Hay
Date
July 15, 2025, 2:10 p.m.
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   75.408920] ==================================================================
[   75.409822] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xc0/0x310
[   75.410674] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169
[   75.411162] 
[   75.411356] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.412506] Hardware name: linux,dummy-virt (DT)
[   75.413105] Call trace:
[   75.413498]  dump_backtrace.part.0+0xdc/0xf0
[   75.414278]  show_stack+0x18/0x30
[   75.414941]  dump_stack_lvl+0x64/0x80
[   75.415555]  print_report+0x158/0x438
[   75.416171]  kasan_report+0xb4/0xf4
[   75.416733]  __asan_load1+0x68/0x74
[   75.417288]  vmalloc_oob+0xc0/0x310
[   75.417931]  kunit_try_run_case+0x84/0x120
[   75.418595]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.419334]  kthread+0x180/0x190
[   75.419680]  ret_from_fork+0x10/0x20
[   75.420030] 
[   75.420212] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping
[   75.421073] The buggy address belongs to the physical page:
[   75.421766] page:0000000068235c0c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a7c
[   75.423008] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   75.423898] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   75.424851] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.425735] page dumped because: kasan: bad access detected
[   75.426497] 
[   75.426763] Memory state around the buggy address:
[   75.427570]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.428459]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.429171] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   75.429910]                                                              ^
[   75.430788]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   75.431738]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   75.432640] ==================================================================
[   75.434063] ==================================================================
[   75.434950] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe0/0x310
[   75.435628] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169
[   75.436242] 
[   75.436449] CPU: 0 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.437100] Hardware name: linux,dummy-virt (DT)
[   75.437566] Call trace:
[   75.437834]  dump_backtrace.part.0+0xdc/0xf0
[   75.438539]  show_stack+0x18/0x30
[   75.438970]  dump_stack_lvl+0x64/0x80
[   75.439412]  print_report+0x158/0x438
[   75.439883]  kasan_report+0xb4/0xf4
[   75.440280]  __asan_load1+0x68/0x74
[   75.440681]  vmalloc_oob+0xe0/0x310
[   75.441066]  kunit_try_run_case+0x84/0x120
[   75.441546]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.442095]  kthread+0x180/0x190
[   75.442524]  ret_from_fork+0x10/0x20
[   75.443130] 
[   75.443321] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping
[   75.443806] The buggy address belongs to the physical page:
[   75.444164] page:0000000068235c0c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101a7c
[   75.444747] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   75.445242] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   75.446323] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.447286] page dumped because: kasan: bad access detected
[   75.447966] 
[   75.448237] Memory state around the buggy address:
[   75.448863]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.449738]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.450762] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   75.451607]                                                                 ^
[   75.452455]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   75.453321]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   75.454914] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree
[   75.367597] ==================================================================
[   75.368147] BUG: KASAN: double-free in kfree+0x58/0x80
[   75.368844] Free of addr ffff0000c5938e00 by task kunit_try_catch/167
[   75.369327] 
[   75.369589] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.370378] Hardware name: linux,dummy-virt (DT)
[   75.370793] Call trace:
[   75.371061]  dump_backtrace.part.0+0xdc/0xf0
[   75.371591]  show_stack+0x18/0x30
[   75.372017]  dump_stack_lvl+0x64/0x80
[   75.372510]  print_report+0x158/0x438
[   75.372916]  kasan_report_invalid_free+0x9c/0xc0
[   75.373384]  __kasan_slab_free+0x118/0x150
[   75.374457]  __kmem_cache_free+0x130/0x2a4
[   75.375070]  kfree+0x58/0x80
[   75.375786]  kfree_sensitive+0x24/0x5c
[   75.376213]  kmalloc_double_kzfree+0xc4/0x1d0
[   75.376720]  kunit_try_run_case+0x84/0x120
[   75.377178]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.377749]  kthread+0x180/0x190
[   75.378135]  ret_from_fork+0x10/0x20
[   75.378568] 
[   75.378748] Allocated by task 167:
[   75.379114]  kasan_save_stack+0x3c/0x70
[   75.379513]  kasan_set_track+0x2c/0x40
[   75.379944]  kasan_save_alloc_info+0x24/0x34
[   75.380432]  __kasan_kmalloc+0xb8/0xc0
[   75.380833]  kmalloc_trace+0x58/0x6c
[   75.381254]  kmalloc_double_kzfree+0x94/0x1d0
[   75.381725]  kunit_try_run_case+0x84/0x120
[   75.382937]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.383515]  kthread+0x180/0x190
[   75.383876]  ret_from_fork+0x10/0x20
[   75.384307] 
[   75.384495] Freed by task 167:
[   75.384830]  kasan_save_stack+0x3c/0x70
[   75.385211]  kasan_set_track+0x2c/0x40
[   75.385660]  kasan_save_free_info+0x38/0x5c
[   75.386087]  __kasan_slab_free+0xe4/0x150
[   75.386532]  __kmem_cache_free+0x130/0x2a4
[   75.387017]  kfree+0x58/0x80
[   75.387374]  kfree_sensitive+0x4c/0x5c
[   75.387828]  kmalloc_double_kzfree+0xb4/0x1d0
[   75.388283]  kunit_try_run_case+0x84/0x120
[   75.388756]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.389290]  kthread+0x180/0x190
[   75.389679]  ret_from_fork+0x10/0x20
[   75.390086] 
[   75.390274] The buggy address belongs to the object at ffff0000c5938e00
[   75.390274]  which belongs to the cache kmalloc-128 of size 128
[   75.391207] The buggy address is located 0 bytes inside of
[   75.391207]  128-byte region [ffff0000c5938e00, ffff0000c5938e80)
[   75.392083] 
[   75.392282] The buggy address belongs to the physical page:
[   75.393457] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   75.394065] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.394624] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.395636] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.396255] page dumped because: kasan: bad access detected
[   75.396810] 
[   75.397123] Memory state around the buggy address:
[   75.397643]  ffff0000c5938d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.398951]  ffff0000c5938d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.399629] >ffff0000c5938e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.400277]                    ^
[   75.400702]  ffff0000c5938e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.401383]  ffff0000c5938f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.402019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kfree_sensitive
[   75.326116] ==================================================================
[   75.327374] BUG: KASAN: use-after-free in kfree_sensitive+0x18/0x5c
[   75.328032] Read of size 1 at addr ffff0000c5938e00 by task kunit_try_catch/167
[   75.328733] 
[   75.329029] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.329855] Hardware name: linux,dummy-virt (DT)
[   75.330320] Call trace:
[   75.330637]  dump_backtrace.part.0+0xdc/0xf0
[   75.331155]  show_stack+0x18/0x30
[   75.331750]  dump_stack_lvl+0x64/0x80
[   75.332348]  print_report+0x158/0x438
[   75.332965]  kasan_report+0xb4/0xf4
[   75.333420]  __kasan_check_byte+0x54/0x70
[   75.334795]  ksize+0x3c/0x94
[   75.335281]  kfree_sensitive+0x18/0x5c
[   75.335673]  kmalloc_double_kzfree+0xc4/0x1d0
[   75.336082]  kunit_try_run_case+0x84/0x120
[   75.336482]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.336951]  kthread+0x180/0x190
[   75.337271]  ret_from_fork+0x10/0x20
[   75.338053] 
[   75.338246] Allocated by task 167:
[   75.338534]  kasan_save_stack+0x3c/0x70
[   75.338889]  kasan_set_track+0x2c/0x40
[   75.339225]  kasan_save_alloc_info+0x24/0x34
[   75.341016]  __kasan_kmalloc+0xb8/0xc0
[   75.341737]  kmalloc_trace+0x58/0x6c
[   75.343082]  kmalloc_double_kzfree+0x94/0x1d0
[   75.344123]  kunit_try_run_case+0x84/0x120
[   75.345198]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.347550]  kthread+0x180/0x190
[   75.348469]  ret_from_fork+0x10/0x20
[   75.348863] 
[   75.349046] Freed by task 167:
[   75.349671]  kasan_save_stack+0x3c/0x70
[   75.350187]  kasan_set_track+0x2c/0x40
[   75.351216]  kasan_save_free_info+0x38/0x5c
[   75.351706]  __kasan_slab_free+0xe4/0x150
[   75.352138]  __kmem_cache_free+0x130/0x2a4
[   75.352623]  kfree+0x58/0x80
[   75.353012]  kfree_sensitive+0x4c/0x5c
[   75.353419]  kmalloc_double_kzfree+0xb4/0x1d0
[   75.353880]  kunit_try_run_case+0x84/0x120
[   75.354342]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.354866]  kthread+0x180/0x190
[   75.355235]  ret_from_fork+0x10/0x20
[   75.355676] 
[   75.355871] The buggy address belongs to the object at ffff0000c5938e00
[   75.355871]  which belongs to the cache kmalloc-128 of size 128
[   75.356769] The buggy address is located 0 bytes inside of
[   75.356769]  128-byte region [ffff0000c5938e00, ffff0000c5938e80)
[   75.357662] 
[   75.357869] The buggy address belongs to the physical page:
[   75.358326] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   75.359071] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.360298] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.360978] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.361476] page dumped because: kasan: bad access detected
[   75.361994] 
[   75.362257] Memory state around the buggy address:
[   75.362759]  ffff0000c5938d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.363387]  ffff0000c5938d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.364007] >ffff0000c5938e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.364556]                    ^
[   75.364895]  ffff0000c5938e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.365362]  ffff0000c5938f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.366709] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[   75.168600] ==================================================================
[   75.169128] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x130/0x760
[   75.170032] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.171317] 
[   75.171563] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.172257] Hardware name: linux,dummy-virt (DT)
[   75.172670] Call trace:
[   75.172925]  dump_backtrace.part.0+0xdc/0xf0
[   75.173418]  show_stack+0x18/0x30
[   75.173826]  dump_stack_lvl+0x64/0x80
[   75.174218]  print_report+0x158/0x438
[   75.174679]  kasan_report+0xb4/0xf4
[   75.175060]  kasan_check_range+0xe4/0x190
[   75.175512]  __kasan_check_write+0x28/0x3c
[   75.175967]  kasan_bitops_test_and_modify.constprop.0+0x130/0x760
[   75.176561]  kasan_bitops_generic+0xb8/0x13c
[   75.177037]  kunit_try_run_case+0x84/0x120
[   75.177497]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.178011]  kthread+0x180/0x190
[   75.178379]  ret_from_fork+0x10/0x20
[   75.178792] 
[   75.178993] Allocated by task 165:
[   75.179323]  kasan_save_stack+0x3c/0x70
[   75.179760]  kasan_set_track+0x2c/0x40
[   75.180180]  kasan_save_alloc_info+0x24/0x34
[   75.180665]  __kasan_kmalloc+0xb8/0xc0
[   75.181055]  kmalloc_trace+0x58/0x6c
[   75.181474]  kasan_bitops_generic+0x90/0x13c
[   75.181914]  kunit_try_run_case+0x84/0x120
[   75.182354]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.182901]  kthread+0x180/0x190
[   75.183251]  ret_from_fork+0x10/0x20
[   75.183704] 
[   75.183881] The buggy address belongs to the object at ffff0000c5840b00
[   75.183881]  which belongs to the cache kmalloc-128 of size 128
[   75.184796] The buggy address is located 8 bytes inside of
[   75.184796]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.185666] 
[   75.185854] The buggy address belongs to the physical page:
[   75.186310] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.187084] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.187744] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.188378] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.188982] page dumped because: kasan: bad access detected
[   75.189430] 
[   75.189618] Memory state around the buggy address:
[   75.190015]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.190633]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.191219] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.191809]                       ^
[   75.192158]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.192775]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.193344] ==================================================================
[   75.219513] ==================================================================
[   75.220040] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x188/0x760
[   75.220882] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.221502] 
[   75.221714] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.222450] Hardware name: linux,dummy-virt (DT)
[   75.222880] Call trace:
[   75.223100]  dump_backtrace.part.0+0xdc/0xf0
[   75.223648]  show_stack+0x18/0x30
[   75.224062]  dump_stack_lvl+0x64/0x80
[   75.224519]  print_report+0x158/0x438
[   75.224984]  kasan_report+0xb4/0xf4
[   75.225401]  kasan_check_range+0xe4/0x190
[   75.225886]  __kasan_check_write+0x28/0x3c
[   75.226332]  kasan_bitops_test_and_modify.constprop.0+0x188/0x760
[   75.226948]  kasan_bitops_generic+0xb8/0x13c
[   75.227435]  kunit_try_run_case+0x84/0x120
[   75.227910]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.228472]  kthread+0x180/0x190
[   75.228847]  ret_from_fork+0x10/0x20
[   75.229262] 
[   75.229477] Allocated by task 165:
[   75.229772]  kasan_save_stack+0x3c/0x70
[   75.230216]  kasan_set_track+0x2c/0x40
[   75.230642]  kasan_save_alloc_info+0x24/0x34
[   75.231101]  __kasan_kmalloc+0xb8/0xc0
[   75.231515]  kmalloc_trace+0x58/0x6c
[   75.231929]  kasan_bitops_generic+0x90/0x13c
[   75.232381]  kunit_try_run_case+0x84/0x120
[   75.232843]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.233389]  kthread+0x180/0x190
[   75.233769]  ret_from_fork+0x10/0x20
[   75.234176] 
[   75.234358] The buggy address belongs to the object at ffff0000c5840b00
[   75.234358]  which belongs to the cache kmalloc-128 of size 128
[   75.235284] The buggy address is located 8 bytes inside of
[   75.235284]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.236152] 
[   75.236338] The buggy address belongs to the physical page:
[   75.236820] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.237588] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.238232] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.238870] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.239483] page dumped because: kasan: bad access detected
[   75.239946] 
[   75.240138] Memory state around the buggy address:
[   75.240567]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.241154]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.241745] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.242317]                       ^
[   75.242653]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.243265]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.243882] ==================================================================
[   75.245017] ==================================================================
[   75.245597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760
[   75.246451] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.246989] 
[   75.247224] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.247928] Hardware name: linux,dummy-virt (DT)
[   75.248341] Call trace:
[   75.248599]  dump_backtrace.part.0+0xdc/0xf0
[   75.249154]  show_stack+0x18/0x30
[   75.249582]  dump_stack_lvl+0x64/0x80
[   75.249963]  print_report+0x158/0x438
[   75.250401]  kasan_report+0xb4/0xf4
[   75.250794]  __asan_load8+0x80/0xac
[   75.251184]  kasan_bitops_test_and_modify.constprop.0+0x1b4/0x760
[   75.251771]  kasan_bitops_generic+0xb8/0x13c
[   75.252224]  kunit_try_run_case+0x84/0x120
[   75.252692]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.253218]  kthread+0x180/0x190
[   75.253611]  ret_from_fork+0x10/0x20
[   75.254017] 
[   75.254190] Allocated by task 165:
[   75.254553]  kasan_save_stack+0x3c/0x70
[   75.254973]  kasan_set_track+0x2c/0x40
[   75.255361]  kasan_save_alloc_info+0x24/0x34
[   75.255826]  __kasan_kmalloc+0xb8/0xc0
[   75.256210]  kmalloc_trace+0x58/0x6c
[   75.256626]  kasan_bitops_generic+0x90/0x13c
[   75.257107]  kunit_try_run_case+0x84/0x120
[   75.257550]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.258064]  kthread+0x180/0x190
[   75.258438]  ret_from_fork+0x10/0x20
[   75.258837] 
[   75.259022] The buggy address belongs to the object at ffff0000c5840b00
[   75.259022]  which belongs to the cache kmalloc-128 of size 128
[   75.259915] The buggy address is located 8 bytes inside of
[   75.259915]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.260767] 
[   75.260962] The buggy address belongs to the physical page:
[   75.261402] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.262122] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.262771] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.263374] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.263987] page dumped because: kasan: bad access detected
[   75.264439] 
[   75.264624] Memory state around the buggy address:
[   75.265034]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.265637]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.266189] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.266786]                       ^
[   75.267127]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.267759]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.268333] ==================================================================
[   75.293915] ==================================================================
[   75.294496] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x208/0x760
[   75.295271] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.295889] 
[   75.296080] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.296751] Hardware name: linux,dummy-virt (DT)
[   75.297169] Call trace:
[   75.297450]  dump_backtrace.part.0+0xdc/0xf0
[   75.297991]  show_stack+0x18/0x30
[   75.298440]  dump_stack_lvl+0x64/0x80
[   75.298867]  print_report+0x158/0x438
[   75.299283]  kasan_report+0xb4/0xf4
[   75.299681]  kasan_check_range+0xe4/0x190
[   75.300116]  __kasan_check_write+0x28/0x3c
[   75.300566]  kasan_bitops_test_and_modify.constprop.0+0x208/0x760
[   75.301162]  kasan_bitops_generic+0xb8/0x13c
[   75.301656]  kunit_try_run_case+0x84/0x120
[   75.302080]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.302626]  kthread+0x180/0x190
[   75.302999]  ret_from_fork+0x10/0x20
[   75.303405] 
[   75.303598] Allocated by task 165:
[   75.303937]  kasan_save_stack+0x3c/0x70
[   75.304354]  kasan_set_track+0x2c/0x40
[   75.304771]  kasan_save_alloc_info+0x24/0x34
[   75.305227]  __kasan_kmalloc+0xb8/0xc0
[   75.305643]  kmalloc_trace+0x58/0x6c
[   75.306044]  kasan_bitops_generic+0x90/0x13c
[   75.306505]  kunit_try_run_case+0x84/0x120
[   75.306948]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.307471]  kthread+0x180/0x190
[   75.307852]  ret_from_fork+0x10/0x20
[   75.308258] 
[   75.308468] The buggy address belongs to the object at ffff0000c5840b00
[   75.308468]  which belongs to the cache kmalloc-128 of size 128
[   75.309361] The buggy address is located 8 bytes inside of
[   75.309361]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.310228] 
[   75.310462] The buggy address belongs to the physical page:
[   75.310890] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.311658] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.312311] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.312963] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.313580] page dumped because: kasan: bad access detected
[   75.314034] 
[   75.314229] Memory state around the buggy address:
[   75.314675]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.315235]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.315862] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.316444]                       ^
[   75.316796]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.317412]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.317976] ==================================================================
[   75.140836] ==================================================================
[   75.141361] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf8/0x760
[   75.142266] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.142955] 
[   75.143185] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.143935] Hardware name: linux,dummy-virt (DT)
[   75.144344] Call trace:
[   75.144607]  dump_backtrace.part.0+0xdc/0xf0
[   75.145117]  show_stack+0x18/0x30
[   75.145588]  dump_stack_lvl+0x64/0x80
[   75.146797]  print_report+0x158/0x438
[   75.147219]  kasan_report+0xb4/0xf4
[   75.147644]  __asan_load8+0x80/0xac
[   75.148042]  kasan_bitops_test_and_modify.constprop.0+0xf8/0x760
[   75.148694]  kasan_bitops_generic+0xb8/0x13c
[   75.149170]  kunit_try_run_case+0x84/0x120
[   75.149634]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.150359]  kthread+0x180/0x190
[   75.150756]  ret_from_fork+0x10/0x20
[   75.151147] 
[   75.151317] Allocated by task 165:
[   75.151674]  kasan_save_stack+0x3c/0x70
[   75.152076]  kasan_set_track+0x2c/0x40
[   75.152609]  kasan_save_alloc_info+0x24/0x34
[   75.153090]  __kasan_kmalloc+0xb8/0xc0
[   75.153501]  kmalloc_trace+0x58/0x6c
[   75.154457]  kasan_bitops_generic+0x90/0x13c
[   75.154960]  kunit_try_run_case+0x84/0x120
[   75.155421]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.155948]  kthread+0x180/0x190
[   75.156327]  ret_from_fork+0x10/0x20
[   75.156732] 
[   75.156927] The buggy address belongs to the object at ffff0000c5840b00
[   75.156927]  which belongs to the cache kmalloc-128 of size 128
[   75.158154] The buggy address is located 8 bytes inside of
[   75.158154]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.159040] 
[   75.159245] The buggy address belongs to the physical page:
[   75.159688] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.160451] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.161116] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.162371] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.162973] page dumped because: kasan: bad access detected
[   75.163470] 
[   75.163663] Memory state around the buggy address:
[   75.164060]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.164657]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.165269] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.166156]                       ^
[   75.166517]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.167080]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.167696] ==================================================================
[   75.053567] ==================================================================
[   75.054173] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x760
[   75.055269] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.055839] 
[   75.056072] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.056749] Hardware name: linux,dummy-virt (DT)
[   75.057134] Call trace:
[   75.057388]  dump_backtrace.part.0+0xdc/0xf0
[   75.058469]  show_stack+0x18/0x30
[   75.058906]  dump_stack_lvl+0x64/0x80
[   75.059289]  print_report+0x158/0x438
[   75.059743]  kasan_report+0xb4/0xf4
[   75.060141]  kasan_check_range+0xe4/0x190
[   75.060605]  __kasan_check_write+0x28/0x3c
[   75.061063]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x760
[   75.061652]  kasan_bitops_generic+0xb8/0x13c
[   75.062146]  kunit_try_run_case+0x84/0x120
[   75.062591]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.063155]  kthread+0x180/0x190
[   75.063890]  ret_from_fork+0x10/0x20
[   75.064297] 
[   75.064512] Allocated by task 165:
[   75.064869]  kasan_save_stack+0x3c/0x70
[   75.065279]  kasan_set_track+0x2c/0x40
[   75.065685]  kasan_save_alloc_info+0x24/0x34
[   75.066416]  __kasan_kmalloc+0xb8/0xc0
[   75.066841]  kmalloc_trace+0x58/0x6c
[   75.067261]  kasan_bitops_generic+0x90/0x13c
[   75.067693]  kunit_try_run_case+0x84/0x120
[   75.068190]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.068815]  kthread+0x180/0x190
[   75.069176]  ret_from_fork+0x10/0x20
[   75.069605] 
[   75.069823] The buggy address belongs to the object at ffff0000c5840b00
[   75.069823]  which belongs to the cache kmalloc-128 of size 128
[   75.071154] The buggy address is located 8 bytes inside of
[   75.071154]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.072115] 
[   75.072335] The buggy address belongs to the physical page:
[   75.072805] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.073558] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.074901] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.075560] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.076218] page dumped because: kasan: bad access detected
[   75.076688] 
[   75.076859] Memory state around the buggy address:
[   75.077290]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.078305]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.078911] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.079348]                       ^
[   75.079998]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.081204]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.081666] ==================================================================
[   75.194690] ==================================================================
[   75.195264] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x15c/0x760
[   75.196085] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.196619] 
[   75.196847] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.197563] Hardware name: linux,dummy-virt (DT)
[   75.197961] Call trace:
[   75.198223]  dump_backtrace.part.0+0xdc/0xf0
[   75.198765]  show_stack+0x18/0x30
[   75.199174]  dump_stack_lvl+0x64/0x80
[   75.199608]  print_report+0x158/0x438
[   75.200037]  kasan_report+0xb4/0xf4
[   75.200468]  __asan_load8+0x80/0xac
[   75.200872]  kasan_bitops_test_and_modify.constprop.0+0x15c/0x760
[   75.201475]  kasan_bitops_generic+0xb8/0x13c
[   75.201953]  kunit_try_run_case+0x84/0x120
[   75.202415]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.202977]  kthread+0x180/0x190
[   75.203356]  ret_from_fork+0x10/0x20
[   75.203778] 
[   75.203958] Allocated by task 165:
[   75.204281]  kasan_save_stack+0x3c/0x70
[   75.204698]  kasan_set_track+0x2c/0x40
[   75.205100]  kasan_save_alloc_info+0x24/0x34
[   75.205587]  __kasan_kmalloc+0xb8/0xc0
[   75.205991]  kmalloc_trace+0x58/0x6c
[   75.206422]  kasan_bitops_generic+0x90/0x13c
[   75.207035]  kunit_try_run_case+0x84/0x120
[   75.207482]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.208050]  kthread+0x180/0x190
[   75.208447]  ret_from_fork+0x10/0x20
[   75.208871] 
[   75.209096] The buggy address belongs to the object at ffff0000c5840b00
[   75.209096]  which belongs to the cache kmalloc-128 of size 128
[   75.210009] The buggy address is located 8 bytes inside of
[   75.210009]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.210900] 
[   75.211084] The buggy address belongs to the physical page:
[   75.211566] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.212304] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.212958] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.213621] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.214224] page dumped because: kasan: bad access detected
[   75.214695] 
[   75.214890] Memory state around the buggy address:
[   75.215305]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.215920]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.216514] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.217114]                       ^
[   75.217463]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.218078]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.218646] ==================================================================
[   75.269352] ==================================================================
[   75.269881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760
[   75.270698] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.271240] 
[   75.271494] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.272209] Hardware name: linux,dummy-virt (DT)
[   75.272644] Call trace:
[   75.272900]  dump_backtrace.part.0+0xdc/0xf0
[   75.273410]  show_stack+0x18/0x30
[   75.273830]  dump_stack_lvl+0x64/0x80
[   75.274240]  print_report+0x158/0x438
[   75.274653]  kasan_report+0xb4/0xf4
[   75.275044]  __asan_load8+0x80/0xac
[   75.275445]  kasan_bitops_test_and_modify.constprop.0+0x1dc/0x760
[   75.276029]  kasan_bitops_generic+0xb8/0x13c
[   75.276489]  kunit_try_run_case+0x84/0x120
[   75.276958]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.277480]  kthread+0x180/0x190
[   75.277845]  ret_from_fork+0x10/0x20
[   75.278243] 
[   75.278433] Allocated by task 165:
[   75.278768]  kasan_save_stack+0x3c/0x70
[   75.279192]  kasan_set_track+0x2c/0x40
[   75.279616]  kasan_save_alloc_info+0x24/0x34
[   75.280069]  __kasan_kmalloc+0xb8/0xc0
[   75.280465]  kmalloc_trace+0x58/0x6c
[   75.280878]  kasan_bitops_generic+0x90/0x13c
[   75.281357]  kunit_try_run_case+0x84/0x120
[   75.281819]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.282329]  kthread+0x180/0x190
[   75.282719]  ret_from_fork+0x10/0x20
[   75.283125] 
[   75.283301] The buggy address belongs to the object at ffff0000c5840b00
[   75.283301]  which belongs to the cache kmalloc-128 of size 128
[   75.284233] The buggy address is located 8 bytes inside of
[   75.284233]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.285090] 
[   75.285293] The buggy address belongs to the physical page:
[   75.285744] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.286486] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.287132] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.287782] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.288374] page dumped because: kasan: bad access detected
[   75.288820] 
[   75.289013] Memory state around the buggy address:
[   75.289454]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.290043]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.290626] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.291180]                       ^
[   75.291512]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.292116]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.292681] ==================================================================
[   75.082331] ==================================================================
[   75.082925] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xc4/0x760
[   75.083614] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.086014] 
[   75.086293] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.086860] Hardware name: linux,dummy-virt (DT)
[   75.087182] Call trace:
[   75.087410]  dump_backtrace.part.0+0xdc/0xf0
[   75.088017]  show_stack+0x18/0x30
[   75.088577]  dump_stack_lvl+0x64/0x80
[   75.089046]  print_report+0x158/0x438
[   75.089706]  kasan_report+0xb4/0xf4
[   75.090280]  __asan_load8+0x80/0xac
[   75.090830]  kasan_bitops_test_and_modify.constprop.0+0xc4/0x760
[   75.091565]  kasan_bitops_generic+0xb8/0x13c
[   75.092137]  kunit_try_run_case+0x84/0x120
[   75.092597]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.093140]  kthread+0x180/0x190
[   75.093545]  ret_from_fork+0x10/0x20
[   75.094204] 
[   75.094442] Allocated by task 165:
[   75.094898]  kasan_save_stack+0x3c/0x70
[   75.095340]  kasan_set_track+0x2c/0x40
[   75.095796]  kasan_save_alloc_info+0x24/0x34
[   75.096292]  __kasan_kmalloc+0xb8/0xc0
[   75.096729]  kmalloc_trace+0x58/0x6c
[   75.097166]  kasan_bitops_generic+0x90/0x13c
[   75.097629]  kunit_try_run_case+0x84/0x120
[   75.098637]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.099185]  kthread+0x180/0x190
[   75.099613]  ret_from_fork+0x10/0x20
[   75.100024] 
[   75.100246] The buggy address belongs to the object at ffff0000c5840b00
[   75.100246]  which belongs to the cache kmalloc-128 of size 128
[   75.101245] The buggy address is located 8 bytes inside of
[   75.101245]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.102465] 
[   75.102714] The buggy address belongs to the physical page:
[   75.103203] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.104032] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.104725] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.105237] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.106429] page dumped because: kasan: bad access detected
[   75.106935] 
[   75.107148] Memory state around the buggy address:
[   75.107609]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.108218]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.108861] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.109474]                       ^
[   75.110208]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.110851]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.111458] ==================================================================
[   75.112420] ==================================================================
[   75.112956] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xf0/0x760
[   75.113705] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.114857] 
[   75.115052] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.115791] Hardware name: linux,dummy-virt (DT)
[   75.116187] Call trace:
[   75.116441]  dump_backtrace.part.0+0xdc/0xf0
[   75.116963]  show_stack+0x18/0x30
[   75.117348]  dump_stack_lvl+0x64/0x80
[   75.117827]  print_report+0x158/0x438
[   75.118256]  kasan_report+0xb4/0xf4
[   75.119030]  kasan_check_range+0xe4/0x190
[   75.119490]  __kasan_check_write+0x28/0x3c
[   75.119960]  kasan_bitops_test_and_modify.constprop.0+0xf0/0x760
[   75.120550]  kasan_bitops_generic+0xb8/0x13c
[   75.121006]  kunit_try_run_case+0x84/0x120
[   75.121472]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.122650]  kthread+0x180/0x190
[   75.123052]  ret_from_fork+0x10/0x20
[   75.123494] 
[   75.123685] Allocated by task 165:
[   75.124043]  kasan_save_stack+0x3c/0x70
[   75.124478]  kasan_set_track+0x2c/0x40
[   75.124882]  kasan_save_alloc_info+0x24/0x34
[   75.125326]  __kasan_kmalloc+0xb8/0xc0
[   75.125932]  kmalloc_trace+0x58/0x6c
[   75.126335]  kasan_bitops_generic+0x90/0x13c
[   75.126828]  kunit_try_run_case+0x84/0x120
[   75.127282]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.127857]  kthread+0x180/0x190
[   75.128422]  ret_from_fork+0x10/0x20
[   75.128842] 
[   75.129021] The buggy address belongs to the object at ffff0000c5840b00
[   75.129021]  which belongs to the cache kmalloc-128 of size 128
[   75.130494] The buggy address is located 8 bytes inside of
[   75.130494]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.131372] 
[   75.131575] The buggy address belongs to the physical page:
[   75.131992] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.132788] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.133430] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.134344] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.134995] page dumped because: kasan: bad access detected
[   75.135472] 
[   75.135675] Memory state around the buggy address:
[   75.136083]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.136705]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.137294] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.138473]                       ^
[   75.138842]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.139405]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.140004] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[   74.882452] ==================================================================
[   74.882994] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x148/0x684
[   74.884043] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.884604] 
[   74.884859] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.885620] Hardware name: linux,dummy-virt (DT)
[   74.886246] Call trace:
[   74.886630]  dump_backtrace.part.0+0xdc/0xf0
[   74.887519]  show_stack+0x18/0x30
[   74.887945]  dump_stack_lvl+0x64/0x80
[   74.888355]  print_report+0x158/0x438
[   74.888823]  kasan_report+0xb4/0xf4
[   74.889197]  kasan_check_range+0xe4/0x190
[   74.889674]  __kasan_check_write+0x28/0x3c
[   74.890161]  kasan_bitops_modify.constprop.0+0x148/0x684
[   74.891351]  kasan_bitops_generic+0xac/0x13c
[   74.891863]  kunit_try_run_case+0x84/0x120
[   74.892364]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.892952]  kthread+0x180/0x190
[   74.893339]  ret_from_fork+0x10/0x20
[   74.893737] 
[   74.893978] Allocated by task 165:
[   74.894656]  kasan_save_stack+0x3c/0x70
[   74.895099]  kasan_set_track+0x2c/0x40
[   74.895510]  kasan_save_alloc_info+0x24/0x34
[   74.896033]  __kasan_kmalloc+0xb8/0xc0
[   74.896423]  kmalloc_trace+0x58/0x6c
[   74.896868]  kasan_bitops_generic+0x90/0x13c
[   74.897359]  kunit_try_run_case+0x84/0x120
[   74.897992]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.898572]  kthread+0x180/0x190
[   74.899403]  ret_from_fork+0x10/0x20
[   74.899842] 
[   74.900044] The buggy address belongs to the object at ffff0000c5840b00
[   74.900044]  which belongs to the cache kmalloc-128 of size 128
[   74.901000] The buggy address is located 8 bytes inside of
[   74.901000]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.902152] 
[   74.902368] The buggy address belongs to the physical page:
[   74.902953] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.903738] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.904423] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.905105] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.905733] page dumped because: kasan: bad access detected
[   74.906762] 
[   74.906976] Memory state around the buggy address:
[   74.907421]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.908060]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.908660] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.909256]                       ^
[   74.909641]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.910272]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.911169] ==================================================================
[   74.851621] ==================================================================
[   74.852081] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x684
[   74.852873] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.853500] 
[   74.853692] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.854739] Hardware name: linux,dummy-virt (DT)
[   74.855326] Call trace:
[   74.855727]  dump_backtrace.part.0+0xdc/0xf0
[   74.856417]  show_stack+0x18/0x30
[   74.857032]  dump_stack_lvl+0x64/0x80
[   74.857447]  print_report+0x158/0x438
[   74.857900]  kasan_report+0xb4/0xf4
[   74.858365]  __asan_load8+0x80/0xac
[   74.858852]  kasan_bitops_modify.constprop.0+0x11c/0x684
[   74.859454]  kasan_bitops_generic+0xac/0x13c
[   74.860048]  kunit_try_run_case+0x84/0x120
[   74.860606]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.861299]  kthread+0x180/0x190
[   74.861947]  ret_from_fork+0x10/0x20
[   74.862623] 
[   74.862919] Allocated by task 165:
[   74.863405]  kasan_save_stack+0x3c/0x70
[   74.863879]  kasan_set_track+0x2c/0x40
[   74.864212]  kasan_save_alloc_info+0x24/0x34
[   74.864882]  __kasan_kmalloc+0xb8/0xc0
[   74.865466]  kmalloc_trace+0x58/0x6c
[   74.866228]  kasan_bitops_generic+0x90/0x13c
[   74.867332]  kunit_try_run_case+0x84/0x120
[   74.867983]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.868773]  kthread+0x180/0x190
[   74.869287]  ret_from_fork+0x10/0x20
[   74.869725] 
[   74.870057] The buggy address belongs to the object at ffff0000c5840b00
[   74.870057]  which belongs to the cache kmalloc-128 of size 128
[   74.871074] The buggy address is located 8 bytes inside of
[   74.871074]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.872017] 
[   74.872255] The buggy address belongs to the physical page:
[   74.872738] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.873527] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.874352] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.874991] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.875592] page dumped because: kasan: bad access detected
[   74.876055] 
[   74.876265] Memory state around the buggy address:
[   74.877159]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.877808]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.878737] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.879293]                       ^
[   74.879685]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.880353]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.880967] ==================================================================
[   74.912145] ==================================================================
[   74.912935] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x178/0x684
[   74.913903] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.915053] 
[   74.915287] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.916010] Hardware name: linux,dummy-virt (DT)
[   74.916445] Call trace:
[   74.916756]  dump_backtrace.part.0+0xdc/0xf0
[   74.917311]  show_stack+0x18/0x30
[   74.917764]  dump_stack_lvl+0x64/0x80
[   74.918211]  print_report+0x158/0x438
[   74.918955]  kasan_report+0xb4/0xf4
[   74.919366]  kasan_check_range+0xe4/0x190
[   74.919842]  __kasan_check_write+0x28/0x3c
[   74.920330]  kasan_bitops_modify.constprop.0+0x178/0x684
[   74.920912]  kasan_bitops_generic+0xac/0x13c
[   74.921434]  kunit_try_run_case+0x84/0x120
[   74.922139]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.922708]  kthread+0x180/0x190
[   74.923579]  ret_from_fork+0x10/0x20
[   74.924015] 
[   74.924236] Allocated by task 165:
[   74.924555]  kasan_save_stack+0x3c/0x70
[   74.924992]  kasan_set_track+0x2c/0x40
[   74.925417]  kasan_save_alloc_info+0x24/0x34
[   74.926059]  __kasan_kmalloc+0xb8/0xc0
[   74.926762]  kmalloc_trace+0x58/0x6c
[   74.927224]  kasan_bitops_generic+0x90/0x13c
[   74.927739]  kunit_try_run_case+0x84/0x120
[   74.928259]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.928812]  kthread+0x180/0x190
[   74.929200]  ret_from_fork+0x10/0x20
[   74.929595] 
[   74.930361] The buggy address belongs to the object at ffff0000c5840b00
[   74.930361]  which belongs to the cache kmalloc-128 of size 128
[   74.931317] The buggy address is located 8 bytes inside of
[   74.931317]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.932219] 
[   74.932425] The buggy address belongs to the physical page:
[   74.932907] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.933672] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.934350] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.935026] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.935653] page dumped because: kasan: bad access detected
[   74.936123] 
[   74.936299] Memory state around the buggy address:
[   74.936758]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.937347]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.938661] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.939239]                       ^
[   74.939621]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.940197]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.940802] ==================================================================
[   74.746964] ==================================================================
[   74.747776] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x684
[   74.748602] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.749187] 
[   74.749415] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.750191] Hardware name: linux,dummy-virt (DT)
[   74.750648] Call trace:
[   74.751089]  dump_backtrace.part.0+0xdc/0xf0
[   74.751579]  show_stack+0x18/0x30
[   74.752140]  dump_stack_lvl+0x64/0x80
[   74.752508]  print_report+0x158/0x438
[   74.752884]  kasan_report+0xb4/0xf4
[   74.753209]  kasan_check_range+0xe4/0x190
[   74.753587]  __kasan_check_write+0x28/0x3c
[   74.753964]  kasan_bitops_modify.constprop.0+0x9c/0x684
[   74.754748]  kasan_bitops_generic+0xac/0x13c
[   74.755699]  kunit_try_run_case+0x84/0x120
[   74.756596]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.757565]  kthread+0x180/0x190
[   74.758339]  ret_from_fork+0x10/0x20
[   74.759094] 
[   74.759497] Allocated by task 165:
[   74.760137]  kasan_save_stack+0x3c/0x70
[   74.760963]  kasan_set_track+0x2c/0x40
[   74.761610]  kasan_save_alloc_info+0x24/0x34
[   74.762573]  __kasan_kmalloc+0xb8/0xc0
[   74.763484]  kmalloc_trace+0x58/0x6c
[   74.764151]  kasan_bitops_generic+0x90/0x13c
[   74.764990]  kunit_try_run_case+0x84/0x120
[   74.765864]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.766861]  kthread+0x180/0x190
[   74.767582]  ret_from_fork+0x10/0x20
[   74.768378] 
[   74.768711] The buggy address belongs to the object at ffff0000c5840b00
[   74.768711]  which belongs to the cache kmalloc-128 of size 128
[   74.770521] The buggy address is located 8 bytes inside of
[   74.770521]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.772341] 
[   74.772789] The buggy address belongs to the physical page:
[   74.773663] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.775218] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.776316] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.777501] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.778765] page dumped because: kasan: bad access detected
[   74.779718] 
[   74.780123] Memory state around the buggy address:
[   74.780794]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.781286]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.781925] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.782478]                       ^
[   74.782829]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.783430]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.784015] ==================================================================
[   74.784867] ==================================================================
[   74.785383] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xc4/0x684
[   74.786355] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.786968] 
[   74.787186] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.787890] Hardware name: linux,dummy-virt (DT)
[   74.788308] Call trace:
[   74.788968]  dump_backtrace.part.0+0xdc/0xf0
[   74.789500]  show_stack+0x18/0x30
[   74.790199]  dump_stack_lvl+0x64/0x80
[   74.790654]  print_report+0x158/0x438
[   74.791068]  kasan_report+0xb4/0xf4
[   74.791460]  __asan_load8+0x80/0xac
[   74.791872]  kasan_bitops_modify.constprop.0+0xc4/0x684
[   74.792459]  kasan_bitops_generic+0xac/0x13c
[   74.792910]  kunit_try_run_case+0x84/0x120
[   74.793356]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.794408]  kthread+0x180/0x190
[   74.794784]  ret_from_fork+0x10/0x20
[   74.795243] 
[   74.795460] Allocated by task 165:
[   74.795799]  kasan_save_stack+0x3c/0x70
[   74.796225]  kasan_set_track+0x2c/0x40
[   74.796662]  kasan_save_alloc_info+0x24/0x34
[   74.797128]  __kasan_kmalloc+0xb8/0xc0
[   74.797550]  kmalloc_trace+0x58/0x6c
[   74.798219]  kasan_bitops_generic+0x90/0x13c
[   74.798755]  kunit_try_run_case+0x84/0x120
[   74.799212]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.799777]  kthread+0x180/0x190
[   74.800129]  ret_from_fork+0x10/0x20
[   74.800560] 
[   74.800761] The buggy address belongs to the object at ffff0000c5840b00
[   74.800761]  which belongs to the cache kmalloc-128 of size 128
[   74.801682] The buggy address is located 8 bytes inside of
[   74.801682]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.803111] 
[   74.803290] The buggy address belongs to the physical page:
[   74.803761] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.804516] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.805149] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.806119] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.806723] page dumped because: kasan: bad access detected
[   74.807182] 
[   74.807363] Memory state around the buggy address:
[   74.807831]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.808421]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.809021] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.809587]                       ^
[   74.810480]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.811017]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.811476] ==================================================================
[   74.968739] ==================================================================
[   74.969352] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x190/0x684
[   74.970715] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.971332] 
[   74.971552] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.972280] Hardware name: linux,dummy-virt (DT)
[   74.972695] Call trace:
[   74.972963]  dump_backtrace.part.0+0xdc/0xf0
[   74.973480]  show_stack+0x18/0x30
[   74.974185]  dump_stack_lvl+0x64/0x80
[   74.974635]  print_report+0x158/0x438
[   74.975079]  kasan_report+0xb4/0xf4
[   74.975463]  kasan_check_range+0xe4/0x190
[   74.975922]  __kasan_check_write+0x28/0x3c
[   74.976370]  kasan_bitops_modify.constprop.0+0x190/0x684
[   74.976925]  kasan_bitops_generic+0xac/0x13c
[   74.977360]  kunit_try_run_case+0x84/0x120
[   74.978305]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.978866]  kthread+0x180/0x190
[   74.979241]  ret_from_fork+0x10/0x20
[   74.979695] 
[   74.979874] Allocated by task 165:
[   74.980245]  kasan_save_stack+0x3c/0x70
[   74.980664]  kasan_set_track+0x2c/0x40
[   74.981077]  kasan_save_alloc_info+0x24/0x34
[   74.981562]  __kasan_kmalloc+0xb8/0xc0
[   74.982030]  kmalloc_trace+0x58/0x6c
[   74.982466]  kasan_bitops_generic+0x90/0x13c
[   74.982914]  kunit_try_run_case+0x84/0x120
[   74.983376]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.983898]  kthread+0x180/0x190
[   74.984273]  ret_from_fork+0x10/0x20
[   74.985324] 
[   74.985537] The buggy address belongs to the object at ffff0000c5840b00
[   74.985537]  which belongs to the cache kmalloc-128 of size 128
[   74.986903] The buggy address is located 8 bytes inside of
[   74.986903]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.987786] 
[   74.987977] The buggy address belongs to the physical page:
[   74.988442] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.989166] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.989824] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.990649] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.991248] page dumped because: kasan: bad access detected
[   74.991729] 
[   74.991905] Memory state around the buggy address:
[   74.992499]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.993086]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.993676] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.994842]                       ^
[   74.995191]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.995830]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.996386] ==================================================================
[   75.026704] ==================================================================
[   75.027281] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e8/0x684
[   75.028038] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   75.028582] 
[   75.028824] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.029515] Hardware name: linux,dummy-virt (DT)
[   75.030231] Call trace:
[   75.030484]  dump_backtrace.part.0+0xdc/0xf0
[   75.030995]  show_stack+0x18/0x30
[   75.031454]  dump_stack_lvl+0x64/0x80
[   75.031876]  print_report+0x158/0x438
[   75.032277]  kasan_report+0xb4/0xf4
[   75.032676]  __asan_load8+0x80/0xac
[   75.033087]  kasan_bitops_modify.constprop.0+0x1e8/0x684
[   75.033668]  kasan_bitops_generic+0xac/0x13c
[   75.034165]  kunit_try_run_case+0x84/0x120
[   75.035116]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.035680]  kthread+0x180/0x190
[   75.036057]  ret_from_fork+0x10/0x20
[   75.036492] 
[   75.036682] Allocated by task 165:
[   75.037010]  kasan_save_stack+0x3c/0x70
[   75.037420]  kasan_set_track+0x2c/0x40
[   75.038090]  kasan_save_alloc_info+0x24/0x34
[   75.038553]  __kasan_kmalloc+0xb8/0xc0
[   75.038966]  kmalloc_trace+0x58/0x6c
[   75.039345]  kasan_bitops_generic+0x90/0x13c
[   75.039849]  kunit_try_run_case+0x84/0x120
[   75.040305]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.040903]  kthread+0x180/0x190
[   75.041290]  ret_from_fork+0x10/0x20
[   75.041711] 
[   75.042414] The buggy address belongs to the object at ffff0000c5840b00
[   75.042414]  which belongs to the cache kmalloc-128 of size 128
[   75.043300] The buggy address is located 8 bytes inside of
[   75.043300]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.044179] 
[   75.044364] The buggy address belongs to the physical page:
[   75.044820] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.045583] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.046505] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.047160] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.047788] page dumped because: kasan: bad access detected
[   75.048242] 
[   75.048437] Memory state around the buggy address:
[   75.048858]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.049455]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.050280] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.050840]                       ^
[   75.051172]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.051785]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.052349] ==================================================================
[   74.812696] ==================================================================
[   74.813156] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xf0/0x684
[   74.813897] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.815447] 
[   74.815665] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.816211] Hardware name: linux,dummy-virt (DT)
[   74.816544] Call trace:
[   74.816771]  dump_backtrace.part.0+0xdc/0xf0
[   74.817212]  show_stack+0x18/0x30
[   74.818888]  dump_stack_lvl+0x64/0x80
[   74.819446]  print_report+0x158/0x438
[   74.819887]  kasan_report+0xb4/0xf4
[   74.820267]  kasan_check_range+0xe4/0x190
[   74.820992]  __kasan_check_write+0x28/0x3c
[   74.821598]  kasan_bitops_modify.constprop.0+0xf0/0x684
[   74.822864]  kasan_bitops_generic+0xac/0x13c
[   74.823617]  kunit_try_run_case+0x84/0x120
[   74.824024]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.824584]  kthread+0x180/0x190
[   74.825382]  ret_from_fork+0x10/0x20
[   74.826683] 
[   74.827197] Allocated by task 165:
[   74.828073]  kasan_save_stack+0x3c/0x70
[   74.828932]  kasan_set_track+0x2c/0x40
[   74.829530]  kasan_save_alloc_info+0x24/0x34
[   74.830367]  __kasan_kmalloc+0xb8/0xc0
[   74.830962]  kmalloc_trace+0x58/0x6c
[   74.831804]  kasan_bitops_generic+0x90/0x13c
[   74.832564]  kunit_try_run_case+0x84/0x120
[   74.832971]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.833475]  kthread+0x180/0x190
[   74.834031]  ret_from_fork+0x10/0x20
[   74.834683] 
[   74.835111] The buggy address belongs to the object at ffff0000c5840b00
[   74.835111]  which belongs to the cache kmalloc-128 of size 128
[   74.836811] The buggy address is located 8 bytes inside of
[   74.836811]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.838206] 
[   74.838489] The buggy address belongs to the physical page:
[   74.839258] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.840322] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.840867] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.841373] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.842586] page dumped because: kasan: bad access detected
[   74.843616] 
[   74.843883] Memory state around the buggy address:
[   74.844749]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.845633]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.846815] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.847677]                       ^
[   74.848190]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.849060]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.850487] ==================================================================
[   74.941566] ==================================================================
[   74.942154] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x180/0x684
[   74.942957] Read of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.943555] 
[   74.943774] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.944758] Hardware name: linux,dummy-virt (DT)
[   74.945145] Call trace:
[   74.945420]  dump_backtrace.part.0+0xdc/0xf0
[   74.946390]  show_stack+0x18/0x30
[   74.946852]  dump_stack_lvl+0x64/0x80
[   74.947270]  print_report+0x158/0x438
[   74.947716]  kasan_report+0xb4/0xf4
[   74.948111]  __asan_load8+0x80/0xac
[   74.948523]  kasan_bitops_modify.constprop.0+0x180/0x684
[   74.949069]  kasan_bitops_generic+0xac/0x13c
[   74.949532]  kunit_try_run_case+0x84/0x120
[   74.950064]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.950606]  kthread+0x180/0x190
[   74.950987]  ret_from_fork+0x10/0x20
[   74.951405] 
[   74.951590] Allocated by task 165:
[   74.951912]  kasan_save_stack+0x3c/0x70
[   74.952338]  kasan_set_track+0x2c/0x40
[   74.953028]  kasan_save_alloc_info+0x24/0x34
[   74.953468]  __kasan_kmalloc+0xb8/0xc0
[   74.954390]  kmalloc_trace+0x58/0x6c
[   74.954819]  kasan_bitops_generic+0x90/0x13c
[   74.955292]  kunit_try_run_case+0x84/0x120
[   74.955760]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.956268]  kthread+0x180/0x190
[   74.956650]  ret_from_fork+0x10/0x20
[   74.957062] 
[   74.957244] The buggy address belongs to the object at ffff0000c5840b00
[   74.957244]  which belongs to the cache kmalloc-128 of size 128
[   74.958536] The buggy address is located 8 bytes inside of
[   74.958536]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   74.959346] 
[   74.959565] The buggy address belongs to the physical page:
[   74.960001] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.960783] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.961439] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.962566] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.963173] page dumped because: kasan: bad access detected
[   74.963642] 
[   74.963847] Memory state around the buggy address:
[   74.964257]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.964848]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.965444] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.966181]                       ^
[   74.966548]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.967171]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.967747] ==================================================================
[   74.997195] ==================================================================
[   74.997743] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1bc/0x684
[   74.998875] Write of size 8 at addr ffff0000c5840b08 by task kunit_try_catch/165
[   74.999509] 
[   74.999722] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.000403] Hardware name: linux,dummy-virt (DT)
[   75.000817] Call trace:
[   75.001110]  dump_backtrace.part.0+0xdc/0xf0
[   75.001615]  show_stack+0x18/0x30
[   75.002627]  dump_stack_lvl+0x64/0x80
[   75.003036]  print_report+0x158/0x438
[   75.003456]  kasan_report+0xb4/0xf4
[   75.003857]  kasan_check_range+0xe4/0x190
[   75.004305]  __kasan_check_write+0x28/0x3c
[   75.004756]  kasan_bitops_modify.constprop.0+0x1bc/0x684
[   75.005331]  kasan_bitops_generic+0xac/0x13c
[   75.006108]  kunit_try_run_case+0x84/0x120
[   75.006575]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.007094]  kthread+0x180/0x190
[   75.007478]  ret_from_fork+0x10/0x20
[   75.007892] 
[   75.008070] Allocated by task 165:
[   75.008405]  kasan_save_stack+0x3c/0x70
[   75.008863]  kasan_set_track+0x2c/0x40
[   75.009268]  kasan_save_alloc_info+0x24/0x34
[   75.009732]  __kasan_kmalloc+0xb8/0xc0
[   75.010133]  kmalloc_trace+0x58/0x6c
[   75.011067]  kasan_bitops_generic+0x90/0x13c
[   75.011600]  kunit_try_run_case+0x84/0x120
[   75.012058]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   75.012594]  kthread+0x180/0x190
[   75.012965]  ret_from_fork+0x10/0x20
[   75.013369] 
[   75.013564] The buggy address belongs to the object at ffff0000c5840b00
[   75.013564]  which belongs to the cache kmalloc-128 of size 128
[   75.014941] The buggy address is located 8 bytes inside of
[   75.014941]  128-byte region [ffff0000c5840b00, ffff0000c5840b80)
[   75.015813] 
[   75.016017] The buggy address belongs to the physical page:
[   75.016495] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   75.017246] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.018066] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.018731] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.019344] page dumped because: kasan: bad access detected
[   75.019806] 
[   75.019983] Memory state around the buggy address:
[   75.020859]  ffff0000c5840a00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.021444]  ffff0000c5840a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.022366] >ffff0000c5840b00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.022934]                       ^
[   75.023281]  ffff0000c5840b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.023889]  ffff0000c5840c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.024487] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strnlen
[   74.711153] ==================================================================
[   74.711700] BUG: KASAN: use-after-free in strnlen+0x3c/0x6c
[   74.712304] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.712943] 
[   74.713178] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.713813] Hardware name: linux,dummy-virt (DT)
[   74.714966] Call trace:
[   74.715219]  dump_backtrace.part.0+0xdc/0xf0
[   74.715744]  show_stack+0x18/0x30
[   74.716136]  dump_stack_lvl+0x64/0x80
[   74.716587]  print_report+0x158/0x438
[   74.716999]  kasan_report+0xb4/0xf4
[   74.717402]  __asan_load1+0x68/0x74
[   74.717989]  strnlen+0x3c/0x6c
[   74.718390]  kasan_strings+0x18c/0x520
[   74.718834]  kunit_try_run_case+0x84/0x120
[   74.719303]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.719840]  kthread+0x180/0x190
[   74.720217]  ret_from_fork+0x10/0x20
[   74.720646] 
[   74.720821] Allocated by task 164:
[   74.721161]  kasan_save_stack+0x3c/0x70
[   74.721615]  kasan_set_track+0x2c/0x40
[   74.722166]  kasan_save_alloc_info+0x24/0x34
[   74.722651]  __kasan_kmalloc+0xb8/0xc0
[   74.723047]  kmalloc_trace+0x58/0x6c
[   74.723465]  kasan_strings+0x98/0x520
[   74.723900]  kunit_try_run_case+0x84/0x120
[   74.724352]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.724952]  kthread+0x180/0x190
[   74.725321]  ret_from_fork+0x10/0x20
[   74.725733] 
[   74.726180] Freed by task 164:
[   74.726505]  kasan_save_stack+0x3c/0x70
[   74.726924]  kasan_set_track+0x2c/0x40
[   74.727287]  kasan_save_free_info+0x38/0x5c
[   74.727801]  __kasan_slab_free+0xe4/0x150
[   74.728210]  __kmem_cache_free+0x130/0x2a4
[   74.728700]  kfree+0x58/0x80
[   74.729057]  kasan_strings+0xb8/0x520
[   74.729477]  kunit_try_run_case+0x84/0x120
[   74.730072]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.730664]  kthread+0x180/0x190
[   74.731041]  ret_from_fork+0x10/0x20
[   74.731432] 
[   74.731640] The buggy address belongs to the object at ffff0000c5938700
[   74.731640]  which belongs to the cache kmalloc-128 of size 128
[   74.732616] The buggy address is located 16 bytes inside of
[   74.732616]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.733484] 
[   74.733684] The buggy address belongs to the physical page:
[   74.734956] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.735716] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.736422] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.737070] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.737695] page dumped because: kasan: bad access detected
[   74.738315] 
[   74.738509] Memory state around the buggy address:
[   74.738932]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.739570]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.740187] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.740748]                          ^
[   74.741081]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.741692]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.742420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strlen
[   74.674820] ==================================================================
[   74.675701] BUG: KASAN: use-after-free in strlen+0x18/0x64
[   74.676477] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.677320] 
[   74.677602] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.679059] Hardware name: linux,dummy-virt (DT)
[   74.679659] Call trace:
[   74.680020]  dump_backtrace.part.0+0xdc/0xf0
[   74.680702]  show_stack+0x18/0x30
[   74.681248]  dump_stack_lvl+0x64/0x80
[   74.681947]  print_report+0x158/0x438
[   74.682581]  kasan_report+0xb4/0xf4
[   74.683111]  __asan_load1+0x68/0x74
[   74.683662]  strlen+0x18/0x64
[   74.684159]  kasan_strings+0x168/0x520
[   74.684739]  kunit_try_run_case+0x84/0x120
[   74.685346]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.686147]  kthread+0x180/0x190
[   74.686831]  ret_from_fork+0x10/0x20
[   74.687376] 
[   74.687651] Allocated by task 164:
[   74.688102]  kasan_save_stack+0x3c/0x70
[   74.688485]  kasan_set_track+0x2c/0x40
[   74.688820]  kasan_save_alloc_info+0x24/0x34
[   74.689198]  __kasan_kmalloc+0xb8/0xc0
[   74.689565]  kmalloc_trace+0x58/0x6c
[   74.690087]  kasan_strings+0x98/0x520
[   74.690720]  kunit_try_run_case+0x84/0x120
[   74.691243]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.691813]  kthread+0x180/0x190
[   74.692213]  ret_from_fork+0x10/0x20
[   74.692645] 
[   74.692848] Freed by task 164:
[   74.693142]  kasan_save_stack+0x3c/0x70
[   74.693555]  kasan_set_track+0x2c/0x40
[   74.694739]  kasan_save_free_info+0x38/0x5c
[   74.695562]  __kasan_slab_free+0xe4/0x150
[   74.696205]  __kmem_cache_free+0x130/0x2a4
[   74.696695]  kfree+0x58/0x80
[   74.697086]  kasan_strings+0xb8/0x520
[   74.697565]  kunit_try_run_case+0x84/0x120
[   74.698175]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.698806]  kthread+0x180/0x190
[   74.699222]  ret_from_fork+0x10/0x20
[   74.699669] 
[   74.699867] The buggy address belongs to the object at ffff0000c5938700
[   74.699867]  which belongs to the cache kmalloc-128 of size 128
[   74.700807] The buggy address is located 16 bytes inside of
[   74.700807]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.701634] 
[   74.701879] The buggy address belongs to the physical page:
[   74.702410] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.703323] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.703992] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.704689] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.705246] page dumped because: kasan: bad access detected
[   74.705703] 
[   74.706079] Memory state around the buggy address:
[   74.706527]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.707162]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.707863] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.708446]                          ^
[   74.708800]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.709368]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.710196] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strncmp
[   74.638244] ==================================================================
[   74.639101] BUG: KASAN: use-after-free in strncmp+0x3c/0x90
[   74.639897] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.640749] 
[   74.641018] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.642161] Hardware name: linux,dummy-virt (DT)
[   74.643262] Call trace:
[   74.643645]  dump_backtrace.part.0+0xdc/0xf0
[   74.644315]  show_stack+0x18/0x30
[   74.644867]  dump_stack_lvl+0x64/0x80
[   74.645431]  print_report+0x158/0x438
[   74.646043]  kasan_report+0xb4/0xf4
[   74.646593]  __asan_load1+0x68/0x74
[   74.647194]  strncmp+0x3c/0x90
[   74.647730]  kasan_strings+0x148/0x520
[   74.648316]  kunit_try_run_case+0x84/0x120
[   74.648937]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.649535]  kthread+0x180/0x190
[   74.650032]  ret_from_fork+0x10/0x20
[   74.650408] 
[   74.650575] Allocated by task 164:
[   74.650843]  kasan_save_stack+0x3c/0x70
[   74.651185]  kasan_set_track+0x2c/0x40
[   74.651528]  kasan_save_alloc_info+0x24/0x34
[   74.652052]  __kasan_kmalloc+0xb8/0xc0
[   74.652526]  kmalloc_trace+0x58/0x6c
[   74.652932]  kasan_strings+0x98/0x520
[   74.653382]  kunit_try_run_case+0x84/0x120
[   74.653835]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.654565]  kthread+0x180/0x190
[   74.654932]  ret_from_fork+0x10/0x20
[   74.655330] 
[   74.655543] Freed by task 164:
[   74.655840]  kasan_save_stack+0x3c/0x70
[   74.656266]  kasan_set_track+0x2c/0x40
[   74.656688]  kasan_save_free_info+0x38/0x5c
[   74.657131]  __kasan_slab_free+0xe4/0x150
[   74.657560]  __kmem_cache_free+0x130/0x2a4
[   74.658153]  kfree+0x58/0x80
[   74.658562]  kasan_strings+0xb8/0x520
[   74.658924]  kunit_try_run_case+0x84/0x120
[   74.659299]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.660073]  kthread+0x180/0x190
[   74.660573]  ret_from_fork+0x10/0x20
[   74.661108] 
[   74.661362] The buggy address belongs to the object at ffff0000c5938700
[   74.661362]  which belongs to the cache kmalloc-128 of size 128
[   74.662863] The buggy address is located 16 bytes inside of
[   74.662863]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.664843] 
[   74.665117] The buggy address belongs to the physical page:
[   74.665790] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.666694] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.667220] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.667990] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.668509] page dumped because: kasan: bad access detected
[   74.669159] 
[   74.669418] Memory state around the buggy address:
[   74.670042]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.671055]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.671716] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.672156]                          ^
[   74.672463]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.672927]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.673361] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strcmp
[   74.601507] ==================================================================
[   74.602347] BUG: KASAN: use-after-free in strcmp+0x2c/0x80
[   74.602898] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.603531] 
[   74.603780] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.604453] Hardware name: linux,dummy-virt (DT)
[   74.604842] Call trace:
[   74.605118]  dump_backtrace.part.0+0xdc/0xf0
[   74.605651]  show_stack+0x18/0x30
[   74.606083]  dump_stack_lvl+0x64/0x80
[   74.606525]  print_report+0x158/0x438
[   74.607011]  kasan_report+0xb4/0xf4
[   74.607457]  __asan_load1+0x68/0x74
[   74.607891]  strcmp+0x2c/0x80
[   74.608323]  kasan_strings+0x120/0x520
[   74.608949]  kunit_try_run_case+0x84/0x120
[   74.609430]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.610105]  kthread+0x180/0x190
[   74.610542]  ret_from_fork+0x10/0x20
[   74.610966] 
[   74.611151] Allocated by task 164:
[   74.611483]  kasan_save_stack+0x3c/0x70
[   74.611868]  kasan_set_track+0x2c/0x40
[   74.612310]  kasan_save_alloc_info+0x24/0x34
[   74.612798]  __kasan_kmalloc+0xb8/0xc0
[   74.613203]  kmalloc_trace+0x58/0x6c
[   74.613648]  kasan_strings+0x98/0x520
[   74.614231]  kunit_try_run_case+0x84/0x120
[   74.614758]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.615314]  kthread+0x180/0x190
[   74.615833]  ret_from_fork+0x10/0x20
[   74.616369] 
[   74.616636] Freed by task 164:
[   74.617053]  kasan_save_stack+0x3c/0x70
[   74.617618]  kasan_set_track+0x2c/0x40
[   74.618366]  kasan_save_free_info+0x38/0x5c
[   74.619065]  __kasan_slab_free+0xe4/0x150
[   74.619678]  __kmem_cache_free+0x130/0x2a4
[   74.620337]  kfree+0x58/0x80
[   74.620839]  kasan_strings+0xb8/0x520
[   74.621434]  kunit_try_run_case+0x84/0x120
[   74.622208]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.622697]  kthread+0x180/0x190
[   74.623009]  ret_from_fork+0x10/0x20
[   74.623344] 
[   74.624162] The buggy address belongs to the object at ffff0000c5938700
[   74.624162]  which belongs to the cache kmalloc-128 of size 128
[   74.625536] The buggy address is located 16 bytes inside of
[   74.625536]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.627234] 
[   74.627534] The buggy address belongs to the physical page:
[   74.628226] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.629321] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.630430] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.631351] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.632011] page dumped because: kasan: bad access detected
[   74.632360] 
[   74.632629] Memory state around the buggy address:
[   74.633229]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.634293]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.635162] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.635988]                          ^
[   74.636450]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.636920]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.637354] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strrchr
[   74.555188] ==================================================================
[   74.556071] BUG: KASAN: use-after-free in strrchr+0x28/0x54
[   74.556858] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.558526] 
[   74.558932] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.559710] Hardware name: linux,dummy-virt (DT)
[   74.560038] Call trace:
[   74.560251]  dump_backtrace.part.0+0xdc/0xf0
[   74.561341]  show_stack+0x18/0x30
[   74.562146]  dump_stack_lvl+0x64/0x80
[   74.563132]  print_report+0x158/0x438
[   74.564077]  kasan_report+0xb4/0xf4
[   74.564799]  __asan_load1+0x68/0x74
[   74.565562]  strrchr+0x28/0x54
[   74.566299]  kasan_strings+0xf4/0x520
[   74.567118]  kunit_try_run_case+0x84/0x120
[   74.567993]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.568954]  kthread+0x180/0x190
[   74.569471]  ret_from_fork+0x10/0x20
[   74.570249] 
[   74.570804] Allocated by task 164:
[   74.571331]  kasan_save_stack+0x3c/0x70
[   74.571711]  kasan_set_track+0x2c/0x40
[   74.572057]  kasan_save_alloc_info+0x24/0x34
[   74.572703]  __kasan_kmalloc+0xb8/0xc0
[   74.573521]  kmalloc_trace+0x58/0x6c
[   74.574537]  kasan_strings+0x98/0x520
[   74.575315]  kunit_try_run_case+0x84/0x120
[   74.576201]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.577224]  kthread+0x180/0x190
[   74.577983]  ret_from_fork+0x10/0x20
[   74.578761] 
[   74.579167] Freed by task 164:
[   74.579787]  kasan_save_stack+0x3c/0x70
[   74.580569]  kasan_set_track+0x2c/0x40
[   74.581335]  kasan_save_free_info+0x38/0x5c
[   74.582303]  __kasan_slab_free+0xe4/0x150
[   74.583038]  __kmem_cache_free+0x130/0x2a4
[   74.583856]  kfree+0x58/0x80
[   74.584548]  kasan_strings+0xb8/0x520
[   74.585066]  kunit_try_run_case+0x84/0x120
[   74.585927]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.586926]  kthread+0x180/0x190
[   74.587431]  ret_from_fork+0x10/0x20
[   74.587788] 
[   74.587954] The buggy address belongs to the object at ffff0000c5938700
[   74.587954]  which belongs to the cache kmalloc-128 of size 128
[   74.589002] The buggy address is located 16 bytes inside of
[   74.589002]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.590453] 
[   74.590719] The buggy address belongs to the physical page:
[   74.591401] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.592488] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.593411] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.594451] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.595699] page dumped because: kasan: bad access detected
[   74.596066] 
[   74.596238] Memory state around the buggy address:
[   74.596618]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.597207]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.597893] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.598617]                          ^
[   74.599333]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.599954]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.600534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strchr
[   74.513034] ==================================================================
[   74.514487] BUG: KASAN: use-after-free in strchr+0x20/0x80
[   74.515310] Read of size 1 at addr ffff0000c5938710 by task kunit_try_catch/164
[   74.516309] 
[   74.516649] CPU: 1 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.518659] Hardware name: linux,dummy-virt (DT)
[   74.519414] Call trace:
[   74.519830]  dump_backtrace.part.0+0xdc/0xf0
[   74.520551]  show_stack+0x18/0x30
[   74.521150]  dump_stack_lvl+0x64/0x80
[   74.521753]  print_report+0x158/0x438
[   74.522414]  kasan_report+0xb4/0xf4
[   74.522971]  __asan_load1+0x68/0x74
[   74.523547]  strchr+0x20/0x80
[   74.523926]  kasan_strings+0xd0/0x520
[   74.524294]  kunit_try_run_case+0x84/0x120
[   74.524801]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.525331]  kthread+0x180/0x190
[   74.525744]  ret_from_fork+0x10/0x20
[   74.526202] 
[   74.526446] Allocated by task 164:
[   74.526838]  kasan_save_stack+0x3c/0x70
[   74.527317]  kasan_set_track+0x2c/0x40
[   74.527908]  kasan_save_alloc_info+0x24/0x34
[   74.528572]  __kasan_kmalloc+0xb8/0xc0
[   74.529139]  kmalloc_trace+0x58/0x6c
[   74.529538]  kasan_strings+0x98/0x520
[   74.530080]  kunit_try_run_case+0x84/0x120
[   74.530492]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.530951]  kthread+0x180/0x190
[   74.531266]  ret_from_fork+0x10/0x20
[   74.531845] 
[   74.532104] Freed by task 164:
[   74.532535]  kasan_save_stack+0x3c/0x70
[   74.533089]  kasan_set_track+0x2c/0x40
[   74.533640]  kasan_save_free_info+0x38/0x5c
[   74.534983]  __kasan_slab_free+0xe4/0x150
[   74.535591]  __kmem_cache_free+0x130/0x2a4
[   74.536233]  kfree+0x58/0x80
[   74.536708]  kasan_strings+0xb8/0x520
[   74.537263]  kunit_try_run_case+0x84/0x120
[   74.538019]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.538836]  kthread+0x180/0x190
[   74.539334]  ret_from_fork+0x10/0x20
[   74.539892] 
[   74.540152] The buggy address belongs to the object at ffff0000c5938700
[   74.540152]  which belongs to the cache kmalloc-128 of size 128
[   74.541515] The buggy address is located 16 bytes inside of
[   74.541515]  128-byte region [ffff0000c5938700, ffff0000c5938780)
[   74.542482] 
[   74.542667] The buggy address belongs to the physical page:
[   74.543027] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.543827] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.544733] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.545651] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.546818] page dumped because: kasan: bad access detected
[   74.547512] 
[   74.547775] Memory state around the buggy address:
[   74.548366]  ffff0000c5938600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   74.549224]  ffff0000c5938680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.550125] >ffff0000c5938700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.551050]                          ^
[   74.551605]  ffff0000c5938780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.552712]  ffff0000c5938800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.553161] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   74.474977] ==================================================================
[   74.476084] BUG: KASAN: slab-out-of-bounds in memcmp+0x44/0xd0
[   74.476949] Read of size 1 at addr ffff0000c5840618 by task kunit_try_catch/163
[   74.477609] 
[   74.478410] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.479119] Hardware name: linux,dummy-virt (DT)
[   74.479556] Call trace:
[   74.479816]  dump_backtrace.part.0+0xdc/0xf0
[   74.480332]  show_stack+0x18/0x30
[   74.480765]  dump_stack_lvl+0x64/0x80
[   74.481198]  print_report+0x158/0x438
[   74.481654]  kasan_report+0xb4/0xf4
[   74.482331]  __asan_load1+0x68/0x74
[   74.482760]  memcmp+0x44/0xd0
[   74.483145]  kasan_memcmp+0xf4/0x200
[   74.483617]  kunit_try_run_case+0x84/0x120
[   74.484229]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.484749]  kthread+0x180/0x190
[   74.485069]  ret_from_fork+0x10/0x20
[   74.485435] 
[   74.485692] Allocated by task 163:
[   74.486687]  kasan_save_stack+0x3c/0x70
[   74.487263]  kasan_set_track+0x2c/0x40
[   74.487820]  kasan_save_alloc_info+0x24/0x34
[   74.488452]  __kasan_kmalloc+0xb8/0xc0
[   74.488998]  kmalloc_trace+0x58/0x6c
[   74.489552]  kasan_memcmp+0xb0/0x200
[   74.490426]  kunit_try_run_case+0x84/0x120
[   74.491046]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.491803]  kthread+0x180/0x190
[   74.492301]  ret_from_fork+0x10/0x20
[   74.492665] 
[   74.492836] The buggy address belongs to the object at ffff0000c5840600
[   74.492836]  which belongs to the cache kmalloc-128 of size 128
[   74.493696] The buggy address is located 24 bytes inside of
[   74.493696]  128-byte region [ffff0000c5840600, ffff0000c5840680)
[   74.495544] 
[   74.495819] The buggy address belongs to the physical page:
[   74.496490] page:0000000081b5a301 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105840
[   74.497553] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.498735] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.499844] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.500320] page dumped because: kasan: bad access detected
[   74.501228] 
[   74.501565] Memory state around the buggy address:
[   74.502307]  ffff0000c5840500: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.503445]  ffff0000c5840580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.504368] >ffff0000c5840600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.505244]                             ^
[   74.506108]  ffff0000c5840680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.506774]  ffff0000c5840700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.507267] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[   74.433459] ==================================================================
[   74.434376] BUG: KASAN: slab-out-of-bounds in memchr+0x28/0x80
[   74.435023] Read of size 1 at addr ffff0000c5938418 by task kunit_try_catch/162
[   74.435743] 
[   74.436250] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.437035] Hardware name: linux,dummy-virt (DT)
[   74.437525] Call trace:
[   74.438611]  dump_backtrace.part.0+0xdc/0xf0
[   74.439388]  show_stack+0x18/0x30
[   74.440121]  dump_stack_lvl+0x64/0x80
[   74.440779]  print_report+0x158/0x438
[   74.441618]  kasan_report+0xb4/0xf4
[   74.442361]  __asan_load1+0x68/0x74
[   74.443132]  memchr+0x28/0x80
[   74.443778]  kasan_memchr+0xcc/0x200
[   74.444627]  kunit_try_run_case+0x84/0x120
[   74.445178]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.446248]  kthread+0x180/0x190
[   74.447104]  ret_from_fork+0x10/0x20
[   74.447940] 
[   74.448302] Allocated by task 162:
[   74.448863]  kasan_save_stack+0x3c/0x70
[   74.449237]  kasan_set_track+0x2c/0x40
[   74.450050]  kasan_save_alloc_info+0x24/0x34
[   74.450963]  __kasan_kmalloc+0xb8/0xc0
[   74.451806]  kmalloc_trace+0x58/0x6c
[   74.452587]  kasan_memchr+0x98/0x200
[   74.453380]  kunit_try_run_case+0x84/0x120
[   74.454362]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.455455]  kthread+0x180/0x190
[   74.456242]  ret_from_fork+0x10/0x20
[   74.456833] 
[   74.457016] The buggy address belongs to the object at ffff0000c5938400
[   74.457016]  which belongs to the cache kmalloc-128 of size 128
[   74.458669] The buggy address is located 24 bytes inside of
[   74.458669]  128-byte region [ffff0000c5938400, ffff0000c5938480)
[   74.460327] 
[   74.460786] The buggy address belongs to the physical page:
[   74.461660] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.462254] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.463092] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.463878] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.464908] page dumped because: kasan: bad access detected
[   74.465447] 
[   74.465615] Memory state around the buggy address:
[   74.465958]  ffff0000c5938300: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.466434]  ffff0000c5938380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.467060] >ffff0000c5938400: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.467621]                             ^
[   74.467931]  ffff0000c5938480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.468387]  ffff0000c5938500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.468951] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmem_cache_double_destroy
[   74.375684] ==================================================================
[   74.376904] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xcc/0x1d0
[   74.378988] Read of size 1 at addr ffff0000c15bb500 by task kunit_try_catch/161
[   74.380211] 
[   74.380797] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.381903] Hardware name: linux,dummy-virt (DT)
[   74.382732] Call trace:
[   74.382976]  dump_backtrace.part.0+0xdc/0xf0
[   74.383425]  show_stack+0x18/0x30
[   74.383799]  dump_stack_lvl+0x64/0x80
[   74.384152]  print_report+0x158/0x438
[   74.385101]  kasan_report+0xb4/0xf4
[   74.385792]  __kasan_check_byte+0x54/0x70
[   74.386633]  kmem_cache_destroy+0xf0/0x194
[   74.387508]  kmem_cache_double_destroy+0xcc/0x1d0
[   74.388477]  kunit_try_run_case+0x84/0x120
[   74.389348]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.390390]  kthread+0x180/0x190
[   74.391143]  ret_from_fork+0x10/0x20
[   74.391902] 
[   74.392341] Allocated by task 161:
[   74.393011]  kasan_save_stack+0x3c/0x70
[   74.393830]  kasan_set_track+0x2c/0x40
[   74.394634]  kasan_save_alloc_info+0x24/0x34
[   74.395502]  __kasan_slab_alloc+0x8c/0x90
[   74.396360]  kmem_cache_alloc+0x170/0x2c4
[   74.397243]  kmem_cache_create_usercopy+0x144/0x26c
[   74.398218]  kmem_cache_create+0x1c/0x30
[   74.399071]  kmem_cache_double_destroy+0x9c/0x1d0
[   74.400017]  kunit_try_run_case+0x84/0x120
[   74.400841]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.401791]  kthread+0x180/0x190
[   74.402421]  ret_from_fork+0x10/0x20
[   74.402772] 
[   74.402942] Freed by task 161:
[   74.403190]  kasan_save_stack+0x3c/0x70
[   74.404097]  kasan_set_track+0x2c/0x40
[   74.404827]  kasan_save_free_info+0x38/0x5c
[   74.405735]  __kasan_slab_free+0xe4/0x150
[   74.406595]  kmem_cache_free+0x1b8/0x38c
[   74.407463]  slab_kmem_cache_release+0x30/0x40
[   74.408352]  kmem_cache_release+0x14/0x20
[   74.409198]  kobject_put+0xe0/0x170
[   74.409850]  sysfs_slab_release+0x28/0x34
[   74.410631]  kmem_cache_destroy+0xc8/0x194
[   74.411369]  kmem_cache_double_destroy+0xbc/0x1d0
[   74.412371]  kunit_try_run_case+0x84/0x120
[   74.413089]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.413802]  kthread+0x180/0x190
[   74.414135]  ret_from_fork+0x10/0x20
[   74.414871] 
[   74.415347] The buggy address belongs to the object at ffff0000c15bb500
[   74.415347]  which belongs to the cache kmem_cache of size 216
[   74.417180] The buggy address is located 0 bytes inside of
[   74.417180]  216-byte region [ffff0000c15bb500, ffff0000c15bb5d8)
[   74.418826] 
[   74.419290] The buggy address belongs to the physical page:
[   74.420140] page:000000002d0224d4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015ba
[   74.421229] head:000000002d0224d4 order:1 compound_mapcount:0 compound_pincount:0
[   74.421714] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.422275] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[   74.423317] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[   74.424218] page dumped because: kasan: bad access detected
[   74.424791] 
[   74.425206] Memory state around the buggy address:
[   74.425875]  ffff0000c15bb400: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   74.426632]  ffff0000c15bb480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.427220] >ffff0000c15bb500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.427885]                    ^
[   74.428359]  ffff0000c15bb580: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   74.429037]  ffff0000c15bb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.429488] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   74.334862] ==================================================================
[   74.335841] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xd8/0x230
[   74.336562] Free of addr ffff0000c58d3001 by task kunit_try_catch/160
[   74.337101] 
[   74.337333] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.338102] Hardware name: linux,dummy-virt (DT)
[   74.339057] Call trace:
[   74.339353]  dump_backtrace.part.0+0xdc/0xf0
[   74.339864]  show_stack+0x18/0x30
[   74.340286]  dump_stack_lvl+0x64/0x80
[   74.340713]  print_report+0x158/0x438
[   74.341214]  kasan_report_invalid_free+0x9c/0xc0
[   74.341687]  __kasan_slab_free+0x140/0x150
[   74.342144]  kmem_cache_free+0x1b8/0x38c
[   74.342606]  kmem_cache_invalid_free+0xd8/0x230
[   74.343374]  kunit_try_run_case+0x84/0x120
[   74.343847]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.344407]  kthread+0x180/0x190
[   74.344877]  ret_from_fork+0x10/0x20
[   74.345305] 
[   74.345514] Allocated by task 160:
[   74.345837]  kasan_save_stack+0x3c/0x70
[   74.346389]  kasan_set_track+0x2c/0x40
[   74.347177]  kasan_save_alloc_info+0x24/0x34
[   74.347669]  __kasan_slab_alloc+0x8c/0x90
[   74.348086]  kmem_cache_alloc+0x170/0x2c4
[   74.348556]  kmem_cache_invalid_free+0xb4/0x230
[   74.349050]  kunit_try_run_case+0x84/0x120
[   74.349511]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.350342]  kthread+0x180/0x190
[   74.350747]  ret_from_fork+0x10/0x20
[   74.351149] 
[   74.351346] The buggy address belongs to the object at ffff0000c58d3000
[   74.351346]  which belongs to the cache test_cache of size 200
[   74.352257] The buggy address is located 1 bytes inside of
[   74.352257]  200-byte region [ffff0000c58d3000, ffff0000c58d30c8)
[   74.353253] 
[   74.353488] The buggy address belongs to the physical page:
[   74.354515] page:0000000038ae0fdf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d3
[   74.355253] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.355936] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398900
[   74.356597] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   74.357203] page dumped because: kasan: bad access detected
[   74.357659] 
[   74.357856] Memory state around the buggy address:
[   74.358574]  ffff0000c58d2f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.359173]  ffff0000c58d2f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.359795] >ffff0000c58d3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.360425]                    ^
[   74.360755]  ffff0000c58d3080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   74.361357]  ffff0000c58d3100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.361952] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   74.285056] ==================================================================
[   74.286023] BUG: KASAN: double-free in kmem_cache_double_free+0xe4/0x244
[   74.286745] Free of addr ffff0000c5900000 by task kunit_try_catch/159
[   74.287254] 
[   74.287520] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.288254] Hardware name: linux,dummy-virt (DT)
[   74.288690] Call trace:
[   74.288964]  dump_backtrace.part.0+0xdc/0xf0
[   74.289435]  show_stack+0x18/0x30
[   74.291028]  dump_stack_lvl+0x64/0x80
[   74.292347]  print_report+0x158/0x438
[   74.292924]  kasan_report_invalid_free+0x9c/0xc0
[   74.294102]  __kasan_slab_free+0x118/0x150
[   74.294517]  kmem_cache_free+0x1b8/0x38c
[   74.295004]  kmem_cache_double_free+0xe4/0x244
[   74.295474]  kunit_try_run_case+0x84/0x120
[   74.295877]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.296335]  kthread+0x180/0x190
[   74.296948]  ret_from_fork+0x10/0x20
[   74.297742] 
[   74.297958] Allocated by task 159:
[   74.298528]  kasan_save_stack+0x3c/0x70
[   74.298900]  kasan_set_track+0x2c/0x40
[   74.299467]  kasan_save_alloc_info+0x24/0x34
[   74.299915]  __kasan_slab_alloc+0x8c/0x90
[   74.300273]  kmem_cache_alloc+0x170/0x2c4
[   74.300693]  kmem_cache_double_free+0xb4/0x244
[   74.301344]  kunit_try_run_case+0x84/0x120
[   74.302127]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.303466]  kthread+0x180/0x190
[   74.303957]  ret_from_fork+0x10/0x20
[   74.304463] 
[   74.304675] Freed by task 159:
[   74.305116]  kasan_save_stack+0x3c/0x70
[   74.305657]  kasan_set_track+0x2c/0x40
[   74.306116]  kasan_save_free_info+0x38/0x5c
[   74.306801]  __kasan_slab_free+0xe4/0x150
[   74.307334]  kmem_cache_free+0x1b8/0x38c
[   74.307919]  kmem_cache_double_free+0xd0/0x244
[   74.308514]  kunit_try_run_case+0x84/0x120
[   74.309046]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.309619]  kthread+0x180/0x190
[   74.310052]  ret_from_fork+0x10/0x20
[   74.310599] 
[   74.310836] The buggy address belongs to the object at ffff0000c5900000
[   74.310836]  which belongs to the cache test_cache of size 200
[   74.311825] The buggy address is located 0 bytes inside of
[   74.311825]  200-byte region [ffff0000c5900000, ffff0000c59000c8)
[   74.312768] 
[   74.312989] The buggy address belongs to the physical page:
[   74.313519] page:00000000d0a07206 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105900
[   74.314431] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.315152] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398780
[   74.315841] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   74.316508] page dumped because: kasan: bad access detected
[   74.317022] 
[   74.317232] Memory state around the buggy address:
[   74.317700]  ffff0000c58fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.318333]  ffff0000c58fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.319091] >ffff0000c5900000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.319714]                    ^
[   74.320040]  ffff0000c5900080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   74.320670]  ffff0000c5900100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.321258] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-ksize_uaf
[   74.244424] ==================================================================
[   74.244981] BUG: KASAN: use-after-free in ksize_uaf+0x100/0x32c
[   74.245628] Read of size 1 at addr ffff0000c5938278 by task kunit_try_catch/158
[   74.246935] 
[   74.247138] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.247943] Hardware name: linux,dummy-virt (DT)
[   74.248379] Call trace:
[   74.248667]  dump_backtrace.part.0+0xdc/0xf0
[   74.249174]  show_stack+0x18/0x30
[   74.249645]  dump_stack_lvl+0x64/0x80
[   74.250054]  print_report+0x158/0x438
[   74.250822]  kasan_report+0xb4/0xf4
[   74.251212]  __asan_load1+0x68/0x74
[   74.251671]  ksize_uaf+0x100/0x32c
[   74.252099]  kunit_try_run_case+0x84/0x120
[   74.252608]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.253178]  kthread+0x180/0x190
[   74.253594]  ret_from_fork+0x10/0x20
[   74.254597] 
[   74.254806] Allocated by task 158:
[   74.255163]  kasan_save_stack+0x3c/0x70
[   74.255633]  kasan_set_track+0x2c/0x40
[   74.256022]  kasan_save_alloc_info+0x24/0x34
[   74.256520]  __kasan_kmalloc+0xb8/0xc0
[   74.256952]  kmalloc_trace+0x58/0x6c
[   74.257388]  ksize_uaf+0x94/0x32c
[   74.257922]  kunit_try_run_case+0x84/0x120
[   74.258360]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.259157]  kthread+0x180/0x190
[   74.259578]  ret_from_fork+0x10/0x20
[   74.259966] 
[   74.260193] Freed by task 158:
[   74.260521]  kasan_save_stack+0x3c/0x70
[   74.260997]  kasan_set_track+0x2c/0x40
[   74.261379]  kasan_save_free_info+0x38/0x5c
[   74.262031]  __kasan_slab_free+0xe4/0x150
[   74.262495]  __kmem_cache_free+0x130/0x2a4
[   74.263510]  kfree+0x58/0x80
[   74.263914]  ksize_uaf+0xb4/0x32c
[   74.264306]  kunit_try_run_case+0x84/0x120
[   74.264816]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.265416]  kthread+0x180/0x190
[   74.266156]  ret_from_fork+0x10/0x20
[   74.266584] 
[   74.266803] The buggy address belongs to the object at ffff0000c5938200
[   74.266803]  which belongs to the cache kmalloc-128 of size 128
[   74.267794] The buggy address is located 120 bytes inside of
[   74.267794]  128-byte region [ffff0000c5938200, ffff0000c5938280)
[   74.268747] 
[   74.268992] The buggy address belongs to the physical page:
[   74.269485] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.270577] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.271721] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.272421] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.273022] page dumped because: kasan: bad access detected
[   74.273489] 
[   74.273693] Memory state around the buggy address:
[   74.274240]  ffff0000c5938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.275151]  ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.275802] >ffff0000c5938200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.276359]                                                                 ^
[   74.276934]  ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.277527]  ffff0000c5938300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.278370] ==================================================================
[   74.169142] ==================================================================
[   74.170260] BUG: KASAN: use-after-free in ksize_uaf+0xc4/0x32c
[   74.170937] Read of size 1 at addr ffff0000c5938200 by task kunit_try_catch/158
[   74.171875] 
[   74.172200] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.173306] Hardware name: linux,dummy-virt (DT)
[   74.174100] Call trace:
[   74.174590]  dump_backtrace.part.0+0xdc/0xf0
[   74.175480]  show_stack+0x18/0x30
[   74.176012]  dump_stack_lvl+0x64/0x80
[   74.176703]  print_report+0x158/0x438
[   74.177341]  kasan_report+0xb4/0xf4
[   74.177694]  __kasan_check_byte+0x54/0x70
[   74.178558]  ksize+0x3c/0x94
[   74.179237]  ksize_uaf+0xc4/0x32c
[   74.179965]  kunit_try_run_case+0x84/0x120
[   74.180740]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.181638]  kthread+0x180/0x190
[   74.182445]  ret_from_fork+0x10/0x20
[   74.183057] 
[   74.183236] Allocated by task 158:
[   74.183519]  kasan_save_stack+0x3c/0x70
[   74.183881]  kasan_set_track+0x2c/0x40
[   74.184214]  kasan_save_alloc_info+0x24/0x34
[   74.185160]  __kasan_kmalloc+0xb8/0xc0
[   74.185895]  kmalloc_trace+0x58/0x6c
[   74.186700]  ksize_uaf+0x94/0x32c
[   74.187388]  kunit_try_run_case+0x84/0x120
[   74.188220]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.189127]  kthread+0x180/0x190
[   74.189805]  ret_from_fork+0x10/0x20
[   74.190553] 
[   74.190998] Freed by task 158:
[   74.191571]  kasan_save_stack+0x3c/0x70
[   74.192280]  kasan_set_track+0x2c/0x40
[   74.192858]  kasan_save_free_info+0x38/0x5c
[   74.193503]  __kasan_slab_free+0xe4/0x150
[   74.194165]  __kmem_cache_free+0x130/0x2a4
[   74.195087]  kfree+0x58/0x80
[   74.195700]  ksize_uaf+0xb4/0x32c
[   74.196352]  kunit_try_run_case+0x84/0x120
[   74.197083]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.197934]  kthread+0x180/0x190
[   74.198575]  ret_from_fork+0x10/0x20
[   74.198924] 
[   74.199091] The buggy address belongs to the object at ffff0000c5938200
[   74.199091]  which belongs to the cache kmalloc-128 of size 128
[   74.199926] The buggy address is located 0 bytes inside of
[   74.199926]  128-byte region [ffff0000c5938200, ffff0000c5938280)
[   74.200821] 
[   74.201046] The buggy address belongs to the physical page:
[   74.201464] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.202605] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.203275] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.203943] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.204556] page dumped because: kasan: bad access detected
[   74.204998] 
[   74.205225] Memory state around the buggy address:
[   74.205686]  ffff0000c5938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.206843]  ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.207471] >ffff0000c5938200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.208068]                    ^
[   74.208429]  ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.209078]  ffff0000c5938300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.209666] ==================================================================
[   74.211038] ==================================================================
[   74.211618] BUG: KASAN: use-after-free in ksize_uaf+0xe0/0x32c
[   74.212208] Read of size 1 at addr ffff0000c5938200 by task kunit_try_catch/158
[   74.212829] 
[   74.213070] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.213835] Hardware name: linux,dummy-virt (DT)
[   74.214292] Call trace:
[   74.215082]  dump_backtrace.part.0+0xdc/0xf0
[   74.215625]  show_stack+0x18/0x30
[   74.216051]  dump_stack_lvl+0x64/0x80
[   74.216462]  print_report+0x158/0x438
[   74.216943]  kasan_report+0xb4/0xf4
[   74.217325]  __asan_load1+0x68/0x74
[   74.217766]  ksize_uaf+0xe0/0x32c
[   74.218165]  kunit_try_run_case+0x84/0x120
[   74.218901]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.219468]  kthread+0x180/0x190
[   74.219887]  ret_from_fork+0x10/0x20
[   74.220288] 
[   74.220512] Allocated by task 158:
[   74.220880]  kasan_save_stack+0x3c/0x70
[   74.221316]  kasan_set_track+0x2c/0x40
[   74.221710]  kasan_save_alloc_info+0x24/0x34
[   74.222292]  __kasan_kmalloc+0xb8/0xc0
[   74.223060]  kmalloc_trace+0x58/0x6c
[   74.223550]  ksize_uaf+0x94/0x32c
[   74.223956]  kunit_try_run_case+0x84/0x120
[   74.224440]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.224994]  kthread+0x180/0x190
[   74.225381]  ret_from_fork+0x10/0x20
[   74.225905] 
[   74.226107] Freed by task 158:
[   74.226646]  kasan_save_stack+0x3c/0x70
[   74.227085]  kasan_set_track+0x2c/0x40
[   74.227484]  kasan_save_free_info+0x38/0x5c
[   74.227965]  __kasan_slab_free+0xe4/0x150
[   74.228416]  __kmem_cache_free+0x130/0x2a4
[   74.228931]  kfree+0x58/0x80
[   74.229311]  ksize_uaf+0xb4/0x32c
[   74.229754]  kunit_try_run_case+0x84/0x120
[   74.230290]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.231230]  kthread+0x180/0x190
[   74.231637]  ret_from_fork+0x10/0x20
[   74.232031] 
[   74.232252] The buggy address belongs to the object at ffff0000c5938200
[   74.232252]  which belongs to the cache kmalloc-128 of size 128
[   74.233221] The buggy address is located 0 bytes inside of
[   74.233221]  128-byte region [ffff0000c5938200, ffff0000c5938280)
[   74.234274] 
[   74.234487] The buggy address belongs to the physical page:
[   74.235160] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.235949] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.236651] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.237344] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.238082] page dumped because: kasan: bad access detected
[   74.238580] 
[   74.238755] Memory state around the buggy address:
[   74.239172]  ffff0000c5938100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.239831]  ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.241007] >ffff0000c5938200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.241584]                    ^
[   74.242101]  ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.242788]  ffff0000c5938300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.243556] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   74.134671] ==================================================================
[   74.135414] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xdc/0x1e0
[   74.136132] Read of size 1 at addr ffff0000c5938180 by task kunit_try_catch/157
[   74.137058] 
[   74.137252] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.137970] Hardware name: linux,dummy-virt (DT)
[   74.138805] Call trace:
[   74.139251]  dump_backtrace.part.0+0xdc/0xf0
[   74.139966]  show_stack+0x18/0x30
[   74.140570]  dump_stack_lvl+0x64/0x80
[   74.141151]  print_report+0x158/0x438
[   74.141790]  kasan_report+0xb4/0xf4
[   74.142445]  __asan_load1+0x68/0x74
[   74.143020]  ksize_unpoisons_memory+0xdc/0x1e0
[   74.143719]  kunit_try_run_case+0x84/0x120
[   74.144360]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.145147]  kthread+0x180/0x190
[   74.145624]  ret_from_fork+0x10/0x20
[   74.145977] 
[   74.146148] Allocated by task 157:
[   74.146455]  kasan_save_stack+0x3c/0x70
[   74.147070]  kasan_set_track+0x2c/0x40
[   74.147652]  kasan_save_alloc_info+0x24/0x34
[   74.148302]  __kasan_kmalloc+0xb8/0xc0
[   74.148874]  kmalloc_trace+0x58/0x6c
[   74.149451]  ksize_unpoisons_memory+0x98/0x1e0
[   74.150227]  kunit_try_run_case+0x84/0x120
[   74.150915]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.151726]  kthread+0x180/0x190
[   74.152257]  ret_from_fork+0x10/0x20
[   74.152837] 
[   74.153134] The buggy address belongs to the object at ffff0000c5938100
[   74.153134]  which belongs to the cache kmalloc-128 of size 128
[   74.154564] The buggy address is located 0 bytes to the right of
[   74.154564]  128-byte region [ffff0000c5938100, ffff0000c5938180)
[   74.155857] 
[   74.156142] The buggy address belongs to the physical page:
[   74.156648] page:000000003af4cecf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   74.157213] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.157898] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.158570] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.159154] page dumped because: kasan: bad access detected
[   74.159690] 
[   74.159888] Memory state around the buggy address:
[   74.160356]  ffff0000c5938080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.160997]  ffff0000c5938100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.161603] >ffff0000c5938180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.162379]                    ^
[   74.162791]  ffff0000c5938200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.163461]  ffff0000c5938280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.164068] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[   74.107145] ==================================================================
[   74.107914] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x10c/0x1f4
[   74.108788] Read of size 1 at addr ffff8000087c7cca by task kunit_try_catch/156
[   74.109786] 
[   74.110161] CPU: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.111375] Hardware name: linux,dummy-virt (DT)
[   74.112035] Call trace:
[   74.112463]  dump_backtrace.part.0+0xdc/0xf0
[   74.113190]  show_stack+0x18/0x30
[   74.113866]  dump_stack_lvl+0x64/0x80
[   74.114535]  print_report+0x158/0x438
[   74.115179]  kasan_report+0xb4/0xf4
[   74.115775]  __asan_load1+0x68/0x74
[   74.116359]  kasan_alloca_oob_right+0x10c/0x1f4
[   74.117083]  kunit_try_run_case+0x84/0x120
[   74.117901]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.118554]  kthread+0x180/0x190
[   74.118889]  ret_from_fork+0x10/0x20
[   74.119235] 
[   74.119413] The buggy address belongs to stack of task kunit_try_catch/156
[   74.119970] 
[   74.120204] The buggy address ffff8000087c7cca belongs to a vmalloc virtual mapping
[   74.120849] The buggy address belongs to the physical page:
[   74.121375] page:000000002f688418 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105934
[   74.122381] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   74.123053] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   74.123839] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.124741] page dumped because: kasan: bad access detected
[   74.125430] 
[   74.125703] Memory state around the buggy address:
[   74.127079]  ffff8000087c7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.127737]  ffff8000087c7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.128203] >ffff8000087c7c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   74.128726]                                               ^
[   74.129232]  ffff8000087c7d00: f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3
[   74.130101]  ffff8000087c7d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.130731] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[   74.071545] ==================================================================
[   74.072272] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x100/0x1dc
[   74.072877] Read of size 1 at addr ffff8000087b7cbf by task kunit_try_catch/155
[   74.073341] 
[   74.074336] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.075701] Hardware name: linux,dummy-virt (DT)
[   74.076702] Call trace:
[   74.077167]  dump_backtrace.part.0+0xdc/0xf0
[   74.078215]  show_stack+0x18/0x30
[   74.079075]  dump_stack_lvl+0x64/0x80
[   74.079931]  print_report+0x158/0x438
[   74.080794]  kasan_report+0xb4/0xf4
[   74.081607]  __asan_load1+0x68/0x74
[   74.082511]  kasan_alloca_oob_left+0x100/0x1dc
[   74.083435]  kunit_try_run_case+0x84/0x120
[   74.084345]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.085436]  kthread+0x180/0x190
[   74.086320]  ret_from_fork+0x10/0x20
[   74.087173] 
[   74.087809] The buggy address belongs to stack of task kunit_try_catch/155
[   74.088809] 
[   74.089359] The buggy address ffff8000087b7cbf belongs to a vmalloc virtual mapping
[   74.090616] The buggy address belongs to the physical page:
[   74.091218] page:00000000b2a89bce refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105956
[   74.091820] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   74.092321] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   74.093947] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.094614] page dumped because: kasan: bad access detected
[   74.095048] 
[   74.095266] Memory state around the buggy address:
[   74.095904]  ffff8000087b7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.096598]  ffff8000087b7c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.097194] >ffff8000087b7c80: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   74.098140]                                         ^
[   74.098600]  ffff8000087b7d00: 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00 00
[   74.099187]  ffff8000087b7d80: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.099760] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[   74.044968] ==================================================================
[   74.045892] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xb4/0x170
[   74.046870] Read of size 1 at addr ffff8000087b7d9a by task kunit_try_catch/154
[   74.047418] 
[   74.047670] CPU: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.048354] Hardware name: linux,dummy-virt (DT)
[   74.048775] Call trace:
[   74.049070]  dump_backtrace.part.0+0xdc/0xf0
[   74.049577]  show_stack+0x18/0x30
[   74.050139]  dump_stack_lvl+0x64/0x80
[   74.050575]  print_report+0x158/0x438
[   74.050980]  kasan_report+0xb4/0xf4
[   74.051335]  __asan_load1+0x68/0x74
[   74.051755]  kasan_stack_oob+0xb4/0x170
[   74.052184]  kunit_try_run_case+0x84/0x120
[   74.052660]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.053211]  kthread+0x180/0x190
[   74.053600]  ret_from_fork+0x10/0x20
[   74.054186] 
[   74.054446] The buggy address belongs to stack of task kunit_try_catch/154
[   74.055101]  and is located at offset 138 in frame:
[   74.055547]  kasan_stack_oob+0x0/0x170
[   74.056076] 
[   74.056289] This frame has 4 objects:
[   74.056732]  [48, 49) '__assertion'
[   74.056822]  [64, 72) 'array'
[   74.057157]  [96, 112) '__assertion'
[   74.057503]  [128, 138) 'stack_array'
[   74.058020] 
[   74.058496] The buggy address ffff8000087b7d9a belongs to a vmalloc virtual mapping
[   74.059104] The buggy address belongs to the physical page:
[   74.059576] page:00000000b2a89bce refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105956
[   74.060346] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   74.060963] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   74.061619] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.062372] page dumped because: kasan: bad access detected
[   74.062848] 
[   74.063035] Memory state around the buggy address:
[   74.063481]  ffff8000087b7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.064045]  ffff8000087b7d00: 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 00 00
[   74.064671] >ffff8000087b7d80: f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 00 00
[   74.065217]                             ^
[   74.065601]  ffff8000087b7e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.066815]  ffff8000087b7e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.067413] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   74.011700] ==================================================================
[   74.012572] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa0/0x150
[   74.013283] Read of size 1 at addr ffffc778ac5a6eed by task kunit_try_catch/152
[   74.014218] 
[   74.014492] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.015250] Hardware name: linux,dummy-virt (DT)
[   74.015686] Call trace:
[   74.015962]  dump_backtrace.part.0+0xdc/0xf0
[   74.016471]  show_stack+0x18/0x30
[   74.016883]  dump_stack_lvl+0x64/0x80
[   74.017326]  print_report+0x158/0x438
[   74.018085]  kasan_report+0xb4/0xf4
[   74.018497]  __asan_load1+0x68/0x74
[   74.018887]  kasan_global_oob_right+0xa0/0x150
[   74.019350]  kunit_try_run_case+0x84/0x120
[   74.019812]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   74.020363]  kthread+0x180/0x190
[   74.020764]  ret_from_fork+0x10/0x20
[   74.021193] 
[   74.021439] The buggy address belongs to the variable:
[   74.022182]  global_array+0xd/0x40
[   74.022651] 
[   74.022899] The buggy address ffffc778ac5a6eed belongs to a vmalloc virtual mapping
[   74.023564] The buggy address belongs to the physical page:
[   74.024067] page:00000000841dc02e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x455a6
[   74.024834] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   74.025567] raw: 03fffc0000001000 fffffc0000156988 fffffc0000156988 0000000000000000
[   74.026335] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.027082] page dumped because: kasan: bad access detected
[   74.027956] 
[   74.028136] Memory state around the buggy address:
[   74.028486]  ffffc778ac5a6d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.028942]  ffffc778ac5a6e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.029497] >ffffc778ac5a6e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
[   74.030557]                                                           ^
[   74.031025]  ffffc778ac5a6f00: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   74.031709]  ffffc778ac5a6f80: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   74.032252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   73.406015] ==================================================================
[   73.407006] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xd4/0x250
[   73.407835] Read of size 1 at addr ffff0000c59440c8 by task kunit_try_catch/149
[   73.408804] 
[   73.409128] CPU: 0 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.409888] Hardware name: linux,dummy-virt (DT)
[   73.410331] Call trace:
[   73.410564]  dump_backtrace.part.0+0xdc/0xf0
[   73.410991]  show_stack+0x18/0x30
[   73.411348]  dump_stack_lvl+0x64/0x80
[   73.411711]  print_report+0x158/0x438
[   73.412077]  kasan_report+0xb4/0xf4
[   73.412426]  __asan_load1+0x68/0x74
[   73.413128]  kmem_cache_oob+0xd4/0x250
[   73.413724]  kunit_try_run_case+0x84/0x120
[   73.414715]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.415447]  kthread+0x180/0x190
[   73.415785]  ret_from_fork+0x10/0x20
[   73.416133] 
[   73.416299] Allocated by task 149:
[   73.416791]  kasan_save_stack+0x3c/0x70
[   73.417375]  kasan_set_track+0x2c/0x40
[   73.417948]  kasan_save_alloc_info+0x24/0x34
[   73.418834]  __kasan_slab_alloc+0x8c/0x90
[   73.419666]  kmem_cache_alloc+0x170/0x2c4
[   73.420608]  kmem_cache_oob+0xb4/0x250
[   73.421310]  kunit_try_run_case+0x84/0x120
[   73.422468]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.423472]  kthread+0x180/0x190
[   73.424157]  ret_from_fork+0x10/0x20
[   73.424907] 
[   73.425308] The buggy address belongs to the object at ffff0000c5944000
[   73.425308]  which belongs to the cache test_cache of size 200
[   73.426448] The buggy address is located 0 bytes to the right of
[   73.426448]  200-byte region [ffff0000c5944000, ffff0000c59440c8)
[   73.427350] 
[   73.427570] The buggy address belongs to the physical page:
[   73.428004] page:00000000b23089e8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105944
[   73.428770] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.429420] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1398480
[   73.430086] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   73.430688] page dumped because: kasan: bad access detected
[   73.431125] 
[   73.431306] Memory state around the buggy address:
[   73.431741]  ffff0000c5943f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.432342]  ffff0000c5944000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.433008] >ffff0000c5944080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   73.433588]                                               ^
[   73.434225]  ffff0000c5944100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.434843]  ffff0000c5944180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.435426] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf2
[   73.357743] ==================================================================
[   73.358837] BUG: KASAN: use-after-free in kmalloc_uaf2+0x104/0x290
[   73.359501] Read of size 1 at addr ffff0000c589dc28 by task kunit_try_catch/145
[   73.360122] 
[   73.360359] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.361108] Hardware name: linux,dummy-virt (DT)
[   73.361567] Call trace:
[   73.362181]  dump_backtrace.part.0+0xdc/0xf0
[   73.362738]  show_stack+0x18/0x30
[   73.363201]  dump_stack_lvl+0x64/0x80
[   73.363666]  print_report+0x158/0x438
[   73.364142]  kasan_report+0xb4/0xf4
[   73.364559]  __asan_load1+0x68/0x74
[   73.364972]  kmalloc_uaf2+0x104/0x290
[   73.365437]  kunit_try_run_case+0x84/0x120
[   73.366119]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.366691]  kthread+0x180/0x190
[   73.367236]  ret_from_fork+0x10/0x20
[   73.367692] 
[   73.367892] Allocated by task 145:
[   73.368236]  kasan_save_stack+0x3c/0x70
[   73.368677]  kasan_set_track+0x2c/0x40
[   73.369111]  kasan_save_alloc_info+0x24/0x34
[   73.369609]  __kasan_kmalloc+0xb8/0xc0
[   73.370284]  kmalloc_trace+0x58/0x6c
[   73.370737]  kmalloc_uaf2+0xac/0x290
[   73.371153]  kunit_try_run_case+0x84/0x120
[   73.371655]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.372249]  kthread+0x180/0x190
[   73.372663]  ret_from_fork+0x10/0x20
[   73.373053] 
[   73.373280] Freed by task 145:
[   73.373626]  kasan_save_stack+0x3c/0x70
[   73.374038]  kasan_set_track+0x2c/0x40
[   73.374490]  kasan_save_free_info+0x38/0x5c
[   73.374935]  __kasan_slab_free+0xe4/0x150
[   73.375312]  __kmem_cache_free+0x130/0x2a4
[   73.376148]  kfree+0x58/0x80
[   73.376528]  kmalloc_uaf2+0xc4/0x290
[   73.376990]  kunit_try_run_case+0x84/0x120
[   73.377443]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.378317]  kthread+0x180/0x190
[   73.378711]  ret_from_fork+0x10/0x20
[   73.379153] 
[   73.379412] The buggy address belongs to the object at ffff0000c589dc00
[   73.379412]  which belongs to the cache kmalloc-128 of size 128
[   73.380378] The buggy address is located 40 bytes inside of
[   73.380378]  128-byte region [ffff0000c589dc00, ffff0000c589dc80)
[   73.381270] 
[   73.381512] The buggy address belongs to the physical page:
[   73.382160] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d
[   73.382902] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.383825] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.384510] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.385106] page dumped because: kasan: bad access detected
[   73.385599] 
[   73.385787] Memory state around the buggy address:
[   73.386382]  ffff0000c589db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   73.387167]  ffff0000c589db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.387798] >ffff0000c589dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.388382]                                   ^
[   73.388858]  ffff0000c589dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.389507]  ffff0000c589dd00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   73.390299] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_memset
[   73.314952] ==================================================================
[   73.315785] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xcc/0x1f0
[   73.316428] Write of size 33 at addr ffff0000c589da00 by task kunit_try_catch/144
[   73.316965] 
[   73.317198] CPU: 1 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.318116] Hardware name: linux,dummy-virt (DT)
[   73.318572] Call trace:
[   73.318832]  dump_backtrace.part.0+0xdc/0xf0
[   73.319352]  show_stack+0x18/0x30
[   73.319767]  dump_stack_lvl+0x64/0x80
[   73.320186]  print_report+0x158/0x438
[   73.321414]  kasan_report+0xb4/0xf4
[   73.321884]  kasan_check_range+0xe4/0x190
[   73.322434]  memset+0x40/0x70
[   73.322869]  kmalloc_uaf_memset+0xcc/0x1f0
[   73.323619]  kunit_try_run_case+0x84/0x120
[   73.324296]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.324961]  kthread+0x180/0x190
[   73.325468]  ret_from_fork+0x10/0x20
[   73.326067] 
[   73.326240] Allocated by task 144:
[   73.326851]  kasan_save_stack+0x3c/0x70
[   73.327412]  kasan_set_track+0x2c/0x40
[   73.327938]  kasan_save_alloc_info+0x24/0x34
[   73.328533]  __kasan_kmalloc+0xb8/0xc0
[   73.329045]  kmalloc_trace+0x58/0x6c
[   73.329573]  kmalloc_uaf_memset+0x94/0x1f0
[   73.330238]  kunit_try_run_case+0x84/0x120
[   73.330811]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.331472]  kthread+0x180/0x190
[   73.331867]  ret_from_fork+0x10/0x20
[   73.332291] 
[   73.332493] Freed by task 144:
[   73.332788]  kasan_save_stack+0x3c/0x70
[   73.333232]  kasan_set_track+0x2c/0x40
[   73.333620]  kasan_save_free_info+0x38/0x5c
[   73.334110]  __kasan_slab_free+0xe4/0x150
[   73.334532]  __kmem_cache_free+0x130/0x2a4
[   73.335012]  kfree+0x58/0x80
[   73.335356]  kmalloc_uaf_memset+0xb4/0x1f0
[   73.336117]  kunit_try_run_case+0x84/0x120
[   73.336613]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.337178]  kthread+0x180/0x190
[   73.337589]  ret_from_fork+0x10/0x20
[   73.338194] 
[   73.338808] The buggy address belongs to the object at ffff0000c589da00
[   73.338808]  which belongs to the cache kmalloc-128 of size 128
[   73.339773] The buggy address is located 0 bytes inside of
[   73.339773]  128-byte region [ffff0000c589da00, ffff0000c589da80)
[   73.340696] 
[   73.340895] The buggy address belongs to the physical page:
[   73.341374] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d
[   73.342441] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.343272] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.343919] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.344541] page dumped because: kasan: bad access detected
[   73.345045] 
[   73.345245] Memory state around the buggy address:
[   73.345714]  ffff0000c589d900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   73.346853]  ffff0000c589d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.347484] >ffff0000c589da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.348051]                    ^
[   73.348371]  ffff0000c589da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.349028]  ffff0000c589db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.349611] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_pagealloc_uaf
[   72.333163] ==================================================================
[   72.334193] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xa8/0x1d0
[   72.335243] Read of size 1 at addr ffff0000c5a04000 by task kunit_try_catch/124
[   72.335836] 
[   72.336080] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.336865] Hardware name: linux,dummy-virt (DT)
[   72.337294] Call trace:
[   72.337592]  dump_backtrace.part.0+0xdc/0xf0
[   72.338118]  show_stack+0x18/0x30
[   72.338810]  dump_stack_lvl+0x64/0x80
[   72.339216]  print_report+0x158/0x438
[   72.339653]  kasan_report+0xb4/0xf4
[   72.340028]  __asan_load1+0x68/0x74
[   72.340446]  kmalloc_pagealloc_uaf+0xa8/0x1d0
[   72.340934]  kunit_try_run_case+0x84/0x120
[   72.341435]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.342270]  kthread+0x180/0x190
[   72.342702]  ret_from_fork+0x10/0x20
[   72.343101] 
[   72.343310] The buggy address belongs to the physical page:
[   72.343846] page:00000000275a55ef refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a04
[   72.344594] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   72.345213] raw: 0bfffc0000000000 fffffc0003168208 ffff0000dac48ff8 0000000000000000
[   72.346059] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   72.346682] page dumped because: kasan: bad access detected
[   72.347097] 
[   72.347269] Memory state around the buggy address:
[   72.347726]  ffff0000c5a03f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.348296]  ffff0000c5a03f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.349105] >ffff0000c5a04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.349720]                    ^
[   72.350280]  ffff0000c5a04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.350900]  ffff0000c5a04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.351484] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf
[   73.271251] ==================================================================
[   73.272777] BUG: KASAN: use-after-free in kmalloc_uaf+0xc4/0x1e0
[   73.273908] Read of size 1 at addr ffff0000c589d808 by task kunit_try_catch/143
[   73.275193] 
[   73.275683] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.276681] Hardware name: linux,dummy-virt (DT)
[   73.277381] Call trace:
[   73.277940]  dump_backtrace.part.0+0xdc/0xf0
[   73.278796]  show_stack+0x18/0x30
[   73.279479]  dump_stack_lvl+0x64/0x80
[   73.280171]  print_report+0x158/0x438
[   73.280865]  kasan_report+0xb4/0xf4
[   73.281513]  __asan_load1+0x68/0x74
[   73.282221]  kmalloc_uaf+0xc4/0x1e0
[   73.283003]  kunit_try_run_case+0x84/0x120
[   73.283764]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.284660]  kthread+0x180/0x190
[   73.285193]  ret_from_fork+0x10/0x20
[   73.285788] 
[   73.286064] Allocated by task 143:
[   73.286644]  kasan_save_stack+0x3c/0x70
[   73.287233]  kasan_set_track+0x2c/0x40
[   73.287801]  kasan_save_alloc_info+0x24/0x34
[   73.288443]  __kasan_kmalloc+0xb8/0xc0
[   73.288946]  kmalloc_trace+0x58/0x6c
[   73.289294]  kmalloc_uaf+0x94/0x1e0
[   73.289652]  kunit_try_run_case+0x84/0x120
[   73.290346]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.291185]  kthread+0x180/0x190
[   73.291808]  ret_from_fork+0x10/0x20
[   73.292377] 
[   73.292651] Freed by task 143:
[   73.293098]  kasan_save_stack+0x3c/0x70
[   73.293681]  kasan_set_track+0x2c/0x40
[   73.294343]  kasan_save_free_info+0x38/0x5c
[   73.295078]  __kasan_slab_free+0xe4/0x150
[   73.295717]  __kmem_cache_free+0x130/0x2a4
[   73.296389]  kfree+0x58/0x80
[   73.296900]  kmalloc_uaf+0xb4/0x1e0
[   73.297473]  kunit_try_run_case+0x84/0x120
[   73.298291]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.298927]  kthread+0x180/0x190
[   73.299244]  ret_from_fork+0x10/0x20
[   73.299601] 
[   73.299844] The buggy address belongs to the object at ffff0000c589d800
[   73.299844]  which belongs to the cache kmalloc-128 of size 128
[   73.300812] The buggy address is located 8 bytes inside of
[   73.300812]  128-byte region [ffff0000c589d800, ffff0000c589d880)
[   73.301705] 
[   73.302292] The buggy address belongs to the physical page:
[   73.302787] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d
[   73.303569] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.304233] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.304929] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.305549] page dumped because: kasan: bad access detected
[   73.305988] 
[   73.306267] Memory state around the buggy address:
[   73.307255]  ffff0000c589d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   73.307908]  ffff0000c589d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.308544] >ffff0000c589d800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.309123]                       ^
[   73.309505]  ffff0000c589d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.310158]  ffff0000c589d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.310919] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   73.231542] ==================================================================
[   73.232300] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xdc/0x1e0
[   73.232920] Read of size 64 at addr ffff0000c5915c04 by task kunit_try_catch/142
[   73.233381] 
[   73.234061] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.235807] Hardware name: linux,dummy-virt (DT)
[   73.236454] Call trace:
[   73.236866]  dump_backtrace.part.0+0xdc/0xf0
[   73.237591]  show_stack+0x18/0x30
[   73.238262]  dump_stack_lvl+0x64/0x80
[   73.238877]  print_report+0x158/0x438
[   73.239489]  kasan_report+0xb4/0xf4
[   73.240037]  kasan_check_range+0xe4/0x190
[   73.240649]  memmove+0x44/0xc0
[   73.241163]  kmalloc_memmove_invalid_size+0xdc/0x1e0
[   73.241960]  kunit_try_run_case+0x84/0x120
[   73.242635]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.243422]  kthread+0x180/0x190
[   73.243948]  ret_from_fork+0x10/0x20
[   73.244515] 
[   73.244795] Allocated by task 142:
[   73.245270]  kasan_save_stack+0x3c/0x70
[   73.245905]  kasan_set_track+0x2c/0x40
[   73.246506]  kasan_save_alloc_info+0x24/0x34
[   73.247152]  __kasan_kmalloc+0xb8/0xc0
[   73.247715]  kmalloc_trace+0x58/0x6c
[   73.248280]  kmalloc_memmove_invalid_size+0x98/0x1e0
[   73.248809]  kunit_try_run_case+0x84/0x120
[   73.249185]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.249865]  kthread+0x180/0x190
[   73.250248]  ret_from_fork+0x10/0x20
[   73.250808] 
[   73.251083] The buggy address belongs to the object at ffff0000c5915c00
[   73.251083]  which belongs to the cache kmalloc-128 of size 128
[   73.251917] The buggy address is located 4 bytes inside of
[   73.251917]  128-byte region [ffff0000c5915c00, ffff0000c5915c80)
[   73.252586] 
[   73.252755] The buggy address belongs to the physical page:
[   73.253106] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   73.255194] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.256100] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.257327] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.258782] page dumped because: kasan: bad access detected
[   73.259157] 
[   73.259325] Memory state around the buggy address:
[   73.259695]  ffff0000c5915b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.260161]  ffff0000c5915b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.261942] >ffff0000c5915c00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   73.263423]                                            ^
[   73.264313]  ffff0000c5915c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.265588]  ffff0000c5915d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.266952] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   73.193216] ==================================================================
[   73.194866] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xdc/0x1f0
[   73.196478] Read of size 18446744073709551614 at addr ffff0000c589d304 by task kunit_try_catch/141
[   73.197747] 
[   73.197951] CPU: 1 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.199055] Hardware name: linux,dummy-virt (DT)
[   73.199843] Call trace:
[   73.200472]  dump_backtrace.part.0+0xdc/0xf0
[   73.201571]  show_stack+0x18/0x30
[   73.202177]  dump_stack_lvl+0x64/0x80
[   73.202648]  print_report+0x158/0x438
[   73.203091]  kasan_report+0xb4/0xf4
[   73.203533]  kasan_check_range+0xe4/0x190
[   73.203982]  memmove+0x44/0xc0
[   73.204361]  kmalloc_memmove_negative_size+0xdc/0x1f0
[   73.205425]  kunit_try_run_case+0x84/0x120
[   73.205861]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.206747]  kthread+0x180/0x190
[   73.207134]  ret_from_fork+0x10/0x20
[   73.207567] 
[   73.207755] Allocated by task 141:
[   73.208076]  kasan_save_stack+0x3c/0x70
[   73.208514]  kasan_set_track+0x2c/0x40
[   73.208942]  kasan_save_alloc_info+0x24/0x34
[   73.209386]  __kasan_kmalloc+0xb8/0xc0
[   73.210373]  kmalloc_trace+0x58/0x6c
[   73.210790]  kmalloc_memmove_negative_size+0x98/0x1f0
[   73.211336]  kunit_try_run_case+0x84/0x120
[   73.211812]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.212342]  kthread+0x180/0x190
[   73.212713]  ret_from_fork+0x10/0x20
[   73.213113] 
[   73.213318] The buggy address belongs to the object at ffff0000c589d300
[   73.213318]  which belongs to the cache kmalloc-128 of size 128
[   73.214420] The buggy address is located 4 bytes inside of
[   73.214420]  128-byte region [ffff0000c589d300, ffff0000c589d380)
[   73.215324] 
[   73.215517] The buggy address belongs to the physical page:
[   73.216054] page:00000000b8b1210d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10589d
[   73.217018] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.217712] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.218850] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.219444] page dumped because: kasan: bad access detected
[   73.219900] 
[   73.220098] Memory state around the buggy address:
[   73.220523]  ffff0000c589d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.221105]  ffff0000c589d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.221724] >ffff0000c589d300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   73.222565]                    ^
[   73.222913]  ffff0000c589d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.223512]  ffff0000c589d400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.224066] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   73.159096] ==================================================================
[   73.159829] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xd0/0x200
[   73.160385] Write of size 16 at addr ffff0000c5915869 by task kunit_try_catch/140
[   73.161413] 
[   73.161729] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.163101] Hardware name: linux,dummy-virt (DT)
[   73.163708] Call trace:
[   73.164069]  dump_backtrace.part.0+0xdc/0xf0
[   73.164739]  show_stack+0x18/0x30
[   73.165292]  dump_stack_lvl+0x64/0x80
[   73.166292]  print_report+0x158/0x438
[   73.166892]  kasan_report+0xb4/0xf4
[   73.167430]  kasan_check_range+0xe4/0x190
[   73.168028]  memset+0x40/0x70
[   73.168527]  kmalloc_oob_memset_16+0xd0/0x200
[   73.169166]  kunit_try_run_case+0x84/0x120
[   73.169928]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.170514]  kthread+0x180/0x190
[   73.170841]  ret_from_fork+0x10/0x20
[   73.171183] 
[   73.171348] Allocated by task 140:
[   73.171820]  kasan_save_stack+0x3c/0x70
[   73.172382]  kasan_set_track+0x2c/0x40
[   73.172942]  kasan_save_alloc_info+0x24/0x34
[   73.173570]  __kasan_kmalloc+0xb8/0xc0
[   73.174270]  kmalloc_trace+0x58/0x6c
[   73.174848]  kmalloc_oob_memset_16+0x98/0x200
[   73.175504]  kunit_try_run_case+0x84/0x120
[   73.176109]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.176853]  kthread+0x180/0x190
[   73.177353]  ret_from_fork+0x10/0x20
[   73.178078] 
[   73.178843] The buggy address belongs to the object at ffff0000c5915800
[   73.178843]  which belongs to the cache kmalloc-128 of size 128
[   73.179893] The buggy address is located 105 bytes inside of
[   73.179893]  128-byte region [ffff0000c5915800, ffff0000c5915880)
[   73.180586] 
[   73.180799] The buggy address belongs to the physical page:
[   73.181301] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   73.182357] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.183012] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.183675] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.184271] page dumped because: kasan: bad access detected
[   73.184670] 
[   73.184889] Memory state around the buggy address:
[   73.185334]  ffff0000c5915700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.186133]  ffff0000c5915780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.186752] >ffff0000c5915800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   73.187327]                                                                 ^
[   73.187918]  ffff0000c5915880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.188518]  ffff0000c5915900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.189081] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   73.121147] ==================================================================
[   73.122270] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xd0/0x200
[   73.123404] Write of size 8 at addr ffff0000c5916f71 by task kunit_try_catch/139
[   73.124335] 
[   73.124547] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.125081] Hardware name: linux,dummy-virt (DT)
[   73.125418] Call trace:
[   73.125926]  dump_backtrace.part.0+0xdc/0xf0
[   73.126744]  show_stack+0x18/0x30
[   73.127358]  dump_stack_lvl+0x64/0x80
[   73.127982]  print_report+0x158/0x438
[   73.128610]  kasan_report+0xb4/0xf4
[   73.129178]  kasan_check_range+0xe4/0x190
[   73.129850]  memset+0x40/0x70
[   73.130463]  kmalloc_oob_memset_8+0xd0/0x200
[   73.131141]  kunit_try_run_case+0x84/0x120
[   73.131802]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.132579]  kthread+0x180/0x190
[   73.133098]  ret_from_fork+0x10/0x20
[   73.133665] 
[   73.133994] Allocated by task 139:
[   73.134557]  kasan_save_stack+0x3c/0x70
[   73.135213]  kasan_set_track+0x2c/0x40
[   73.135858]  kasan_save_alloc_info+0x24/0x34
[   73.136513]  __kasan_kmalloc+0xb8/0xc0
[   73.137065]  kmalloc_trace+0x58/0x6c
[   73.137640]  kmalloc_oob_memset_8+0x98/0x200
[   73.138321]  kunit_try_run_case+0x84/0x120
[   73.139010]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.139786]  kthread+0x180/0x190
[   73.140171]  ret_from_fork+0x10/0x20
[   73.140522] 
[   73.140687] The buggy address belongs to the object at ffff0000c5916f00
[   73.140687]  which belongs to the cache kmalloc-128 of size 128
[   73.141368] The buggy address is located 113 bytes inside of
[   73.141368]  128-byte region [ffff0000c5916f00, ffff0000c5916f80)
[   73.142913] 
[   73.143207] The buggy address belongs to the physical page:
[   73.143975] page:00000000a76cf208 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916
[   73.145069] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.146002] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.147061] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.147986] page dumped because: kasan: bad access detected
[   73.148660] 
[   73.148934] Memory state around the buggy address:
[   73.149552]  ffff0000c5916e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.150553]  ffff0000c5916e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.151540] >ffff0000c5916f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   73.152380]                                                                 ^
[   73.153165]  ffff0000c5916f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.153641]  ffff0000c5917000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.154618] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   73.089956] ==================================================================
[   73.091443] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xd0/0x200
[   73.092116] Write of size 4 at addr ffff0000c5916e75 by task kunit_try_catch/138
[   73.092766] 
[   73.093088] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.093812] Hardware name: linux,dummy-virt (DT)
[   73.094662] Call trace:
[   73.094905]  dump_backtrace.part.0+0xdc/0xf0
[   73.095402]  show_stack+0x18/0x30
[   73.095865]  dump_stack_lvl+0x64/0x80
[   73.096326]  print_report+0x158/0x438
[   73.096765]  kasan_report+0xb4/0xf4
[   73.097143]  kasan_check_range+0xe4/0x190
[   73.097587]  memset+0x40/0x70
[   73.097999]  kmalloc_oob_memset_4+0xd0/0x200
[   73.098540]  kunit_try_run_case+0x84/0x120
[   73.099012]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.099579]  kthread+0x180/0x190
[   73.099952]  ret_from_fork+0x10/0x20
[   73.100344] 
[   73.100800] Allocated by task 138:
[   73.101126]  kasan_save_stack+0x3c/0x70
[   73.101536]  kasan_set_track+0x2c/0x40
[   73.102091]  kasan_save_alloc_info+0x24/0x34
[   73.102541]  __kasan_kmalloc+0xb8/0xc0
[   73.102945]  kmalloc_trace+0x58/0x6c
[   73.103361]  kmalloc_oob_memset_4+0x98/0x200
[   73.103863]  kunit_try_run_case+0x84/0x120
[   73.104306]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.105011]  kthread+0x180/0x190
[   73.105378]  ret_from_fork+0x10/0x20
[   73.105787] 
[   73.106175] The buggy address belongs to the object at ffff0000c5916e00
[   73.106175]  which belongs to the cache kmalloc-128 of size 128
[   73.107107] The buggy address is located 117 bytes inside of
[   73.107107]  128-byte region [ffff0000c5916e00, ffff0000c5916e80)
[   73.108003] 
[   73.108174] The buggy address belongs to the physical page:
[   73.108806] page:00000000a76cf208 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916
[   73.109575] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.110499] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.111143] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.111754] page dumped because: kasan: bad access detected
[   73.112173] 
[   73.112377] Memory state around the buggy address:
[   73.112758]  ffff0000c5916d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.113389]  ffff0000c5916d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.114020] >ffff0000c5916e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   73.114565]                                                                 ^
[   73.115118]  ffff0000c5916e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.115698]  ffff0000c5916f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.116263] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   73.053373] ==================================================================
[   73.054926] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xd0/0x200
[   73.055941] Write of size 2 at addr ffff0000c5915177 by task kunit_try_catch/137
[   73.056682] 
[   73.056875] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.057429] Hardware name: linux,dummy-virt (DT)
[   73.058031] Call trace:
[   73.058504]  dump_backtrace.part.0+0xdc/0xf0
[   73.059205]  show_stack+0x18/0x30
[   73.059795]  dump_stack_lvl+0x64/0x80
[   73.060381]  print_report+0x158/0x438
[   73.060986]  kasan_report+0xb4/0xf4
[   73.061547]  kasan_check_range+0xe4/0x190
[   73.062246]  memset+0x40/0x70
[   73.062794]  kmalloc_oob_memset_2+0xd0/0x200
[   73.063456]  kunit_try_run_case+0x84/0x120
[   73.064088]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.064845]  kthread+0x180/0x190
[   73.065224]  ret_from_fork+0x10/0x20
[   73.065578] 
[   73.065777] Allocated by task 137:
[   73.066266]  kasan_save_stack+0x3c/0x70
[   73.066860]  kasan_set_track+0x2c/0x40
[   73.067391]  kasan_save_alloc_info+0x24/0x34
[   73.068021]  __kasan_kmalloc+0xb8/0xc0
[   73.068563]  kmalloc_trace+0x58/0x6c
[   73.069105]  kmalloc_oob_memset_2+0x98/0x200
[   73.069739]  kunit_try_run_case+0x84/0x120
[   73.070442]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.071273]  kthread+0x180/0x190
[   73.071734]  ret_from_fork+0x10/0x20
[   73.072071] 
[   73.072238] The buggy address belongs to the object at ffff0000c5915100
[   73.072238]  which belongs to the cache kmalloc-128 of size 128
[   73.072940] The buggy address is located 119 bytes inside of
[   73.072940]  128-byte region [ffff0000c5915100, ffff0000c5915180)
[   73.073872] 
[   73.074142] The buggy address belongs to the physical page:
[   73.074989] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   73.076221] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.077200] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.078229] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.079250] page dumped because: kasan: bad access detected
[   73.079922] 
[   73.080174] Memory state around the buggy address:
[   73.080782]  ffff0000c5915000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.081625]  ffff0000c5915080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.082467] >ffff0000c5915100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   73.083275]                                                                 ^
[   73.084112]  ffff0000c5915180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.084953]  ffff0000c5915200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.085768] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   73.014362] ==================================================================
[   73.015734] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xcc/0x1f0
[   73.016373] Write of size 128 at addr ffff0000c5915000 by task kunit_try_catch/136
[   73.016859] 
[   73.017043] CPU: 0 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.017590] Hardware name: linux,dummy-virt (DT)
[   73.018468] Call trace:
[   73.019370]  dump_backtrace.part.0+0xdc/0xf0
[   73.020176]  show_stack+0x18/0x30
[   73.020981]  dump_stack_lvl+0x64/0x80
[   73.021436]  print_report+0x158/0x438
[   73.021850]  kasan_report+0xb4/0xf4
[   73.022278]  kasan_check_range+0xe4/0x190
[   73.023390]  memset+0x40/0x70
[   73.023753]  kmalloc_oob_in_memset+0xcc/0x1f0
[   73.024165]  kunit_try_run_case+0x84/0x120
[   73.024570]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.025033]  kthread+0x180/0x190
[   73.025352]  ret_from_fork+0x10/0x20
[   73.026429] 
[   73.026903] Allocated by task 136:
[   73.027525]  kasan_save_stack+0x3c/0x70
[   73.028299]  kasan_set_track+0x2c/0x40
[   73.029054]  kasan_save_alloc_info+0x24/0x34
[   73.029933]  __kasan_kmalloc+0xb8/0xc0
[   73.030675]  kmalloc_trace+0x58/0x6c
[   73.031444]  kmalloc_oob_in_memset+0x98/0x1f0
[   73.032259]  kunit_try_run_case+0x84/0x120
[   73.033014]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   73.033917]  kthread+0x180/0x190
[   73.034610]  ret_from_fork+0x10/0x20
[   73.035267] 
[   73.035586] The buggy address belongs to the object at ffff0000c5915000
[   73.035586]  which belongs to the cache kmalloc-128 of size 128
[   73.037005] The buggy address is located 0 bytes inside of
[   73.037005]  128-byte region [ffff0000c5915000, ffff0000c5915080)
[   73.038490] 
[   73.038829] The buggy address belongs to the physical page:
[   73.039595] page:0000000033330a0d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105915
[   73.040701] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.041422] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.042359] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.043241] page dumped because: kasan: bad access detected
[   73.043891] 
[   73.044142] Memory state around the buggy address:
[   73.044584]  ffff0000c5914f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.045050]  ffff0000c5914f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.045603] >ffff0000c5915000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   73.046578]                                                                 ^
[   73.047494]  ffff0000c5915080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.048443]  ffff0000c5915100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.049340] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   72.356152] ==================================================================
[   72.356952] BUG: KASAN: invalid-free in kfree+0x74/0x80
[   72.357443] Free of addr ffff0000c5a04001 by task kunit_try_catch/125
[   72.358499] 
[   72.358865] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.360061] Hardware name: linux,dummy-virt (DT)
[   72.360726] Call trace:
[   72.361108]  dump_backtrace.part.0+0xdc/0xf0
[   72.361820]  show_stack+0x18/0x30
[   72.362458]  dump_stack_lvl+0x64/0x80
[   72.363031]  print_report+0x158/0x438
[   72.363621]  kasan_report_invalid_free+0x9c/0xc0
[   72.364267]  __kasan_kfree_large+0x54/0xa0
[   72.364871]  free_large_kmalloc+0x5c/0xf0
[   72.365464]  kfree+0x74/0x80
[   72.365824]  kmalloc_pagealloc_invalid_free+0xa0/0x1b0
[   72.366642]  kunit_try_run_case+0x84/0x120
[   72.367317]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.368159]  kthread+0x180/0x190
[   72.368674]  ret_from_fork+0x10/0x20
[   72.369220] 
[   72.369475] The buggy address belongs to the physical page:
[   72.369848] page:00000000275a55ef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a04
[   72.370419] head:00000000275a55ef order:2 compound_mapcount:0 compound_pincount:0
[   72.370876] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.371432] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.372558] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.373600] page dumped because: kasan: bad access detected
[   72.374429] 
[   72.374715] Memory state around the buggy address:
[   72.375425]  ffff0000c5a03f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.376418]  ffff0000c5a03f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.377323] >ffff0000c5a04000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.378249]                    ^
[   72.378817]  ffff0000c5a04080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.379840]  ffff0000c5a04100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.380720] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_16
[   72.967443] ==================================================================
[   72.968303] BUG: KASAN: use-after-free in kmalloc_uaf_16+0xfc/0x290
[   72.968955] Read of size 16 at addr ffff0000c5952f00 by task kunit_try_catch/135
[   72.969478] 
[   72.969663] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.970979] Hardware name: linux,dummy-virt (DT)
[   72.971604] Call trace:
[   72.971981]  dump_backtrace.part.0+0xdc/0xf0
[   72.972673]  show_stack+0x18/0x30
[   72.973235]  dump_stack_lvl+0x64/0x80
[   72.973866]  print_report+0x158/0x438
[   72.974521]  kasan_report+0xb4/0xf4
[   72.975055]  __asan_load16+0x68/0x9c
[   72.975406]  kmalloc_uaf_16+0xfc/0x290
[   72.975779]  kunit_try_run_case+0x84/0x120
[   72.976157]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.976891]  kthread+0x180/0x190
[   72.977413]  ret_from_fork+0x10/0x20
[   72.978193] 
[   72.978484] Allocated by task 135:
[   72.979020]  kasan_save_stack+0x3c/0x70
[   72.979623]  kasan_set_track+0x2c/0x40
[   72.980190]  kasan_save_alloc_info+0x24/0x34
[   72.980839]  __kasan_kmalloc+0xb8/0xc0
[   72.981406]  kmalloc_trace+0x58/0x6c
[   72.982058]  kmalloc_uaf_16+0xc4/0x290
[   72.982739]  kunit_try_run_case+0x84/0x120
[   72.983362]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.984143]  kthread+0x180/0x190
[   72.984662]  ret_from_fork+0x10/0x20
[   72.985223] 
[   72.985512] Freed by task 135:
[   72.986045]  kasan_save_stack+0x3c/0x70
[   72.986809]  kasan_set_track+0x2c/0x40
[   72.987389]  kasan_save_free_info+0x38/0x5c
[   72.988039]  __kasan_slab_free+0xe4/0x150
[   72.988662]  __kmem_cache_free+0x130/0x2a4
[   72.989208]  kfree+0x58/0x80
[   72.989537]  kmalloc_uaf_16+0xe4/0x290
[   72.990176]  kunit_try_run_case+0x84/0x120
[   72.990907]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.991696]  kthread+0x180/0x190
[   72.992301]  ret_from_fork+0x10/0x20
[   72.992951] 
[   72.993217] The buggy address belongs to the object at ffff0000c5952f00
[   72.993217]  which belongs to the cache kmalloc-128 of size 128
[   72.994838] The buggy address is located 0 bytes inside of
[   72.994838]  128-byte region [ffff0000c5952f00, ffff0000c5952f80)
[   72.996791] 
[   72.996989] The buggy address belongs to the physical page:
[   72.997525] page:000000000a751a16 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105952
[   72.998747] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   72.999285] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   72.999802] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.000253] page dumped because: kasan: bad access detected
[   73.001220] 
[   73.001571] Memory state around the buggy address:
[   73.002479]  ffff0000c5952e00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.003361]  ffff0000c5952e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.004262] >ffff0000c5952f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.005241]                    ^
[   73.006015]  ffff0000c5952f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.007045]  ffff0000c5953000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.007909] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   72.932298] ==================================================================
[   72.933147] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf0/0x290
[   72.933764] Write of size 16 at addr ffff0000c5952c00 by task kunit_try_catch/134
[   72.934441] 
[   72.934682] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.935305] Hardware name: linux,dummy-virt (DT)
[   72.936510] Call trace:
[   72.936751]  dump_backtrace.part.0+0xdc/0xf0
[   72.937185]  show_stack+0x18/0x30
[   72.937558]  dump_stack_lvl+0x64/0x80
[   72.938643]  print_report+0x158/0x438
[   72.939331]  kasan_report+0xb4/0xf4
[   72.939922]  __asan_store16+0x68/0x94
[   72.940513]  kmalloc_oob_16+0xf0/0x290
[   72.941144]  kunit_try_run_case+0x84/0x120
[   72.941850]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.942738]  kthread+0x180/0x190
[   72.943283]  ret_from_fork+0x10/0x20
[   72.943897] 
[   72.944171] Allocated by task 134:
[   72.944657]  kasan_save_stack+0x3c/0x70
[   72.945255]  kasan_set_track+0x2c/0x40
[   72.945878]  kasan_save_alloc_info+0x24/0x34
[   72.946594]  __kasan_kmalloc+0xb8/0xc0
[   72.947170]  kmalloc_trace+0x58/0x6c
[   72.947759]  kmalloc_oob_16+0x9c/0x290
[   72.948368]  kunit_try_run_case+0x84/0x120
[   72.949014]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.949811]  kthread+0x180/0x190
[   72.950459]  ret_from_fork+0x10/0x20
[   72.951039] 
[   72.951257] The buggy address belongs to the object at ffff0000c5952c00
[   72.951257]  which belongs to the cache kmalloc-128 of size 128
[   72.952140] The buggy address is located 0 bytes inside of
[   72.952140]  128-byte region [ffff0000c5952c00, ffff0000c5952c80)
[   72.953345] 
[   72.953624] The buggy address belongs to the physical page:
[   72.954448] page:000000000a751a16 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105952
[   72.955678] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   72.956720] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   72.957666] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.958677] page dumped because: kasan: bad access detected
[   72.959383] 
[   72.959637] Memory state around the buggy address:
[   72.960328]  ffff0000c5952b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   72.960993]  ffff0000c5952b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.961473] >ffff0000c5952c00: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.962373]                       ^
[   72.962867]  ffff0000c5952c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.963330]  ffff0000c5952d00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.963867] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-krealloc_uaf
[   72.896921] ==================================================================
[   72.897455] BUG: KASAN: use-after-free in krealloc_uaf+0x104/0x2f0
[   72.898165] Read of size 1 at addr ffff0000c55e6400 by task kunit_try_catch/133
[   72.898789] 
[   72.899129] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.899920] Hardware name: linux,dummy-virt (DT)
[   72.900305] Call trace:
[   72.901161]  dump_backtrace.part.0+0xdc/0xf0
[   72.901691]  show_stack+0x18/0x30
[   72.902554]  dump_stack_lvl+0x64/0x80
[   72.902978]  print_report+0x158/0x438
[   72.903425]  kasan_report+0xb4/0xf4
[   72.903853]  __asan_load1+0x68/0x74
[   72.904261]  krealloc_uaf+0x104/0x2f0
[   72.904705]  kunit_try_run_case+0x84/0x120
[   72.905162]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.905696]  kthread+0x180/0x190
[   72.906229]  ret_from_fork+0x10/0x20
[   72.906658] 
[   72.906868] Allocated by task 133:
[   72.907217]  kasan_save_stack+0x3c/0x70
[   72.907649]  kasan_set_track+0x2c/0x40
[   72.908056]  kasan_save_alloc_info+0x24/0x34
[   72.908547]  __kasan_kmalloc+0xb8/0xc0
[   72.908985]  kmalloc_trace+0x58/0x6c
[   72.909405]  krealloc_uaf+0xa8/0x2f0
[   72.909987]  kunit_try_run_case+0x84/0x120
[   72.910438]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.910963]  kthread+0x180/0x190
[   72.911342]  ret_from_fork+0x10/0x20
[   72.911758] 
[   72.911944] Freed by task 133:
[   72.912267]  kasan_save_stack+0x3c/0x70
[   72.912679]  kasan_set_track+0x2c/0x40
[   72.913063]  kasan_save_free_info+0x38/0x5c
[   72.913528]  __kasan_slab_free+0xe4/0x150
[   72.914598]  __kmem_cache_free+0x130/0x2a4
[   72.915066]  kfree+0x58/0x80
[   72.915448]  krealloc_uaf+0xc8/0x2f0
[   72.915881]  kunit_try_run_case+0x84/0x120
[   72.916339]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.916871]  kthread+0x180/0x190
[   72.917256]  ret_from_fork+0x10/0x20
[   72.917682] 
[   72.917897] The buggy address belongs to the object at ffff0000c55e6400
[   72.917897]  which belongs to the cache kmalloc-256 of size 256
[   72.918820] The buggy address is located 0 bytes inside of
[   72.918820]  256-byte region [ffff0000c55e6400, ffff0000c55e6500)
[   72.919695] 
[   72.919901] The buggy address belongs to the physical page:
[   72.920351] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.921298] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.922044] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.922762] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.923432] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.924084] page dumped because: kasan: bad access detected
[   72.924533] 
[   72.924729] Memory state around the buggy address:
[   72.925139]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.925733]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.926333] >ffff0000c55e6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.927079]                    ^
[   72.927435]  ffff0000c55e6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.928028]  ffff0000c55e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.928611] ==================================================================
[   72.860314] ==================================================================
[   72.861222] BUG: KASAN: use-after-free in krealloc_uaf+0xe0/0x2f0
[   72.861845] Read of size 1 at addr ffff0000c55e6400 by task kunit_try_catch/133
[   72.862376] 
[   72.862621] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.863275] Hardware name: linux,dummy-virt (DT)
[   72.863911] Call trace:
[   72.864180]  dump_backtrace.part.0+0xdc/0xf0
[   72.864712]  show_stack+0x18/0x30
[   72.865117]  dump_stack_lvl+0x64/0x80
[   72.865611]  print_report+0x158/0x438
[   72.866205]  kasan_report+0xb4/0xf4
[   72.866635]  __kasan_check_byte+0x54/0x70
[   72.867062]  krealloc+0xe0/0x1a0
[   72.867457]  krealloc_uaf+0xe0/0x2f0
[   72.867898]  kunit_try_run_case+0x84/0x120
[   72.868362]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.868948]  kthread+0x180/0x190
[   72.869344]  ret_from_fork+0x10/0x20
[   72.869816] 
[   72.870034] Allocated by task 133:
[   72.870345]  kasan_save_stack+0x3c/0x70
[   72.870760]  kasan_set_track+0x2c/0x40
[   72.871175]  kasan_save_alloc_info+0x24/0x34
[   72.871786]  __kasan_kmalloc+0xb8/0xc0
[   72.872203]  kmalloc_trace+0x58/0x6c
[   72.872642]  krealloc_uaf+0xa8/0x2f0
[   72.873078]  kunit_try_run_case+0x84/0x120
[   72.873557]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.874255]  kthread+0x180/0x190
[   72.874662]  ret_from_fork+0x10/0x20
[   72.875072] 
[   72.875301] Freed by task 133:
[   72.875636]  kasan_save_stack+0x3c/0x70
[   72.876061]  kasan_set_track+0x2c/0x40
[   72.876480]  kasan_save_free_info+0x38/0x5c
[   72.876922]  __kasan_slab_free+0xe4/0x150
[   72.877349]  __kmem_cache_free+0x130/0x2a4
[   72.877883]  kfree+0x58/0x80
[   72.878248]  krealloc_uaf+0xc8/0x2f0
[   72.878677]  kunit_try_run_case+0x84/0x120
[   72.879124]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.879959]  kthread+0x180/0x190
[   72.880363]  ret_from_fork+0x10/0x20
[   72.880799] 
[   72.880976] The buggy address belongs to the object at ffff0000c55e6400
[   72.880976]  which belongs to the cache kmalloc-256 of size 256
[   72.882242] The buggy address is located 0 bytes inside of
[   72.882242]  256-byte region [ffff0000c55e6400, ffff0000c55e6500)
[   72.883101] 
[   72.883294] The buggy address belongs to the physical page:
[   72.883766] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.884732] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.885412] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.886307] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.887097] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.887828] page dumped because: kasan: bad access detected
[   72.888344] 
[   72.888642] Memory state around the buggy address:
[   72.889176]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.889923]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.890764] >ffff0000c55e6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.891332]                    ^
[   72.891692]  ffff0000c55e6480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.892271]  ffff0000c55e6500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.892827] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   72.795260] ==================================================================
[   72.795800] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x180/0x5b0
[   72.796872] Write of size 1 at addr ffff0000c5a360da by task kunit_try_catch/132
[   72.797462] 
[   72.797664] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.798841] Hardware name: linux,dummy-virt (DT)
[   72.799231] Call trace:
[   72.799494]  dump_backtrace.part.0+0xdc/0xf0
[   72.800029]  show_stack+0x18/0x30
[   72.800452]  dump_stack_lvl+0x64/0x80
[   72.800905]  print_report+0x158/0x438
[   72.801339]  kasan_report+0xb4/0xf4
[   72.801737]  __asan_store1+0x68/0x7c
[   72.802124]  krealloc_less_oob_helper+0x180/0x5b0
[   72.802917]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.803460]  kunit_try_run_case+0x84/0x120
[   72.803932]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.804481]  kthread+0x180/0x190
[   72.804847]  ret_from_fork+0x10/0x20
[   72.805243] 
[   72.805436] The buggy address belongs to the physical page:
[   72.806378] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.807109] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.807712] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.808357] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.809007] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.809598] page dumped because: kasan: bad access detected
[   72.810106] 
[   72.810314] Memory state around the buggy address:
[   72.810762]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.811364]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.811973] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.812814]                                                     ^
[   72.813310]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.814384]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.814930] ==================================================================
[   72.815645] ==================================================================
[   72.816115] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5b0
[   72.816905] Write of size 1 at addr ffff0000c5a360ea by task kunit_try_catch/132
[   72.817508] 
[   72.817696] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.818628] Hardware name: linux,dummy-virt (DT)
[   72.819017] Call trace:
[   72.819313]  dump_backtrace.part.0+0xdc/0xf0
[   72.819832]  show_stack+0x18/0x30
[   72.820287]  dump_stack_lvl+0x64/0x80
[   72.820736]  print_report+0x158/0x438
[   72.821173]  kasan_report+0xb4/0xf4
[   72.821577]  __asan_store1+0x68/0x7c
[   72.822574]  krealloc_less_oob_helper+0x1a8/0x5b0
[   72.823078]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.823573]  kunit_try_run_case+0x84/0x120
[   72.824041]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.824653]  kthread+0x180/0x190
[   72.825024]  ret_from_fork+0x10/0x20
[   72.825439] 
[   72.825614] The buggy address belongs to the physical page:
[   72.826424] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.827150] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.827760] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.828430] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.829109] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.829722] page dumped because: kasan: bad access detected
[   72.830709] 
[   72.830899] Memory state around the buggy address:
[   72.831332]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.831940]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.832548] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.833099]                                                           ^
[   72.833651]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.834542]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.835107] ==================================================================
[   72.744269] ==================================================================
[   72.745740] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x10c/0x5b0
[   72.747075] Write of size 1 at addr ffff0000c5a360c9 by task kunit_try_catch/132
[   72.747572] 
[   72.747762] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.748297] Hardware name: linux,dummy-virt (DT)
[   72.749065] Call trace:
[   72.749726]  dump_backtrace.part.0+0xdc/0xf0
[   72.750622]  show_stack+0x18/0x30
[   72.751346]  dump_stack_lvl+0x64/0x80
[   72.752049]  print_report+0x158/0x438
[   72.752792]  kasan_report+0xb4/0xf4
[   72.753454]  __asan_store1+0x68/0x7c
[   72.754175]  krealloc_less_oob_helper+0x10c/0x5b0
[   72.755114]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.755961]  kunit_try_run_case+0x84/0x120
[   72.756699]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.757570]  kthread+0x180/0x190
[   72.758112]  ret_from_fork+0x10/0x20
[   72.758856] 
[   72.759237] The buggy address belongs to the physical page:
[   72.759642] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.760213] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.761298] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.762406] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.763572] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.764505] page dumped because: kasan: bad access detected
[   72.765201] 
[   72.765514] Memory state around the buggy address:
[   72.766220]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.767333]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.768450] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.769425]                                               ^
[   72.770187]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.771281]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.772284] ==================================================================
[   72.566922] ==================================================================
[   72.567869] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x138/0x5b0
[   72.568933] Write of size 1 at addr ffff0000c55e62d0 by task kunit_try_catch/130
[   72.570108] 
[   72.570426] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.571817] Hardware name: linux,dummy-virt (DT)
[   72.572428] Call trace:
[   72.572809]  dump_backtrace.part.0+0xdc/0xf0
[   72.573513]  show_stack+0x18/0x30
[   72.574493]  dump_stack_lvl+0x64/0x80
[   72.575089]  print_report+0x158/0x438
[   72.575709]  kasan_report+0xb4/0xf4
[   72.576263]  __asan_store1+0x68/0x7c
[   72.576823]  krealloc_less_oob_helper+0x138/0x5b0
[   72.577533]  krealloc_less_oob+0x18/0x2c
[   72.578366]  kunit_try_run_case+0x84/0x120
[   72.579525]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.580127]  kthread+0x180/0x190
[   72.580456]  ret_from_fork+0x10/0x20
[   72.580800] 
[   72.580964] Allocated by task 130:
[   72.581227]  kasan_save_stack+0x3c/0x70
[   72.581800]  kasan_set_track+0x2c/0x40
[   72.582583]  kasan_save_alloc_info+0x24/0x34
[   72.583292]  __kasan_krealloc+0xf0/0x120
[   72.583961]  krealloc+0x154/0x1a0
[   72.584517]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.585220]  krealloc_less_oob+0x18/0x2c
[   72.585867]  kunit_try_run_case+0x84/0x120
[   72.586592]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.587547]  kthread+0x180/0x190
[   72.588101]  ret_from_fork+0x10/0x20
[   72.588666] 
[   72.588945] The buggy address belongs to the object at ffff0000c55e6200
[   72.588945]  which belongs to the cache kmalloc-256 of size 256
[   72.590472] The buggy address is located 208 bytes inside of
[   72.590472]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.591928] 
[   72.592232] The buggy address belongs to the physical page:
[   72.592597] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.593146] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.593962] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.595067] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.596056] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.596979] page dumped because: kasan: bad access detected
[   72.597679] 
[   72.598029] Memory state around the buggy address:
[   72.598799]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.599708]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.600592] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.601242]                                                  ^
[   72.601632]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.602499]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.603003] ==================================================================
[   72.604176] ==================================================================
[   72.605072] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x180/0x5b0
[   72.606173] Write of size 1 at addr ffff0000c55e62da by task kunit_try_catch/130
[   72.607107] 
[   72.607292] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.607839] Hardware name: linux,dummy-virt (DT)
[   72.608148] Call trace:
[   72.608359]  dump_backtrace.part.0+0xdc/0xf0
[   72.609113]  show_stack+0x18/0x30
[   72.609689]  dump_stack_lvl+0x64/0x80
[   72.610318]  print_report+0x158/0x438
[   72.610975]  kasan_report+0xb4/0xf4
[   72.611665]  __asan_store1+0x68/0x7c
[   72.612233]  krealloc_less_oob_helper+0x180/0x5b0
[   72.612952]  krealloc_less_oob+0x18/0x2c
[   72.613589]  kunit_try_run_case+0x84/0x120
[   72.614271]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.615248]  kthread+0x180/0x190
[   72.615811]  ret_from_fork+0x10/0x20
[   72.616377] 
[   72.616665] Allocated by task 130:
[   72.617139]  kasan_save_stack+0x3c/0x70
[   72.617735]  kasan_set_track+0x2c/0x40
[   72.618389]  kasan_save_alloc_info+0x24/0x34
[   72.619055]  __kasan_krealloc+0xf0/0x120
[   72.619660]  krealloc+0x154/0x1a0
[   72.620236]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.620949]  krealloc_less_oob+0x18/0x2c
[   72.621589]  kunit_try_run_case+0x84/0x120
[   72.621990]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.622594]  kthread+0x180/0x190
[   72.623084]  ret_from_fork+0x10/0x20
[   72.623644] 
[   72.623867] The buggy address belongs to the object at ffff0000c55e6200
[   72.623867]  which belongs to the cache kmalloc-256 of size 256
[   72.624701] The buggy address is located 218 bytes inside of
[   72.624701]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.626072] 
[   72.626360] The buggy address belongs to the physical page:
[   72.627241] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.628347] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.629195] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.630179] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.631250] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.631879] page dumped because: kasan: bad access detected
[   72.632232] 
[   72.632404] Memory state around the buggy address:
[   72.632938]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.633575]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.634269] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.634818]                                                     ^
[   72.635288]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.635926]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.636978] ==================================================================
[   72.667172] ==================================================================
[   72.667836] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1cc/0x5b0
[   72.668581] Write of size 1 at addr ffff0000c55e62eb by task kunit_try_catch/130
[   72.669052] 
[   72.669235] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.670101] Hardware name: linux,dummy-virt (DT)
[   72.670627] Call trace:
[   72.671036]  dump_backtrace.part.0+0xdc/0xf0
[   72.671595]  show_stack+0x18/0x30
[   72.672078]  dump_stack_lvl+0x64/0x80
[   72.672527]  print_report+0x158/0x438
[   72.673012]  kasan_report+0xb4/0xf4
[   72.673427]  __asan_store1+0x68/0x7c
[   72.673840]  krealloc_less_oob_helper+0x1cc/0x5b0
[   72.674426]  krealloc_less_oob+0x18/0x2c
[   72.675009]  kunit_try_run_case+0x84/0x120
[   72.675478]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.676067]  kthread+0x180/0x190
[   72.676464]  ret_from_fork+0x10/0x20
[   72.676878] 
[   72.677085] Allocated by task 130:
[   72.677446]  kasan_save_stack+0x3c/0x70
[   72.677887]  kasan_set_track+0x2c/0x40
[   72.678294]  kasan_save_alloc_info+0x24/0x34
[   72.678875]  __kasan_krealloc+0xf0/0x120
[   72.679440]  krealloc+0x154/0x1a0
[   72.679861]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.680419]  krealloc_less_oob+0x18/0x2c
[   72.680868]  kunit_try_run_case+0x84/0x120
[   72.681347]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.681955]  kthread+0x180/0x190
[   72.682357]  ret_from_fork+0x10/0x20
[   72.682794] 
[   72.683019] The buggy address belongs to the object at ffff0000c55e6200
[   72.683019]  which belongs to the cache kmalloc-256 of size 256
[   72.683997] The buggy address is located 235 bytes inside of
[   72.683997]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.684974] 
[   72.685148] The buggy address belongs to the physical page:
[   72.685520] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.686453] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.687215] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.688079] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.688754] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.689367] page dumped because: kasan: bad access detected
[   72.689894] 
[   72.690087] Memory state around the buggy address:
[   72.690597]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.691240]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.691913] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.692522]                                                           ^
[   72.693072]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.693681]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.694411] ==================================================================
[   72.773183] ==================================================================
[   72.773837] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x138/0x5b0
[   72.774679] Write of size 1 at addr ffff0000c5a360d0 by task kunit_try_catch/132
[   72.775634] 
[   72.776013] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.776809] Hardware name: linux,dummy-virt (DT)
[   72.777144] Call trace:
[   72.777362]  dump_backtrace.part.0+0xdc/0xf0
[   72.778374]  show_stack+0x18/0x30
[   72.778797]  dump_stack_lvl+0x64/0x80
[   72.779284]  print_report+0x158/0x438
[   72.779856]  kasan_report+0xb4/0xf4
[   72.780332]  __asan_store1+0x68/0x7c
[   72.780823]  krealloc_less_oob_helper+0x138/0x5b0
[   72.781422]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.782052]  kunit_try_run_case+0x84/0x120
[   72.782619]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.783302]  kthread+0x180/0x190
[   72.783772]  ret_from_fork+0x10/0x20
[   72.784264] 
[   72.784577] The buggy address belongs to the physical page:
[   72.785106] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.785984] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.786551] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.787172] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.788049] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.788800] page dumped because: kasan: bad access detected
[   72.789351] 
[   72.789693] Memory state around the buggy address:
[   72.790311]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.790940]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.791717] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.792270]                                                  ^
[   72.792773]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.793363]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.794407] ==================================================================
[   72.530299] ==================================================================
[   72.531671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x10c/0x5b0
[   72.532738] Write of size 1 at addr ffff0000c55e62c9 by task kunit_try_catch/130
[   72.533646] 
[   72.534024] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.535224] Hardware name: linux,dummy-virt (DT)
[   72.535834] Call trace:
[   72.536237]  dump_backtrace.part.0+0xdc/0xf0
[   72.536955]  show_stack+0x18/0x30
[   72.537502]  dump_stack_lvl+0x64/0x80
[   72.537857]  print_report+0x158/0x438
[   72.538233]  kasan_report+0xb4/0xf4
[   72.538573]  __asan_store1+0x68/0x7c
[   72.538905]  krealloc_less_oob_helper+0x10c/0x5b0
[   72.539329]  krealloc_less_oob+0x18/0x2c
[   72.539990]  kunit_try_run_case+0x84/0x120
[   72.540792]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.541682]  kthread+0x180/0x190
[   72.542282]  ret_from_fork+0x10/0x20
[   72.542913] 
[   72.543192] Allocated by task 130:
[   72.543746]  kasan_save_stack+0x3c/0x70
[   72.544339]  kasan_set_track+0x2c/0x40
[   72.544920]  kasan_save_alloc_info+0x24/0x34
[   72.545561]  __kasan_krealloc+0xf0/0x120
[   72.546230]  krealloc+0x154/0x1a0
[   72.546837]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.547643]  krealloc_less_oob+0x18/0x2c
[   72.548300]  kunit_try_run_case+0x84/0x120
[   72.548937]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.549722]  kthread+0x180/0x190
[   72.550314]  ret_from_fork+0x10/0x20
[   72.550948] 
[   72.551271] The buggy address belongs to the object at ffff0000c55e6200
[   72.551271]  which belongs to the cache kmalloc-256 of size 256
[   72.552668] The buggy address is located 201 bytes inside of
[   72.552668]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.554033] 
[   72.554322] The buggy address belongs to the physical page:
[   72.555135] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.556312] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.557193] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.557977] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.559020] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.559706] page dumped because: kasan: bad access detected
[   72.560060] 
[   72.560222] Memory state around the buggy address:
[   72.560571]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.561032]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.561559] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.562523]                                               ^
[   72.563422]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.564411]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.565354] ==================================================================
[   72.835940] ==================================================================
[   72.836492] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1cc/0x5b0
[   72.837207] Write of size 1 at addr ffff0000c5a360eb by task kunit_try_catch/132
[   72.838460] 
[   72.838766] CPU: 0 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.839308] Hardware name: linux,dummy-virt (DT)
[   72.839814] Call trace:
[   72.840189]  dump_backtrace.part.0+0xdc/0xf0
[   72.840770]  show_stack+0x18/0x30
[   72.841130]  dump_stack_lvl+0x64/0x80
[   72.841490]  print_report+0x158/0x438
[   72.842286]  kasan_report+0xb4/0xf4
[   72.842784]  __asan_store1+0x68/0x7c
[   72.843177]  krealloc_less_oob_helper+0x1cc/0x5b0
[   72.843782]  krealloc_pagealloc_less_oob+0x18/0x24
[   72.844311]  kunit_try_run_case+0x84/0x120
[   72.844805]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.845265]  kthread+0x180/0x190
[   72.845642]  ret_from_fork+0x10/0x20
[   72.846695] 
[   72.846898] The buggy address belongs to the physical page:
[   72.847328] page:00000000172f0408 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a34
[   72.848122] head:00000000172f0408 order:2 compound_mapcount:0 compound_pincount:0
[   72.848754] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.849405] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.850050] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.850927] page dumped because: kasan: bad access detected
[   72.851384] 
[   72.851591] Memory state around the buggy address:
[   72.852023]  ffff0000c5a35f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.852658]  ffff0000c5a36000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.853219] >ffff0000c5a36080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   72.853792]                                                           ^
[   72.854890]  ffff0000c5a36100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.855500]  ffff0000c5a36180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.856052] ==================================================================
[   72.638069] ==================================================================
[   72.638621] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1a8/0x5b0
[   72.639360] Write of size 1 at addr ffff0000c55e62ea by task kunit_try_catch/130
[   72.640287] 
[   72.640508] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.641208] Hardware name: linux,dummy-virt (DT)
[   72.641585] Call trace:
[   72.642360]  dump_backtrace.part.0+0xdc/0xf0
[   72.642869]  show_stack+0x18/0x30
[   72.643288]  dump_stack_lvl+0x64/0x80
[   72.643738]  print_report+0x158/0x438
[   72.644177]  kasan_report+0xb4/0xf4
[   72.644578]  __asan_store1+0x68/0x7c
[   72.644957]  krealloc_less_oob_helper+0x1a8/0x5b0
[   72.645446]  krealloc_less_oob+0x18/0x2c
[   72.645964]  kunit_try_run_case+0x84/0x120
[   72.646431]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.646957]  kthread+0x180/0x190
[   72.647326]  ret_from_fork+0x10/0x20
[   72.647754] 
[   72.647932] Allocated by task 130:
[   72.648276]  kasan_save_stack+0x3c/0x70
[   72.648941]  kasan_set_track+0x2c/0x40
[   72.649350]  kasan_save_alloc_info+0x24/0x34
[   72.650294]  __kasan_krealloc+0xf0/0x120
[   72.650753]  krealloc+0x154/0x1a0
[   72.651138]  krealloc_less_oob_helper+0xd0/0x5b0
[   72.651623]  krealloc_less_oob+0x18/0x2c
[   72.652084]  kunit_try_run_case+0x84/0x120
[   72.652552]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.653059]  kthread+0x180/0x190
[   72.653435]  ret_from_fork+0x10/0x20
[   72.654133] 
[   72.654338] The buggy address belongs to the object at ffff0000c55e6200
[   72.654338]  which belongs to the cache kmalloc-256 of size 256
[   72.655230] The buggy address is located 234 bytes inside of
[   72.655230]  256-byte region [ffff0000c55e6200, ffff0000c55e6300)
[   72.656139] 
[   72.656322] The buggy address belongs to the physical page:
[   72.656759] page:0000000087736949 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055e6
[   72.657536] head:0000000087736949 order:1 compound_mapcount:0 compound_pincount:0
[   72.658945] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.659635] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.660275] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.660883] page dumped because: kasan: bad access detected
[   72.661323] 
[   72.661520] Memory state around the buggy address:
[   72.662002]  ffff0000c55e6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.662559]  ffff0000c55e6200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.663158] >ffff0000c55e6280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   72.664067]                                                           ^
[   72.664635]  ffff0000c55e6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.665248]  ffff0000c55e6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.665824] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   72.489703] ==================================================================
[   72.490576] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x160/0x370
[   72.491816] Write of size 1 at addr ffff0000c3c44ef0 by task kunit_try_catch/129
[   72.492718] 
[   72.492913] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.493460] Hardware name: linux,dummy-virt (DT)
[   72.493855] Call trace:
[   72.494432]  dump_backtrace.part.0+0xdc/0xf0
[   72.495181]  show_stack+0x18/0x30
[   72.495813]  dump_stack_lvl+0x64/0x80
[   72.496388]  print_report+0x158/0x438
[   72.496988]  kasan_report+0xb4/0xf4
[   72.497545]  __asan_store1+0x68/0x7c
[   72.498177]  krealloc_more_oob_helper+0x160/0x370
[   72.498975]  krealloc_more_oob+0x18/0x2c
[   72.499623]  kunit_try_run_case+0x84/0x120
[   72.500247]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.501023]  kthread+0x180/0x190
[   72.501553]  ret_from_fork+0x10/0x20
[   72.502207] 
[   72.502522] Allocated by task 129:
[   72.502995]  kasan_save_stack+0x3c/0x70
[   72.503592]  kasan_set_track+0x2c/0x40
[   72.504161]  kasan_save_alloc_info+0x24/0x34
[   72.504637]  __kasan_krealloc+0xf0/0x120
[   72.504985]  krealloc+0x154/0x1a0
[   72.505316]  krealloc_more_oob_helper+0xd0/0x370
[   72.505816]  krealloc_more_oob+0x18/0x2c
[   72.506325]  kunit_try_run_case+0x84/0x120
[   72.507053]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.507935]  kthread+0x180/0x190
[   72.508500]  ret_from_fork+0x10/0x20
[   72.509055] 
[   72.509337] The buggy address belongs to the object at ffff0000c3c44e00
[   72.509337]  which belongs to the cache kmalloc-256 of size 256
[   72.510988] The buggy address is located 240 bytes inside of
[   72.510988]  256-byte region [ffff0000c3c44e00, ffff0000c3c44f00)
[   72.511963] 
[   72.512141] The buggy address belongs to the physical page:
[   72.512623] page:000000003b9e76ea refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c44
[   72.513707] head:000000003b9e76ea order:1 compound_mapcount:0 compound_pincount:0
[   72.514747] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.515723] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.516669] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.517561] page dumped because: kasan: bad access detected
[   72.518035] 
[   72.518201] Memory state around the buggy address:
[   72.518548]  ffff0000c3c44d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.519293]  ffff0000c3c44e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.520075] >ffff0000c3c44e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   72.520750]                                                              ^
[   72.521183]  ffff0000c3c44f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.521655]  ffff0000c3c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.522685] ==================================================================
[   72.448326] ==================================================================
[   72.449087] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x134/0x370
[   72.449694] Write of size 1 at addr ffff0000c3c44eeb by task kunit_try_catch/129
[   72.451222] 
[   72.451679] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.452947] Hardware name: linux,dummy-virt (DT)
[   72.453727] Call trace:
[   72.454387]  dump_backtrace.part.0+0xdc/0xf0
[   72.455318]  show_stack+0x18/0x30
[   72.455994]  dump_stack_lvl+0x64/0x80
[   72.456735]  print_report+0x158/0x438
[   72.457515]  kasan_report+0xb4/0xf4
[   72.458274]  __asan_store1+0x68/0x7c
[   72.459009]  krealloc_more_oob_helper+0x134/0x370
[   72.459907]  krealloc_more_oob+0x18/0x2c
[   72.460701]  kunit_try_run_case+0x84/0x120
[   72.461497]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.462671]  kthread+0x180/0x190
[   72.463303]  ret_from_fork+0x10/0x20
[   72.463856] 
[   72.464035] Allocated by task 129:
[   72.464305]  kasan_save_stack+0x3c/0x70
[   72.465222]  kasan_set_track+0x2c/0x40
[   72.465951]  kasan_save_alloc_info+0x24/0x34
[   72.466864]  __kasan_krealloc+0xf0/0x120
[   72.467635]  krealloc+0x154/0x1a0
[   72.468365]  krealloc_more_oob_helper+0xd0/0x370
[   72.469318]  krealloc_more_oob+0x18/0x2c
[   72.470355]  kunit_try_run_case+0x84/0x120
[   72.471675]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.472920]  kthread+0x180/0x190
[   72.474869]  ret_from_fork+0x10/0x20
[   72.475253] 
[   72.475441] The buggy address belongs to the object at ffff0000c3c44e00
[   72.475441]  which belongs to the cache kmalloc-256 of size 256
[   72.476322] The buggy address is located 235 bytes inside of
[   72.476322]  256-byte region [ffff0000c3c44e00, ffff0000c3c44f00)
[   72.477123] 
[   72.477312] The buggy address belongs to the physical page:
[   72.478576] page:000000003b9e76ea refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c44
[   72.479550] head:000000003b9e76ea order:1 compound_mapcount:0 compound_pincount:0
[   72.480131] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.480879] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   72.481544] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.482297] page dumped because: kasan: bad access detected
[   72.482797] 
[   72.482973] Memory state around the buggy address:
[   72.483426]  ffff0000c3c44d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.484072]  ffff0000c3c44e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.484691] >ffff0000c3c44e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   72.485257]                                                           ^
[   72.485809]  ffff0000c3c44f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.486391]  ffff0000c3c44f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.487286] ==================================================================
[   72.718881] ==================================================================
[   72.719511] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x160/0x370
[   72.720335] Write of size 1 at addr ffff0000c5a320f0 by task kunit_try_catch/131
[   72.720948] 
[   72.721191] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.721974] Hardware name: linux,dummy-virt (DT)
[   72.722476] Call trace:
[   72.722775]  dump_backtrace.part.0+0xdc/0xf0
[   72.723314]  show_stack+0x18/0x30
[   72.723809]  dump_stack_lvl+0x64/0x80
[   72.724253]  print_report+0x158/0x438
[   72.724791]  kasan_report+0xb4/0xf4
[   72.725219]  __asan_store1+0x68/0x7c
[   72.725623]  krealloc_more_oob_helper+0x160/0x370
[   72.726152]  krealloc_pagealloc_more_oob+0x18/0x24
[   72.726694]  kunit_try_run_case+0x84/0x120
[   72.727175]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.727750]  kthread+0x180/0x190
[   72.728141]  ret_from_fork+0x10/0x20
[   72.728550] 
[   72.728757] The buggy address belongs to the physical page:
[   72.729234] page:00000000a668a8fd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a30
[   72.730350] head:00000000a668a8fd order:2 compound_mapcount:0 compound_pincount:0
[   72.730841] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.731356] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.732441] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.733155] page dumped because: kasan: bad access detected
[   72.733532] 
[   72.733699] Memory state around the buggy address:
[   72.734544]  ffff0000c5a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.736115]  ffff0000c5a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.737146] >ffff0000c5a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   72.737608]                                                              ^
[   72.738664]  ffff0000c5a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.739499]  ffff0000c5a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.740286] ==================================================================
[   72.698851] ==================================================================
[   72.699728] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x134/0x370
[   72.700419] Write of size 1 at addr ffff0000c5a320eb by task kunit_try_catch/131
[   72.701074] 
[   72.701324] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.702104] Hardware name: linux,dummy-virt (DT)
[   72.702585] Call trace:
[   72.702826]  dump_backtrace.part.0+0xdc/0xf0
[   72.703410]  show_stack+0x18/0x30
[   72.703907]  dump_stack_lvl+0x64/0x80
[   72.704361]  print_report+0x158/0x438
[   72.704836]  kasan_report+0xb4/0xf4
[   72.705227]  __asan_store1+0x68/0x7c
[   72.705675]  krealloc_more_oob_helper+0x134/0x370
[   72.706277]  krealloc_pagealloc_more_oob+0x18/0x24
[   72.706916]  kunit_try_run_case+0x84/0x120
[   72.707376]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.707965]  kthread+0x180/0x190
[   72.708372]  ret_from_fork+0x10/0x20
[   72.708813] 
[   72.709056] The buggy address belongs to the physical page:
[   72.709571] page:00000000a668a8fd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a30
[   72.710321] head:00000000a668a8fd order:2 compound_mapcount:0 compound_pincount:0
[   72.710955] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.711639] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.712301] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.712916] page dumped because: kasan: bad access detected
[   72.713402] 
[   72.713597] Memory state around the buggy address:
[   72.714101]  ffff0000c5a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.714763]  ffff0000c5a32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.715346] >ffff0000c5a32080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   72.716009]                                                           ^
[   72.716588]  ffff0000c5a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.717269]  ffff0000c5a32180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.717889] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   72.413249] ==================================================================
[   72.414217] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xc0/0x1f0
[   72.414915] Write of size 1 at addr ffff0000c5a19f00 by task kunit_try_catch/128
[   72.415525] 
[   72.415729] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.416851] Hardware name: linux,dummy-virt (DT)
[   72.417256] Call trace:
[   72.417540]  dump_backtrace.part.0+0xdc/0xf0
[   72.418597]  show_stack+0x18/0x30
[   72.419097]  dump_stack_lvl+0x64/0x80
[   72.419581]  print_report+0x158/0x438
[   72.420029]  kasan_report+0xb4/0xf4
[   72.420496]  __asan_store1+0x68/0x7c
[   72.420922]  kmalloc_large_oob_right+0xc0/0x1f0
[   72.421449]  kunit_try_run_case+0x84/0x120
[   72.422546]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.423158]  kthread+0x180/0x190
[   72.423579]  ret_from_fork+0x10/0x20
[   72.424017] 
[   72.424211] Allocated by task 128:
[   72.424587]  kasan_save_stack+0x3c/0x70
[   72.425060]  kasan_set_track+0x2c/0x40
[   72.425485]  kasan_save_alloc_info+0x24/0x34
[   72.426144]  __kasan_kmalloc+0xb8/0xc0
[   72.426596]  kmalloc_trace+0x58/0x6c
[   72.427210]  kmalloc_large_oob_right+0x94/0x1f0
[   72.427759]  kunit_try_run_case+0x84/0x120
[   72.428243]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.428800]  kthread+0x180/0x190
[   72.429197]  ret_from_fork+0x10/0x20
[   72.429628] 
[   72.429977] The buggy address belongs to the object at ffff0000c5a18000
[   72.429977]  which belongs to the cache kmalloc-8k of size 8192
[   72.431343] The buggy address is located 7936 bytes inside of
[   72.431343]  8192-byte region [ffff0000c5a18000, ffff0000c5a1a000)
[   72.432313] 
[   72.432564] The buggy address belongs to the physical page:
[   72.433037] page:00000000873a2410 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a18
[   72.433776] head:00000000873a2410 order:3 compound_mapcount:0 compound_pincount:0
[   72.434425] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.435378] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[   72.436082] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   72.436711] page dumped because: kasan: bad access detected
[   72.437190] 
[   72.437382] Memory state around the buggy address:
[   72.437815]  ffff0000c5a19e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.438602]  ffff0000c5a19e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.439590] >ffff0000c5a19f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.440186]                    ^
[   72.440513]  ffff0000c5a19f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.441125]  ffff0000c5a1a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.441714] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-pagealloc_uaf
[   72.388821] ==================================================================
[   72.390690] BUG: KASAN: use-after-free in pagealloc_uaf+0xcc/0x200
[   72.391692] Read of size 1 at addr ffff0000c5a50000 by task kunit_try_catch/127
[   72.392645] 
[   72.392965] CPU: 1 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.394041] Hardware name: linux,dummy-virt (DT)
[   72.394552] Call trace:
[   72.394774]  dump_backtrace.part.0+0xdc/0xf0
[   72.395193]  show_stack+0x18/0x30
[   72.395683]  dump_stack_lvl+0x64/0x80
[   72.396182]  print_report+0x158/0x438
[   72.396660]  kasan_report+0xb4/0xf4
[   72.397107]  __asan_load1+0x68/0x74
[   72.397549]  pagealloc_uaf+0xcc/0x200
[   72.398031]  kunit_try_run_case+0x84/0x120
[   72.399049]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.399646]  kthread+0x180/0x190
[   72.400084]  ret_from_fork+0x10/0x20
[   72.400562] 
[   72.400793] The buggy address belongs to the physical page:
[   72.401259] page:000000004d85e480 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a50
[   72.402225] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   72.403030] raw: 0bfffc0000000000 ffff0000ff7f59a0 ffff0000ff7f59a0 0000000000000000
[   72.403590] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000
[   72.404043] page dumped because: kasan: bad access detected
[   72.404389] 
[   72.404564] Memory state around the buggy address:
[   72.404918]  ffff0000c5a4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.405621]  ffff0000c5a4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.406783] >ffff0000c5a50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.407416]                    ^
[   72.407706]  ffff0000c5a50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.408161]  ffff0000c5a50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   72.408722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_pagealloc_oob_right
[   72.310417] ==================================================================
[   72.311291] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xa4/0x1e0
[   72.312080] Write of size 1 at addr ffff0000c5a3200a by task kunit_try_catch/123
[   72.312622] 
[   72.312837] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.313508] Hardware name: linux,dummy-virt (DT)
[   72.313893] Call trace:
[   72.314962]  dump_backtrace.part.0+0xdc/0xf0
[   72.315494]  show_stack+0x18/0x30
[   72.315919]  dump_stack_lvl+0x64/0x80
[   72.316332]  print_report+0x158/0x438
[   72.316800]  kasan_report+0xb4/0xf4
[   72.317185]  __asan_store1+0x68/0x7c
[   72.317599]  kmalloc_pagealloc_oob_right+0xa4/0x1e0
[   72.318114]  kunit_try_run_case+0x84/0x120
[   72.318592]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.319307]  kthread+0x180/0x190
[   72.319769]  ret_from_fork+0x10/0x20
[   72.320219] 
[   72.320457] The buggy address belongs to the physical page:
[   72.320978] page:00000000a668a8fd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a30
[   72.321740] head:00000000a668a8fd order:2 compound_mapcount:0 compound_pincount:0
[   72.322372] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   72.322996] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   72.323821] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   72.324434] page dumped because: kasan: bad access detected
[   72.324930] 
[   72.325119] Memory state around the buggy address:
[   72.325583]  ffff0000c5a31f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.326326]  ffff0000c5a31f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.326968] >ffff0000c5a32000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.327564]                       ^
[   72.327935]  ffff0000c5a32080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.328573]  ffff0000c5a32100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   72.329165] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   72.273728] ==================================================================
[   72.274613] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xc8/0x1e4
[   72.275343] Read of size 1 at addr ffff0000c599b000 by task kunit_try_catch/122
[   72.276433] 
[   72.276670] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.277369] Hardware name: linux,dummy-virt (DT)
[   72.277794] Call trace:
[   72.278448]  dump_backtrace.part.0+0xdc/0xf0
[   72.278966]  show_stack+0x18/0x30
[   72.279358]  dump_stack_lvl+0x64/0x80
[   72.279775]  print_report+0x158/0x438
[   72.280218]  kasan_report+0xb4/0xf4
[   72.280621]  __asan_load1+0x68/0x74
[   72.281012]  kmalloc_node_oob_right+0xc8/0x1e4
[   72.281487]  kunit_try_run_case+0x84/0x120
[   72.282122]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.282675]  kthread+0x180/0x190
[   72.283050]  ret_from_fork+0x10/0x20
[   72.283471] 
[   72.283651] Allocated by task 122:
[   72.283980]  kasan_save_stack+0x3c/0x70
[   72.284784]  kasan_set_track+0x2c/0x40
[   72.285184]  kasan_save_alloc_info+0x24/0x34
[   72.285661]  __kasan_kmalloc+0xb8/0xc0
[   72.286326]  kmalloc_node_trace+0x54/0x70
[   72.286816]  kmalloc_node_oob_right+0x9c/0x1e4
[   72.287267]  kunit_try_run_case+0x84/0x120
[   72.287723]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.288289]  kthread+0x180/0x190
[   72.288665]  ret_from_fork+0x10/0x20
[   72.289072] 
[   72.289269] The buggy address belongs to the object at ffff0000c599a000
[   72.289269]  which belongs to the cache kmalloc-4k of size 4096
[   72.290708] The buggy address is located 0 bytes to the right of
[   72.290708]  4096-byte region [ffff0000c599a000, ffff0000c599b000)
[   72.291622] 
[   72.291800] The buggy address belongs to the physical page:
[   72.292322] page:000000006c8790c3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105998
[   72.293095] head:000000006c8790c3 order:3 compound_mapcount:0 compound_pincount:0
[   72.293703] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   72.294409] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[   72.295047] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   72.295655] page dumped because: kasan: bad access detected
[   72.296100] 
[   72.296282] Memory state around the buggy address:
[   72.297081]  ffff0000c599af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.297717]  ffff0000c599af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   72.298813] >ffff0000c599b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.299402]                    ^
[   72.299710]  ffff0000c599b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.300317]  ffff0000c599b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.300902] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   72.247949] ==================================================================
[   72.248958] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xc0/0x200
[   72.249744] Read of size 1 at addr ffff0000c596cfff by task kunit_try_catch/121
[   72.250672] 
[   72.251128] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.251825] Hardware name: linux,dummy-virt (DT)
[   72.252331] Call trace:
[   72.252709]  dump_backtrace.part.0+0xdc/0xf0
[   72.253305]  show_stack+0x18/0x30
[   72.253876]  dump_stack_lvl+0x64/0x80
[   72.254290]  print_report+0x158/0x438
[   72.254749]  kasan_report+0xb4/0xf4
[   72.255149]  __asan_load1+0x68/0x74
[   72.255638]  kmalloc_oob_left+0xc0/0x200
[   72.256115]  kunit_try_run_case+0x84/0x120
[   72.256575]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.257148]  kthread+0x180/0x190
[   72.257516]  ret_from_fork+0x10/0x20
[   72.257936] 
[   72.258149] The buggy address belongs to the object at ffff0000c596cf00
[   72.258149]  which belongs to the cache cred_jar of size 176
[   72.259311] The buggy address is located 79 bytes to the right of
[   72.259311]  176-byte region [ffff0000c596cf00, ffff0000c596cfb0)
[   72.260199] 
[   72.260406] The buggy address belongs to the physical page:
[   72.260871] page:000000008af61330 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c
[   72.261591] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   72.262534] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c02ce000
[   72.263205] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.263804] page dumped because: kasan: bad access detected
[   72.264239] 
[   72.264428] Memory state around the buggy address:
[   72.264879]  ffff0000c596ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.265472]  ffff0000c596cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.266319] >ffff0000c596cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.266904]                                                                 ^
[   72.267472]  ffff0000c596d000: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.268064]  ffff0000c596d080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.268634] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   72.148829] ==================================================================
[   72.150409] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xc0/0x340
[   72.151968] Write of size 1 at addr ffff0000c5966d73 by task kunit_try_catch/120
[   72.152886] 
[   72.153376] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G                 N 6.1.146-rc1 #1
[   72.154702] Hardware name: linux,dummy-virt (DT)
[   72.155509] Call trace:
[   72.155911]  dump_backtrace.part.0+0xdc/0xf0
[   72.156425]  show_stack+0x18/0x30
[   72.156790]  dump_stack_lvl+0x64/0x80
[   72.157133]  print_report+0x158/0x438
[   72.157505]  kasan_report+0xb4/0xf4
[   72.158048]  __asan_store1+0x68/0x7c
[   72.158642]  kmalloc_oob_right+0xc0/0x340
[   72.159252]  kunit_try_run_case+0x84/0x120
[   72.159877]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.160635]  kthread+0x180/0x190
[   72.161135]  ret_from_fork+0x10/0x20
[   72.161802] 
[   72.162274] Allocated by task 120:
[   72.162825]  kasan_save_stack+0x3c/0x70
[   72.163507]  kasan_set_track+0x2c/0x40
[   72.164079]  kasan_save_alloc_info+0x24/0x34
[   72.164704]  __kasan_kmalloc+0xb8/0xc0
[   72.165240]  kmalloc_trace+0x58/0x6c
[   72.165797]  kmalloc_oob_right+0x98/0x340
[   72.167165]  kunit_try_run_case+0x84/0x120
[   72.167818]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.168403]  kthread+0x180/0x190
[   72.168725]  ret_from_fork+0x10/0x20
[   72.169100] 
[   72.169315] The buggy address belongs to the object at ffff0000c5966d00
[   72.169315]  which belongs to the cache kmalloc-128 of size 128
[   72.170551] The buggy address is located 115 bytes inside of
[   72.170551]  128-byte region [ffff0000c5966d00, ffff0000c5966d80)
[   72.171890] 
[   72.172257] The buggy address belongs to the physical page:
[   72.173081] page:00000000797bbbfa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966
[   72.174736] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   72.176028] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   72.177012] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.178127] page dumped because: kasan: bad access detected
[   72.178833] 
[   72.179064] Memory state around the buggy address:
[   72.179599]  ffff0000c5966c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.180096]  ffff0000c5966c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.180736] >ffff0000c5966d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   72.181578]                                                              ^
[   72.182693]  ffff0000c5966d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.183587]  ffff0000c5966e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.184450] ==================================================================
[   72.219228] ==================================================================
[   72.219836] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x108/0x340
[   72.220532] Read of size 1 at addr ffff0000c5966d80 by task kunit_try_catch/120
[   72.221096] 
[   72.221327] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.222664] Hardware name: linux,dummy-virt (DT)
[   72.223067] Call trace:
[   72.223370]  dump_backtrace.part.0+0xdc/0xf0
[   72.223937]  show_stack+0x18/0x30
[   72.224349]  dump_stack_lvl+0x64/0x80
[   72.224793]  print_report+0x158/0x438
[   72.225242]  kasan_report+0xb4/0xf4
[   72.225647]  __asan_load1+0x68/0x74
[   72.226194]  kmalloc_oob_right+0x108/0x340
[   72.226686]  kunit_try_run_case+0x84/0x120
[   72.227123]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.227703]  kthread+0x180/0x190
[   72.228076]  ret_from_fork+0x10/0x20
[   72.228485] 
[   72.228657] Allocated by task 120:
[   72.228992]  kasan_save_stack+0x3c/0x70
[   72.229440]  kasan_set_track+0x2c/0x40
[   72.229828]  kasan_save_alloc_info+0x24/0x34
[   72.230288]  __kasan_kmalloc+0xb8/0xc0
[   72.230849]  kmalloc_trace+0x58/0x6c
[   72.231271]  kmalloc_oob_right+0x98/0x340
[   72.231700]  kunit_try_run_case+0x84/0x120
[   72.232154]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.232691]  kthread+0x180/0x190
[   72.233079]  ret_from_fork+0x10/0x20
[   72.233485] 
[   72.233698] The buggy address belongs to the object at ffff0000c5966d00
[   72.233698]  which belongs to the cache kmalloc-128 of size 128
[   72.234773] The buggy address is located 0 bytes to the right of
[   72.234773]  128-byte region [ffff0000c5966d00, ffff0000c5966d80)
[   72.235714] 
[   72.235930] The buggy address belongs to the physical page:
[   72.236375] page:00000000797bbbfa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966
[   72.237144] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   72.237775] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   72.238540] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.239114] page dumped because: kasan: bad access detected
[   72.239583] 
[   72.239786] Memory state around the buggy address:
[   72.240212]  ffff0000c5966c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.240786]  ffff0000c5966d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   72.241408] >ffff0000c5966d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.242644]                    ^
[   72.242943]  ffff0000c5966e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.243419]  ffff0000c5966e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.244021] ==================================================================
[   72.187391] ==================================================================
[   72.188233] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe4/0x340
[   72.189146] Write of size 1 at addr ffff0000c5966d78 by task kunit_try_catch/120
[   72.189745] 
[   72.190295] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   72.191294] Hardware name: linux,dummy-virt (DT)
[   72.191645] Call trace:
[   72.191861]  dump_backtrace.part.0+0xdc/0xf0
[   72.192282]  show_stack+0x18/0x30
[   72.192836]  dump_stack_lvl+0x64/0x80
[   72.193392]  print_report+0x158/0x438
[   72.194125]  kasan_report+0xb4/0xf4
[   72.194665]  __asan_store1+0x68/0x7c
[   72.195192]  kmalloc_oob_right+0xe4/0x340
[   72.195813]  kunit_try_run_case+0x84/0x120
[   72.196431]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.197173]  kthread+0x180/0x190
[   72.197672]  ret_from_fork+0x10/0x20
[   72.198359] 
[   72.198638] Allocated by task 120:
[   72.198999]  kasan_save_stack+0x3c/0x70
[   72.199345]  kasan_set_track+0x2c/0x40
[   72.199756]  kasan_save_alloc_info+0x24/0x34
[   72.200183]  __kasan_kmalloc+0xb8/0xc0
[   72.200616]  kmalloc_trace+0x58/0x6c
[   72.201059]  kmalloc_oob_right+0x98/0x340
[   72.201537]  kunit_try_run_case+0x84/0x120
[   72.202255]  kunit_generic_run_threadfn_adapter+0x30/0x50
[   72.202802]  kthread+0x180/0x190
[   72.203174]  ret_from_fork+0x10/0x20
[   72.203595] 
[   72.203812] The buggy address belongs to the object at ffff0000c5966d00
[   72.203812]  which belongs to the cache kmalloc-128 of size 128
[   72.204723] The buggy address is located 120 bytes inside of
[   72.204723]  128-byte region [ffff0000c5966d00, ffff0000c5966d80)
[   72.205582] 
[   72.205777] The buggy address belongs to the physical page:
[   72.206881] page:00000000797bbbfa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105966
[   72.207638] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   72.208289] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   72.208945] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   72.209496] page dumped because: kasan: bad access detected
[   72.210370] 
[   72.211638] Memory state around the buggy address:
[   72.211983]  ffff0000c5966c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   72.212459]  ffff0000c5966c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.212913] >ffff0000c5966d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   72.213338]                                                                 ^
[   72.215198]  ffff0000c5966d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.216546]  ffff0000c5966e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.217961] ==================================================================