16.551367]  print_report+0x118/0x5d0
[   16.551413]  kasan_report+0xdc/0x128
[   16.551457]  __asan_report_store1_noabort+0x20/0x30
[   16.551521]  krealloc_less_oob_helper+0xa80/0xc50
[   16.551569]  krealloc_large_less_oob+0x20/0x38
[   16.551616]  kunit_try_run_case+0x170/0x3f0
[   16.551664]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.551716]  kthread+0x328/0x630
[   16.551766]  ret_from_fork+0x10/0x20
[   16.551813] 
[   16.551832] The buggy address belongs to the physical page:
[   16.551871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.551923] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.551969] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.552017] page_type: f8(unknown)
[   16.552060] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.552108] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.552166] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.552214] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.552261] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.552307] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.552355] page dumped because: kasan: bad access detected
[   16.552384] 
[   16.552812] Memory state around the buggy address:
[   16.552848]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.552894]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.553297] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   16.553360]                                                     ^
[   16.553451]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.553509]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.553757] ==================================================================
[   16.496225] ==================================================================
[   16.496272] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50
[   16.496333] Write of size 1 at addr fff00000c45cfeda by task kunit_try_catch/158
[   16.496383] 
[   16.496421] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.496948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.497062] Hardware name: linux,dummy-virt (DT)
[   16.497175] Call trace:
[   16.497212]  show_stack+0x20/0x38 (C)
[   16.497263]  dump_stack_lvl+0x8c/0xd0
[   16.497309]  print_report+0x118/0x5d0
[   16.497597]  kasan_report+0xdc/0x128
[   16.497646]  __asan_report_store1_noabort+0x20/0x30
[   16.497696]  krealloc_less_oob_helper+0xa80/0xc50
[   16.497857]  krealloc_less_oob+0x20/0x38
[   16.497972]  kunit_try_run_case+0x170/0x3f0
[   16.498039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.498097]  kthread+0x328/0x630
[   16.498140]  ret_from_fork+0x10/0x20
[   16.498187] 
[   16.498205] Allocated by task 158:
[   16.498269]  kasan_save_stack+0x3c/0x68
[   16.498310]  kasan_save_track+0x20/0x40
[   16.498365]  kasan_save_alloc_info+0x40/0x58
[   16.498429]  __kasan_krealloc+0x118/0x178
[   16.498604]  krealloc_noprof+0x128/0x360
[   16.498662]  krealloc_less_oob_helper+0x168/0xc50
[   16.498765]  krealloc_less_oob+0x20/0x38
[   16.498801]  kunit_try_run_case+0x170/0x3f0
[   16.498837]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.498878]  kthread+0x328/0x630
[   16.499207]  ret_from_fork+0x10/0x20
[   16.499297] 
[   16.499410] The buggy address belongs to the object at fff00000c45cfe00
[   16.499410]  which belongs to the cache kmalloc-256 of size 256
[   16.499479] The buggy address is located 17 bytes to the right of
[   16.499479]  allocated 201-byte region [fff00000c45cfe00, fff00000c45cfec9)
[   16.499570] 
[   16.499590] The buggy address belongs to the physical page:
[   16.499621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.499672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.499718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.499768] page_type: f5(slab)
[   16.499804] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.499911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.500173] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.500329] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.500378] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.500425] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.500464] page dumped because: kasan: bad access detected
[   16.500494] 
[   16.500512] Memory state around the buggy address:
[   16.500542]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.500604]  fff00000c45cfe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.500645] >fff00000c45cfe80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   16.500681]                                                     ^
[   16.500717]  fff00000c45cff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.500758]  fff00000c45cff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.500793] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   16.451531] ==================================================================
[   16.452527] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.452670] Write of size 1 at addr fff00000c45cfceb by task kunit_try_catch/156
[   16.452848] 
[   16.453040] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.453583] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.453765] Hardware name: linux,dummy-virt (DT)
[   16.453916] Call trace:
[   16.453942]  show_stack+0x20/0x38 (C)
[   16.454389]  dump_stack_lvl+0x8c/0xd0
[   16.454938]  print_report+0x118/0x5d0
[   16.455207]  kasan_report+0xdc/0x128
[   16.455254]  __asan_report_store1_noabort+0x20/0x30
[   16.455674]  krealloc_more_oob_helper+0x60c/0x678
[   16.456291]  krealloc_more_oob+0x20/0x38
[   16.456476]  kunit_try_run_case+0x170/0x3f0
[   16.456526]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.456926]  kthread+0x328/0x630
[   16.457258]  ret_from_fork+0x10/0x20
[   16.457377] 
[   16.457413] Allocated by task 156:
[   16.457445]  kasan_save_stack+0x3c/0x68
[   16.457634]  kasan_save_track+0x20/0x40
[   16.457708]  kasan_save_alloc_info+0x40/0x58
[   16.458183]  __kasan_krealloc+0x118/0x178
[   16.458375]  krealloc_noprof+0x128/0x360
[   16.458752]  krealloc_more_oob_helper+0x168/0x678
[   16.459065]  krealloc_more_oob+0x20/0x38
[   16.459142]  kunit_try_run_case+0x170/0x3f0
[   16.459181]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.459224]  kthread+0x328/0x630
[   16.459854]  ret_from_fork+0x10/0x20
[   16.459942] 
[   16.459963] The buggy address belongs to the object at fff00000c45cfc00
[   16.459963]  which belongs to the cache kmalloc-256 of size 256
[   16.460022] The buggy address is located 0 bytes to the right of
[   16.460022]  allocated 235-byte region [fff00000c45cfc00, fff00000c45cfceb)
[   16.460084] 
[   16.460105] The buggy address belongs to the physical page:
[   16.460743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.460805] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.460853] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.460907] page_type: f5(slab)
[   16.461689] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.461744] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.462152] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.462462] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.462522] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.462830] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.463008] page dumped because: kasan: bad access detected
[   16.463212] 
[   16.463535] Memory state around the buggy address:
[   16.463768]  fff00000c45cfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464013]  fff00000c45cfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.464294] >fff00000c45cfc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.464386]                                                           ^
[   16.464434]  fff00000c45cfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464475]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.464879] ==================================================================
[   16.466676] ==================================================================
[   16.467244] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.467357] Write of size 1 at addr fff00000c45cfcf0 by task kunit_try_catch/156
[   16.467738] 
[   16.467775] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.468080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.468373] Hardware name: linux,dummy-virt (DT)
[   16.468424] Call trace:
[   16.468536]  show_stack+0x20/0x38 (C)
[   16.468834]  dump_stack_lvl+0x8c/0xd0
[   16.468883]  print_report+0x118/0x5d0
[   16.468930]  kasan_report+0xdc/0x128
[   16.468979]  __asan_report_store1_noabort+0x20/0x30
[   16.469030]  krealloc_more_oob_helper+0x5c0/0x678
[   16.469782]  krealloc_more_oob+0x20/0x38
[   16.469858]  kunit_try_run_case+0x170/0x3f0
[   16.469914]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.470041]  kthread+0x328/0x630
[   16.470084]  ret_from_fork+0x10/0x20
[   16.470575] 
[   16.470896] Allocated by task 156:
[   16.471261]  kasan_save_stack+0x3c/0x68
[   16.471308]  kasan_save_track+0x20/0x40
[   16.471733]  kasan_save_alloc_info+0x40/0x58
[   16.472168]  __kasan_krealloc+0x118/0x178
[   16.472361]  krealloc_noprof+0x128/0x360
[   16.472595]  krealloc_more_oob_helper+0x168/0x678
[   16.472648]  krealloc_more_oob+0x20/0x38
[   16.472684]  kunit_try_run_case+0x170/0x3f0
[   16.472721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.472770]  kthread+0x328/0x630
[   16.473180]  ret_from_fork+0x10/0x20
[   16.473440] 
[   16.473699] The buggy address belongs to the object at fff00000c45cfc00
[   16.473699]  which belongs to the cache kmalloc-256 of size 256
[   16.474189] The buggy address is located 5 bytes to the right of
[   16.474189]  allocated 235-byte region [fff00000c45cfc00, fff00000c45cfceb)
[   16.474271] 
[   16.474293] The buggy address belongs to the physical page:
[   16.474335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1045ce
[   16.474386] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.474432] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.474483] page_type: f5(slab)
[   16.475295] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.475568] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.475888] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000
[   16.476182] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.476430] head: 0bfffe0000000001 ffffc1ffc3117381 00000000ffffffff 00000000ffffffff
[   16.476506] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002
[   16.476753] page dumped because: kasan: bad access detected
[   16.476791] 
[   16.476862] Memory state around the buggy address:
[   16.476910]  fff00000c45cfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.476953]  fff00000c45cfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.477200] >fff00000c45cfc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   16.477430]                                                              ^
[   16.477768]  fff00000c45cfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.477976]  fff00000c45cfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.478576] ==================================================================
[   16.522751] ==================================================================
[   16.522803] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678
[   16.522855] Write of size 1 at addr fff00000c79ba0f0 by task kunit_try_catch/160
[   16.523149] 
[   16.523435] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.523659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.523694] Hardware name: linux,dummy-virt (DT)
[   16.524013] Call trace:
[   16.524053]  show_stack+0x20/0x38 (C)
[   16.524106]  dump_stack_lvl+0x8c/0xd0
[   16.524420]  print_report+0x118/0x5d0
[   16.524500]  kasan_report+0xdc/0x128
[   16.524761]  __asan_report_store1_noabort+0x20/0x30
[   16.524890]  krealloc_more_oob_helper+0x5c0/0x678
[   16.525270]  krealloc_large_more_oob+0x20/0x38
[   16.525503]  kunit_try_run_case+0x170/0x3f0
[   16.525836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.526019]  kthread+0x328/0x630
[   16.526085]  ret_from_fork+0x10/0x20
[   16.526491] 
[   16.526591] The buggy address belongs to the physical page:
[   16.526650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.526946] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.526998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.527049] page_type: f8(unknown)
[   16.527173] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.527237] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.527305] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.527371] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.527419] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.527476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.527514] page dumped because: kasan: bad access detected
[   16.527553] 
[   16.527570] Memory state around the buggy address:
[   16.527609]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.527652]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.527691] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.527737]                                                              ^
[   16.527782]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.527823]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.527861] ==================================================================
[   16.518604] ==================================================================
[   16.518660] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678
[   16.518719] Write of size 1 at addr fff00000c79ba0eb by task kunit_try_catch/160
[   16.518846] 
[   16.518940] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.519330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.519357] Hardware name: linux,dummy-virt (DT)
[   16.519386] Call trace:
[   16.519408]  show_stack+0x20/0x38 (C)
[   16.519481]  dump_stack_lvl+0x8c/0xd0
[   16.519554]  print_report+0x118/0x5d0
[   16.519601]  kasan_report+0xdc/0x128
[   16.519657]  __asan_report_store1_noabort+0x20/0x30
[   16.519708]  krealloc_more_oob_helper+0x60c/0x678
[   16.519768]  krealloc_large_more_oob+0x20/0x38
[   16.519915]  kunit_try_run_case+0x170/0x3f0
[   16.519962]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.520013]  kthread+0x328/0x630
[   16.520081]  ret_from_fork+0x10/0x20
[   16.520128] 
[   16.520163] The buggy address belongs to the physical page:
[   16.520193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079b8
[   16.520246] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.520292] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.520368] page_type: f8(unknown)
[   16.520416] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.520475] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.520537] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.520719] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.520936] head: 0bfffe0000000002 ffffc1ffc31e6e01 00000000ffffffff 00000000ffffffff
[   16.520983] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.521491] page dumped because: kasan: bad access detected
[   16.521527] 
[   16.521546] Memory state around the buggy address:
[   16.521577]  fff00000c79b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.521618]  fff00000c79ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.521659] >fff00000c79ba080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   16.521695]                                                           ^
[   16.521733]  fff00000c79ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.521774]  fff00000c79ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.521810] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[   16.425514] ==================================================================
[   16.425581] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350
[   16.426460] Read of size 1 at addr fff00000c79c0000 by task kunit_try_catch/154
[   16.426528] 
[   16.426571] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.427200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.427736] Hardware name: linux,dummy-virt (DT)
[   16.427797] Call trace:
[   16.427824]  show_stack+0x20/0x38 (C)
[   16.427882]  dump_stack_lvl+0x8c/0xd0
[   16.427931]  print_report+0x118/0x5d0
[   16.427978]  kasan_report+0xdc/0x128
[   16.428023]  __asan_report_load1_noabort+0x20/0x30
[   16.428074]  page_alloc_uaf+0x328/0x350
[   16.428662]  kunit_try_run_case+0x170/0x3f0
[   16.428734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.428788]  kthread+0x328/0x630
[   16.428878]  ret_from_fork+0x10/0x20
[   16.428930] 
[   16.428951] The buggy address belongs to the physical page:
[   16.429045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079c0
[   16.429173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.429848] page_type: f0(buddy)
[   16.429910] raw: 0bfffe0000000000 fff00000ff616170 fff00000ff616170 0000000000000000
[   16.430259] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000
[   16.430567] page dumped because: kasan: bad access detected
[   16.430612] 
[   16.430630] Memory state around the buggy address:
[   16.430675]  fff00000c79bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.430718]  fff00000c79bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.431365] >fff00000c79c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.431671]                    ^
[   16.431758]  fff00000c79c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.432097]  fff00000c79c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.432410] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[   16.356711] ==================================================================
[   16.357394] BUG: KASAN: invalid-free in kfree+0x270/0x3c8
[   16.357741] Free of addr fff00000c669c001 by task kunit_try_catch/150
[   16.357816] 
[   16.358359] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.359123] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.359204] Hardware name: linux,dummy-virt (DT)
[   16.359591] Call trace:
[   16.359995]  show_stack+0x20/0x38 (C)
[   16.360302]  dump_stack_lvl+0x8c/0xd0
[   16.360580]  print_report+0x118/0x5d0
[   16.360639]  kasan_report_invalid_free+0xc0/0xe8
[   16.360689]  __kasan_kfree_large+0x5c/0xa8
[   16.360736]  free_large_kmalloc+0x64/0x190
[   16.361804]  kfree+0x270/0x3c8
[   16.361861]  kmalloc_large_invalid_free+0x108/0x270
[   16.362461]  kunit_try_run_case+0x170/0x3f0
[   16.362773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.362838]  kthread+0x328/0x630
[   16.363367]  ret_from_fork+0x10/0x20
[   16.364074] 
[   16.364191] The buggy address belongs to the physical page:
[   16.364508] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669c
[   16.364865] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.365297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.365933] page_type: f8(unknown)
[   16.366145] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.367034] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.367335] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.367387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.367443] head: 0bfffe0000000002 ffffc1ffc319a701 00000000ffffffff 00000000ffffffff
[   16.367490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.368677] page dumped because: kasan: bad access detected
[   16.368727] 
[   16.369073] Memory state around the buggy address:
[   16.369312]  fff00000c669bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.369764]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.370359] >fff00000c669c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.370742]                    ^
[   16.370783]  fff00000c669c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.370961]  fff00000c669c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.371223] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[   16.337293] ==================================================================
[   16.337827] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8
[   16.338435] Read of size 1 at addr fff00000c669c000 by task kunit_try_catch/148
[   16.338535] 
[   16.338571] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.338650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.338675] Hardware name: linux,dummy-virt (DT)
[   16.338823] Call trace:
[   16.338850]  show_stack+0x20/0x38 (C)
[   16.338992]  dump_stack_lvl+0x8c/0xd0
[   16.339069]  print_report+0x118/0x5d0
[   16.339229]  kasan_report+0xdc/0x128
[   16.339275]  __asan_report_load1_noabort+0x20/0x30
[   16.339342]  kmalloc_large_uaf+0x2cc/0x2f8
[   16.339412]  kunit_try_run_case+0x170/0x3f0
[   16.339458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.339508]  kthread+0x328/0x630
[   16.339612]  ret_from_fork+0x10/0x20
[   16.339672] 
[   16.339700] The buggy address belongs to the physical page:
[   16.340013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669c
[   16.340069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.340131] raw: 0bfffe0000000000 fff00000da479c40 fff00000da479c40 0000000000000000
[   16.340183] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   16.340222] page dumped because: kasan: bad access detected
[   16.340252] 
[   16.340271] Memory state around the buggy address:
[   16.340538]  fff00000c669bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.340854]  fff00000c669bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.340897] >fff00000c669c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.340960]                    ^
[   16.340988]  fff00000c669c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.341029]  fff00000c669c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   16.341065] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   16.323521] ==================================================================
[   16.323693] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8
[   16.323748] Write of size 1 at addr fff00000c669e00a by task kunit_try_catch/146
[   16.323797] 
[   16.324203] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.324350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.324377] Hardware name: linux,dummy-virt (DT)
[   16.324408] Call trace:
[   16.324459]  show_stack+0x20/0x38 (C)
[   16.324583]  dump_stack_lvl+0x8c/0xd0
[   16.324664]  print_report+0x118/0x5d0
[   16.324709]  kasan_report+0xdc/0x128
[   16.324833]  __asan_report_store1_noabort+0x20/0x30
[   16.324909]  kmalloc_large_oob_right+0x278/0x2b8
[   16.324956]  kunit_try_run_case+0x170/0x3f0
[   16.325238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.325298]  kthread+0x328/0x630
[   16.325404]  ret_from_fork+0x10/0x20
[   16.325464] 
[   16.325526] The buggy address belongs to the physical page:
[   16.325558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10669c
[   16.325666] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.325723] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.325782] page_type: f8(unknown)
[   16.325821] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.325869] raw: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.326092] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000
[   16.326387] head: 0000000000000000 0000000000000000 00000001f8000000 0000000000000000
[   16.326438] head: 0bfffe0000000002 ffffc1ffc319a701 00000000ffffffff 00000000ffffffff
[   16.326625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004
[   16.326788] page dumped because: kasan: bad access detected
[   16.326915] 
[   16.326933] Memory state around the buggy address:
[   16.327022]  fff00000c669df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.327064]  fff00000c669df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.327219] >fff00000c669e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.327400]                       ^
[   16.327648]  fff00000c669e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.327744]  fff00000c669e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   16.327780] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[   16.309894] ==================================================================
[   16.310075] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0
[   16.310220] Write of size 1 at addr fff00000c662df00 by task kunit_try_catch/144
[   16.310467] 
[   16.310500] CPU: 1 UID: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.310647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.310769] Hardware name: linux,dummy-virt (DT)
[   16.310844] Call trace:
[   16.310867]  show_stack+0x20/0x38 (C)
[   16.310915]  dump_stack_lvl+0x8c/0xd0
[   16.310967]  print_report+0x118/0x5d0
[   16.311099]  kasan_report+0xdc/0x128
[   16.311234]  __asan_report_store1_noabort+0x20/0x30
[   16.311360]  kmalloc_big_oob_right+0x2a4/0x2f0
[   16.311406]  kunit_try_run_case+0x170/0x3f0
[   16.311452]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.311502]  kthread+0x328/0x630
[   16.311544]  ret_from_fork+0x10/0x20
[   16.311695] 
[   16.312050] Allocated by task 144:
[   16.312263]  kasan_save_stack+0x3c/0x68
[   16.312308]  kasan_save_track+0x20/0x40
[   16.312358]  kasan_save_alloc_info+0x40/0x58
[   16.312396]  __kasan_kmalloc+0xd4/0xd8
[   16.312593]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.312867]  kmalloc_big_oob_right+0xb8/0x2f0
[   16.312913]  kunit_try_run_case+0x170/0x3f0
[   16.312951]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.312993]  kthread+0x328/0x630
[   16.313025]  ret_from_fork+0x10/0x20
[   16.313063] 
[   16.313084] The buggy address belongs to the object at fff00000c662c000
[   16.313084]  which belongs to the cache kmalloc-8k of size 8192
[   16.313150] The buggy address is located 0 bytes to the right of
[   16.313150]  allocated 7936-byte region [fff00000c662c000, fff00000c662df00)
[   16.313211] 
[   16.313253] The buggy address belongs to the physical page:
[   16.313357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106628
[   16.313646] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.313729] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.314037] page_type: f5(slab)
[   16.314222] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.314311] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.314370] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000
[   16.314417] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   16.314464] head: 0bfffe0000000003 ffffc1ffc3198a01 00000000ffffffff 00000000ffffffff
[   16.314719] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.314761] page dumped because: kasan: bad access detected
[   16.314791] 
[   16.314820] Memory state around the buggy address:
[   16.314929]  fff00000c662de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.314971]  fff00000c662de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.315011] >fff00000c662df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.315047]                    ^
[   16.315096]  fff00000c662df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.315241]  fff00000c662e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.315508] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[   16.296443] ==================================================================
[   16.296539] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488
[   16.296592] Write of size 1 at addr fff00000c5b7d778 by task kunit_try_catch/142
[   16.296947] 
[   16.296988] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.297079] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.297105] Hardware name: linux,dummy-virt (DT)
[   16.297135] Call trace:
[   16.297157]  show_stack+0x20/0x38 (C)
[   16.297206]  dump_stack_lvl+0x8c/0xd0
[   16.297274]  print_report+0x118/0x5d0
[   16.297334]  kasan_report+0xdc/0x128
[   16.297381]  __asan_report_store1_noabort+0x20/0x30
[   16.297432]  kmalloc_track_caller_oob_right+0x418/0x488
[   16.297499]  kunit_try_run_case+0x170/0x3f0
[   16.297549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.297620]  kthread+0x328/0x630
[   16.297834]  ret_from_fork+0x10/0x20
[   16.297974] 
[   16.298042] Allocated by task 142:
[   16.298075]  kasan_save_stack+0x3c/0x68
[   16.298141]  kasan_save_track+0x20/0x40
[   16.298178]  kasan_save_alloc_info+0x40/0x58
[   16.298261]  __kasan_kmalloc+0xd4/0xd8
[   16.298463]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.298518]  kmalloc_track_caller_oob_right+0x184/0x488
[   16.298558]  kunit_try_run_case+0x170/0x3f0
[   16.298625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.298667]  kthread+0x328/0x630
[   16.298698]  ret_from_fork+0x10/0x20
[   16.298777] 
[   16.298882] The buggy address belongs to the object at fff00000c5b7d700
[   16.298882]  which belongs to the cache kmalloc-128 of size 128
[   16.299089] The buggy address is located 0 bytes to the right of
[   16.299089]  allocated 120-byte region [fff00000c5b7d700, fff00000c5b7d778)
[   16.299205] 
[   16.299224] The buggy address belongs to the physical page:
[   16.299254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.299801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.299955] page_type: f5(slab)
[   16.300169] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.300219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.300313] page dumped because: kasan: bad access detected
[   16.300354] 
[   16.300371] Memory state around the buggy address:
[   16.300401]  fff00000c5b7d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.300625]  fff00000c5b7d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300735] >fff00000c5b7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.300794]                                                                 ^
[   16.300896]  fff00000c5b7d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.300963]  fff00000c5b7d800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.301008] ==================================================================
[   16.290929] ==================================================================
[   16.290988] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488
[   16.291275] Write of size 1 at addr fff00000c5b7d678 by task kunit_try_catch/142
[   16.291515] 
[   16.291785] CPU: 1 UID: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.292072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.292126] Hardware name: linux,dummy-virt (DT)
[   16.292196] Call trace:
[   16.292227]  show_stack+0x20/0x38 (C)
[   16.292376]  dump_stack_lvl+0x8c/0xd0
[   16.292477]  print_report+0x118/0x5d0
[   16.292545]  kasan_report+0xdc/0x128
[   16.292591]  __asan_report_store1_noabort+0x20/0x30
[   16.292642]  kmalloc_track_caller_oob_right+0x40c/0x488
[   16.292691]  kunit_try_run_case+0x170/0x3f0
[   16.292738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.292790]  kthread+0x328/0x630
[   16.292831]  ret_from_fork+0x10/0x20
[   16.292879] 
[   16.292897] Allocated by task 142:
[   16.292924]  kasan_save_stack+0x3c/0x68
[   16.292973]  kasan_save_track+0x20/0x40
[   16.293010]  kasan_save_alloc_info+0x40/0x58
[   16.293048]  __kasan_kmalloc+0xd4/0xd8
[   16.293083]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.293125]  kmalloc_track_caller_oob_right+0xa8/0x488
[   16.293233]  kunit_try_run_case+0x170/0x3f0
[   16.293483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.293664]  kthread+0x328/0x630
[   16.293803]  ret_from_fork+0x10/0x20
[   16.293965] 
[   16.293985] The buggy address belongs to the object at fff00000c5b7d600
[   16.293985]  which belongs to the cache kmalloc-128 of size 128
[   16.294306] The buggy address is located 0 bytes to the right of
[   16.294306]  allocated 120-byte region [fff00000c5b7d600, fff00000c5b7d678)
[   16.294416] 
[   16.294436] The buggy address belongs to the physical page:
[   16.294547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.294705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.294759] page_type: f5(slab)
[   16.294800] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.294849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.294888] page dumped because: kasan: bad access detected
[   16.294929] 
[   16.294946] Memory state around the buggy address:
[   16.294977]  fff00000c5b7d500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.295070]  fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.295389] >fff00000c5b7d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   16.295481]                                                                 ^
[   16.295574]  fff00000c5b7d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.295621]  fff00000c5b7d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.295657] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   16.277559] ==================================================================
[   16.277748] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330
[   16.278011] Read of size 1 at addr fff00000c65b7000 by task kunit_try_catch/140
[   16.278061] 
[   16.278095] CPU: 1 UID: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.278202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.278228] Hardware name: linux,dummy-virt (DT)
[   16.278330] Call trace:
[   16.278419]  show_stack+0x20/0x38 (C)
[   16.278789]  dump_stack_lvl+0x8c/0xd0
[   16.278936]  print_report+0x118/0x5d0
[   16.278988]  kasan_report+0xdc/0x128
[   16.279034]  __asan_report_load1_noabort+0x20/0x30
[   16.279084]  kmalloc_node_oob_right+0x2f4/0x330
[   16.279132]  kunit_try_run_case+0x170/0x3f0
[   16.279179]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.279231]  kthread+0x328/0x630
[   16.279273]  ret_from_fork+0x10/0x20
[   16.279333] 
[   16.279352] Allocated by task 140:
[   16.279379]  kasan_save_stack+0x3c/0x68
[   16.279419]  kasan_save_track+0x20/0x40
[   16.279456]  kasan_save_alloc_info+0x40/0x58
[   16.279495]  __kasan_kmalloc+0xd4/0xd8
[   16.279530]  __kmalloc_cache_node_noprof+0x178/0x3d0
[   16.279619]  kmalloc_node_oob_right+0xbc/0x330
[   16.279663]  kunit_try_run_case+0x170/0x3f0
[   16.279699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.279830]  kthread+0x328/0x630
[   16.279900]  ret_from_fork+0x10/0x20
[   16.280100] 
[   16.280120] The buggy address belongs to the object at fff00000c65b6000
[   16.280120]  which belongs to the cache kmalloc-4k of size 4096
[   16.280342] The buggy address is located 0 bytes to the right of
[   16.280342]  allocated 4096-byte region [fff00000c65b6000, fff00000c65b7000)
[   16.280408] 
[   16.280427] The buggy address belongs to the physical page:
[   16.280510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b0
[   16.280787] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   16.280843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff)
[   16.280907] page_type: f5(slab)
[   16.280948] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.280997] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.281313] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000
[   16.281398] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   16.281447] head: 0bfffe0000000003 ffffc1ffc3196c01 00000000ffffffff 00000000ffffffff
[   16.281494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[   16.281647] page dumped because: kasan: bad access detected
[   16.281712] 
[   16.281760] Memory state around the buggy address:
[   16.281842]  fff00000c65b6f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.281920]  fff00000c65b6f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   16.282045] >fff00000c65b7000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282082]                    ^
[   16.282110]  fff00000c65b7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282151]  fff00000c65b7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.282189] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   16.264028] ==================================================================
[   16.264220] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   16.264406] Read of size 1 at addr fff00000c5a02b7f by task kunit_try_catch/138
[   16.264675] 
[   16.264721] CPU: 1 UID: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.264810] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.264907] Hardware name: linux,dummy-virt (DT)
[   16.264982] Call trace:
[   16.265004]  show_stack+0x20/0x38 (C)
[   16.265053]  dump_stack_lvl+0x8c/0xd0
[   16.265099]  print_report+0x118/0x5d0
[   16.265144]  kasan_report+0xdc/0x128
[   16.265190]  __asan_report_load1_noabort+0x20/0x30
[   16.265241]  kmalloc_oob_left+0x2ec/0x320
[   16.265286]  kunit_try_run_case+0x170/0x3f0
[   16.265344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.265396]  kthread+0x328/0x630
[   16.265661]  ret_from_fork+0x10/0x20
[   16.265734] 
[   16.265752] Allocated by task 24:
[   16.265790]  kasan_save_stack+0x3c/0x68
[   16.265831]  kasan_save_track+0x20/0x40
[   16.265868]  kasan_save_alloc_info+0x40/0x58
[   16.265910]  __kasan_kmalloc+0xd4/0xd8
[   16.265946]  __kmalloc_node_track_caller_noprof+0x194/0x4b8
[   16.266006]  kvasprintf+0xe0/0x180
[   16.266041]  __kthread_create_on_node+0x16c/0x350
[   16.266180]  kthread_create_on_node+0xe4/0x130
[   16.266219]  create_worker+0x380/0x6b8
[   16.266254]  worker_thread+0x808/0xf38
[   16.266317]  kthread+0x328/0x630
[   16.266518]  ret_from_fork+0x10/0x20
[   16.266653] 
[   16.266672] The buggy address belongs to the object at fff00000c5a02b60
[   16.266672]  which belongs to the cache kmalloc-16 of size 16
[   16.266745] The buggy address is located 19 bytes to the right of
[   16.266745]  allocated 12-byte region [fff00000c5a02b60, fff00000c5a02b6c)
[   16.266827] 
[   16.266908] The buggy address belongs to the physical page:
[   16.266955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a02
[   16.267068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.267136] page_type: f5(slab)
[   16.267202] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000
[   16.267780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   16.267827] page dumped because: kasan: bad access detected
[   16.267858] 
[   16.267875] Memory state around the buggy address:
[   16.267907]  fff00000c5a02a00: 00 02 fc fc 00 02 fc fc 00 02 fc fc 00 05 fc fc
[   16.268250]  fff00000c5a02a80: fa fb fc fc 00 02 fc fc fa fb fc fc fa fb fc fc
[   16.268348] >fff00000c5a02b00: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   16.268385]                                                                 ^
[   16.268424]  fff00000c5a02b80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.268519]  fff00000c5a02c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.268738] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   16.248134] ==================================================================
[   16.248185] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   16.248672] Write of size 1 at addr fff00000c5b7d578 by task kunit_try_catch/136
[   16.248723] 
[   16.248765] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.248850] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.248876] Hardware name: linux,dummy-virt (DT)
[   16.248906] Call trace:
[   16.248928]  show_stack+0x20/0x38 (C)
[   16.249054]  dump_stack_lvl+0x8c/0xd0
[   16.249102]  print_report+0x118/0x5d0
[   16.249148]  kasan_report+0xdc/0x128
[   16.249193]  __asan_report_store1_noabort+0x20/0x30
[   16.249243]  kmalloc_oob_right+0x538/0x660
[   16.249288]  kunit_try_run_case+0x170/0x3f0
[   16.249351]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.249403]  kthread+0x328/0x630
[   16.249445]  ret_from_fork+0x10/0x20
[   16.249491] 
[   16.249509] Allocated by task 136:
[   16.249537]  kasan_save_stack+0x3c/0x68
[   16.249576]  kasan_save_track+0x20/0x40
[   16.249611]  kasan_save_alloc_info+0x40/0x58
[   16.249662]  __kasan_kmalloc+0xd4/0xd8
[   16.249698]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.249736]  kmalloc_oob_right+0xb0/0x660
[   16.249818]  kunit_try_run_case+0x170/0x3f0
[   16.249855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.250003]  kthread+0x328/0x630
[   16.250035]  ret_from_fork+0x10/0x20
[   16.250069] 
[   16.250087] The buggy address belongs to the object at fff00000c5b7d500
[   16.250087]  which belongs to the cache kmalloc-128 of size 128
[   16.250142] The buggy address is located 5 bytes to the right of
[   16.250142]  allocated 115-byte region [fff00000c5b7d500, fff00000c5b7d573)
[   16.250203] 
[   16.250465] The buggy address belongs to the physical page:
[   16.250501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.250599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.250727] page_type: f5(slab)
[   16.250766] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.250816] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.250855] page dumped because: kasan: bad access detected
[   16.250885] 
[   16.250903] Memory state around the buggy address:
[   16.250933]  fff00000c5b7d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.251126]  fff00000c5b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.251169] >fff00000c5b7d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.251205]                                                                 ^
[   16.251244]  fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.251284]  fff00000c5b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.251330] ==================================================================
[   16.252911] ==================================================================
[   16.252958] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   16.253006] Read of size 1 at addr fff00000c5b7d580 by task kunit_try_catch/136
[   16.253061] 
[   16.253090] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc6 #1 PREEMPT 
[   16.253167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.253194] Hardware name: linux,dummy-virt (DT)
[   16.253223] Call trace:
[   16.253244]  show_stack+0x20/0x38 (C)
[   16.253297]  dump_stack_lvl+0x8c/0xd0
[   16.253560]  print_report+0x118/0x5d0
[   16.253635]  kasan_report+0xdc/0x128
[   16.253787]  __asan_report_load1_noabort+0x20/0x30
[   16.253928]  kmalloc_oob_right+0x5d0/0x660
[   16.253974]  kunit_try_run_case+0x170/0x3f0
[   16.254020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.254071]  kthread+0x328/0x630
[   16.254112]  ret_from_fork+0x10/0x20
[   16.254158] 
[   16.254176] Allocated by task 136:
[   16.254209]  kasan_save_stack+0x3c/0x68
[   16.254720]  kasan_save_track+0x20/0x40
[   16.254784]  kasan_save_alloc_info+0x40/0x58
[   16.255219]  __kasan_kmalloc+0xd4/0xd8
[   16.255259]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.255478]  kmalloc_oob_right+0xb0/0x660
[   16.255548]  kunit_try_run_case+0x170/0x3f0
[   16.255795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.255847]  kthread+0x328/0x630
[   16.255889]  ret_from_fork+0x10/0x20
[   16.256034] 
[   16.256065] The buggy address belongs to the object at fff00000c5b7d500
[   16.256065]  which belongs to the cache kmalloc-128 of size 128
[   16.256121] The buggy address is located 13 bytes to the right of
[   16.256121]  allocated 115-byte region [fff00000c5b7d500, fff00000c5b7d573)
[   16.256189] 
[   16.256375] The buggy address belongs to the physical page:
[   16.256422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.256475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.256550] page_type: f5(slab)
[   16.256634] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.256700] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.256831] page dumped because: kasan: bad access detected
[   16.256875] 
[   16.256892] Memory state around the buggy address:
[   16.256922]  fff00000c5b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.256963]  fff00000c5b7d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.257003] >fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.257039]                    ^
[   16.257066]  fff00000c5b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.257176]  fff00000c5b7d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.257213] ==================================================================
[   16.233656] ==================================================================
[   16.234205] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   16.235636] Write of size 1 at addr fff00000c5b7d573 by task kunit_try_catch/136
[   16.235743] 
[   16.237851] CPU: 1 UID: 0 PID: 136 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc6 #1 PREEMPT 
[   16.238009] Tainted: [N]=TEST
[   16.238042] Hardware name: linux,dummy-virt (DT)
[   16.238392] Call trace:
[   16.238618]  show_stack+0x20/0x38 (C)
[   16.239267]  dump_stack_lvl+0x8c/0xd0
[   16.239417]  print_report+0x118/0x5d0
[   16.239470]  kasan_report+0xdc/0x128
[   16.239650]  __asan_report_store1_noabort+0x20/0x30
[   16.239716]  kmalloc_oob_right+0x5a4/0x660
[   16.239769]  kunit_try_run_case+0x170/0x3f0
[   16.239866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.240016]  kthread+0x328/0x630
[   16.240061]  ret_from_fork+0x10/0x20
[   16.240335] 
[   16.240379] Allocated by task 136:
[   16.240523]  kasan_save_stack+0x3c/0x68
[   16.240611]  kasan_save_track+0x20/0x40
[   16.240651]  kasan_save_alloc_info+0x40/0x58
[   16.240690]  __kasan_kmalloc+0xd4/0xd8
[   16.240727]  __kmalloc_cache_noprof+0x16c/0x3c0
[   16.240767]  kmalloc_oob_right+0xb0/0x660
[   16.241059]  kunit_try_run_case+0x170/0x3f0
[   16.241209]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   16.241347]  kthread+0x328/0x630
[   16.241435]  ret_from_fork+0x10/0x20
[   16.241729] 
[   16.242030] The buggy address belongs to the object at fff00000c5b7d500
[   16.242030]  which belongs to the cache kmalloc-128 of size 128
[   16.242135] The buggy address is located 0 bytes to the right of
[   16.242135]  allocated 115-byte region [fff00000c5b7d500, fff00000c5b7d573)
[   16.242201] 
[   16.242611] The buggy address belongs to the physical page:
[   16.242840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105b7d
[   16.243399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   16.244252] page_type: f5(slab)
[   16.244888] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000
[   16.244954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   16.245178] page dumped because: kasan: bad access detected
[   16.245257] 
[   16.245297] Memory state around the buggy address:
[   16.245533]  fff00000c5b7d400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   16.245600]  fff00000c5b7d480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.245971] >fff00000c5b7d500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   16.246044]                                                              ^
[   16.246136]  fff00000c5b7d580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.246178]  fff00000c5b7d600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.246499] ==================================================================
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog10
------------[ cut here ]------------
[   95.016224] WARNING: CPU: 1 PID: 656 at lib/math/int_log.c:120 intlog10+0x38/0x48
[   95.018276] Modules linked in:
[   95.018546] CPU: 1 UID: 0 PID: 656 Comm: kunit_try_catch Tainted: G    B D W        N  6.16.0-rc6 #1 PREEMPT 
[   95.019473] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[   95.020032] Hardware name: linux,dummy-virt (DT)
[   95.020521] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   95.021336] pc : intlog10+0x38/0x48
[   95.021655] lr : intlog10_test+0xe4/0x200
[   95.022104] sp : ffff8000823f7c10
[   95.022459] x29: ffff8000823f7c90 x28: 0000000000000000 x27: 0000000000000000
[   95.022986] x26: 1ffe0000187eba21 x25: 0000000000000000 x24: ffff8000823f7ce0
[   95.023346] x23: ffff8000823f7d00 x22: 0000000000000000 x21: 1ffff0001047ef82
[   95.023692] x20: ffffaeee58c89d80 x19: ffff800080087990 x18: 000000004403f9f9
[   95.024038] x17: 000000001e265eb1 x16: fff00000c0975c3c x15: fff00000ff616b08
[   95.024515] x14: 0000000000018fff x13: 1ffe00001b48a7cd x12: ffff75ddcb963379
[   95.025286] x11: 1ffff5ddcb963378 x10: ffff75ddcb963378 x9 : ffffaeee56234e9c
[   95.026041] x8 : ffffaeee5cb19bc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   95.026790] x5 : ffff70001047ef82 x4 : 1ffff00010010f3a x3 : 1ffff5ddcb1913b0
[   95.027529] x2 : 1ffff5ddcb1913b0 x1 : 0000000000000003 x0 : 0000000000000000
[   95.028268] Call trace:
[   95.028581]  intlog10+0x38/0x48 (P)
[   95.029021]  kunit_try_run_case+0x170/0x3f0
[   95.029536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   95.030239]  kthread+0x328/0x630
[   95.030623]  ret_from_fork+0x10/0x20
[   95.031027] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-cpu-pid-at-libmathint_log-intlog2
------------[ cut here ]------------
[   94.967828] WARNING: CPU: 1 PID: 638 at lib/math/int_log.c:63 intlog2+0xd8/0xf8
[   94.970777] Modules linked in:
[   94.971307] CPU: 1 UID: 0 PID: 638 Comm: kunit_try_catch Tainted: G    B D          N  6.16.0-rc6 #1 PREEMPT 
[   94.972484] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST
[   94.973059] Hardware name: linux,dummy-virt (DT)
[   94.973596] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   94.974374] pc : intlog2+0xd8/0xf8
[   94.974794] lr : intlog2_test+0xe4/0x200
[   94.975208] sp : ffff800082347c10
[   94.975586] x29: ffff800082347c90 x28: 0000000000000000 x27: 0000000000000000
[   94.976628] x26: 1ffe000018e8b081 x25: 0000000000000000 x24: ffff800082347ce0
[   94.978034] x23: ffff800082347d00 x22: 0000000000000000 x21: 1ffff00010468f82
[   94.978437] x20: ffffaeee58c89c80 x19: ffff800080087990 x18: 000000004d6f4d91
[   94.978781] x17: 00000000130019ae x16: fff00000c0975c3c x15: fff00000ff616b08
[   94.979118] x14: 0000000000018fff x13: 1ffe00001b48a7cd x12: ffff75ddcb963379
[   94.979757] x11: 1ffff5ddcb963378 x10: ffff75ddcb963378 x9 : ffffaeee5623509c
[   94.980536] x8 : ffffaeee5cb19bc3 x7 : 0000000000000001 x6 : 00000000f1f1f1f1
[   94.981457] x5 : ffff700010468f82 x4 : 1ffff00010010f3a x3 : 1ffff5ddcb191390
[   94.982282] x2 : 1ffff5ddcb191390 x1 : 0000000000000003 x0 : 0000000000000000
[   94.983111] Call trace:
[   94.983500]  intlog2+0xd8/0xf8 (P)
[   94.983911]  kunit_try_run_case+0x170/0x3f0
[   94.984423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   94.985120]  kthread+0x328/0x630
[   94.985548]  ret_from_fork+0x10/0x20
[   94.986052] ---[ end trace 0000000000000000 ]---