Hay
Date
July 15, 2025, 2:10 p.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_generic
[   76.226381] ==================================================================
[   76.226950] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb68
[   76.227648] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.229982] 
[   76.230215] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.231035] Hardware name: linux,dummy-virt (DT)
[   76.231500] Call trace:
[   76.231966]  dump_backtrace+0xf4/0x114
[   76.233723]  show_stack+0x18/0x24
[   76.234159]  __dump_stack+0x28/0x38
[   76.234640]  dump_stack_lvl+0x50/0x68
[   76.235132]  print_address_description+0x7c/0x1ec
[   76.236033]  print_report+0x50/0x68
[   76.236662]  kasan_report+0xac/0xfc
[   76.237836]  kasan_check_range+0x258/0x290
[   76.239275]  __kasan_check_write+0x2c/0x3c
[   76.240297]  kasan_bitops_generic+0x14c/0xb68
[   76.241015]  kunit_try_run_case+0x80/0x184
[   76.241685]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.242514]  kthread+0x16c/0x21c
[   76.243120]  ret_from_fork+0x10/0x20
[   76.243715] 
[   76.244304] Allocated by task 165:
[   76.244830]  kasan_set_track+0x4c/0x80
[   76.245435]  kasan_save_alloc_info+0x28/0x34
[   76.245973]  __kasan_kmalloc+0x88/0xa0
[   76.246606]  kmalloc_trace+0x54/0x68
[   76.247209]  kasan_bitops_generic+0x4c/0xb68
[   76.248377]  kunit_try_run_case+0x80/0x184
[   76.249068]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.249731]  kthread+0x16c/0x21c
[   76.250128]  ret_from_fork+0x10/0x20
[   76.250500] 
[   76.250684] The buggy address belongs to the object at ffff0000c58a7700
[   76.250684]  which belongs to the cache kmalloc-128 of size 128
[   76.251431] The buggy address is located 8 bytes inside of
[   76.251431]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.253102] 
[   76.253404] The buggy address belongs to the physical page:
[   76.254087] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.255220] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.256661] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.257665] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.258590] page dumped because: kasan: bad access detected
[   76.259277] 
[   76.259547] Memory state around the buggy address:
[   76.260479]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.261403]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.262294] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.263157]                       ^
[   76.264144]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.265072]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.265942] ==================================================================
[   76.599169] ==================================================================
[   76.599811] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb68
[   76.600523] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.601092] 
[   76.601345] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.602084] Hardware name: linux,dummy-virt (DT)
[   76.602527] Call trace:
[   76.602815]  dump_backtrace+0xf4/0x114
[   76.603319]  show_stack+0x18/0x24
[   76.603784]  __dump_stack+0x28/0x38
[   76.604189]  dump_stack_lvl+0x50/0x68
[   76.604639]  print_address_description+0x7c/0x1ec
[   76.605204]  print_report+0x50/0x68
[   76.605647]  kasan_report+0xac/0xfc
[   76.606093]  kasan_check_range+0x258/0x290
[   76.606575]  __kasan_check_write+0x2c/0x3c
[   76.607022]  kasan_bitops_generic+0x458/0xb68
[   76.607509]  kunit_try_run_case+0x80/0x184
[   76.607984]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.608570]  kthread+0x16c/0x21c
[   76.608986]  ret_from_fork+0x10/0x20
[   76.609445] 
[   76.609639] Allocated by task 165:
[   76.609990]  kasan_set_track+0x4c/0x80
[   76.610475]  kasan_save_alloc_info+0x28/0x34
[   76.610962]  __kasan_kmalloc+0x88/0xa0
[   76.611410]  kmalloc_trace+0x54/0x68
[   76.611832]  kasan_bitops_generic+0x4c/0xb68
[   76.612315]  kunit_try_run_case+0x80/0x184
[   76.612783]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.613394]  kthread+0x16c/0x21c
[   76.613854]  ret_from_fork+0x10/0x20
[   76.614251] 
[   76.614467] The buggy address belongs to the object at ffff0000c58a7700
[   76.614467]  which belongs to the cache kmalloc-128 of size 128
[   76.615423] The buggy address is located 8 bytes inside of
[   76.615423]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.616342] 
[   76.616570] The buggy address belongs to the physical page:
[   76.617066] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.617835] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.618525] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.619243] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.619848] page dumped because: kasan: bad access detected
[   76.620324] 
[   76.620520] Memory state around the buggy address:
[   76.620954]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.621582]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.622217] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.623021]                       ^
[   76.623437]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.624101]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.624745] ==================================================================
[   76.300665] ==================================================================
[   76.301584] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb68
[   76.302625] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.303624] 
[   76.304011] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.305372] Hardware name: linux,dummy-virt (DT)
[   76.306122] Call trace:
[   76.306551]  dump_backtrace+0xf4/0x114
[   76.307138]  show_stack+0x18/0x24
[   76.307534]  __dump_stack+0x28/0x38
[   76.308238]  dump_stack_lvl+0x50/0x68
[   76.308914]  print_address_description+0x7c/0x1ec
[   76.309720]  print_report+0x50/0x68
[   76.310387]  kasan_report+0xac/0xfc
[   76.311029]  kasan_check_range+0x258/0x290
[   76.311808]  __kasan_check_write+0x2c/0x3c
[   76.312551]  kasan_bitops_generic+0x1f0/0xb68
[   76.313272]  kunit_try_run_case+0x80/0x184
[   76.313962]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.314499]  kthread+0x16c/0x21c
[   76.314895]  ret_from_fork+0x10/0x20
[   76.315276] 
[   76.315457] Allocated by task 165:
[   76.315784]  kasan_set_track+0x4c/0x80
[   76.316216]  kasan_save_alloc_info+0x28/0x34
[   76.316991]  __kasan_kmalloc+0x88/0xa0
[   76.317670]  kmalloc_trace+0x54/0x68
[   76.318275]  kasan_bitops_generic+0x4c/0xb68
[   76.318950]  kunit_try_run_case+0x80/0x184
[   76.319609]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.320571]  kthread+0x16c/0x21c
[   76.321163]  ret_from_fork+0x10/0x20
[   76.321763] 
[   76.322042] The buggy address belongs to the object at ffff0000c58a7700
[   76.322042]  which belongs to the cache kmalloc-128 of size 128
[   76.323151] The buggy address is located 8 bytes inside of
[   76.323151]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.324522] 
[   76.324978] The buggy address belongs to the physical page:
[   76.325594] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.326237] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.326826] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.327810] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.328939] page dumped because: kasan: bad access detected
[   76.329789] 
[   76.330079] Memory state around the buggy address:
[   76.330857]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.331769]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.332824] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.333684]                       ^
[   76.334208]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.335103]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.335772] ==================================================================
[   76.198020] ==================================================================
[   76.198547] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb68
[   76.199288] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.200354] 
[   76.200589] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.201357] Hardware name: linux,dummy-virt (DT)
[   76.201793] Call trace:
[   76.202054]  dump_backtrace+0xf4/0x114
[   76.202509]  show_stack+0x18/0x24
[   76.202938]  __dump_stack+0x28/0x38
[   76.203377]  dump_stack_lvl+0x50/0x68
[   76.204095]  print_address_description+0x7c/0x1ec
[   76.204633]  print_report+0x50/0x68
[   76.205085]  kasan_report+0xac/0xfc
[   76.205559]  __asan_load8+0xa8/0xac
[   76.205993]  kasan_bitops_generic+0xf8/0xb68
[   76.206503]  kunit_try_run_case+0x80/0x184
[   76.207023]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.207598]  kthread+0x16c/0x21c
[   76.208074]  ret_from_fork+0x10/0x20
[   76.208513] 
[   76.208727] Allocated by task 165:
[   76.209081]  kasan_set_track+0x4c/0x80
[   76.209593]  kasan_save_alloc_info+0x28/0x34
[   76.210532]  __kasan_kmalloc+0x88/0xa0
[   76.211009]  kmalloc_trace+0x54/0x68
[   76.211463]  kasan_bitops_generic+0x4c/0xb68
[   76.212199]  kunit_try_run_case+0x80/0x184
[   76.212685]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.213264]  kthread+0x16c/0x21c
[   76.213687]  ret_from_fork+0x10/0x20
[   76.214155] 
[   76.214347] The buggy address belongs to the object at ffff0000c58a7700
[   76.214347]  which belongs to the cache kmalloc-128 of size 128
[   76.215329] The buggy address is located 8 bytes inside of
[   76.215329]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.216734] 
[   76.216971] The buggy address belongs to the physical page:
[   76.217461] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.218259] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.218939] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.219601] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.220235] page dumped because: kasan: bad access detected
[   76.220706] 
[   76.221175] Memory state around the buggy address:
[   76.221629]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.222260]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.222871] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.223474]                       ^
[   76.224359]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.224980]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.225595] ==================================================================
[   76.168971] ==================================================================
[   76.169844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb68
[   76.170520] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.171157] 
[   76.171364] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.172253] Hardware name: linux,dummy-virt (DT)
[   76.172751] Call trace:
[   76.173057]  dump_backtrace+0xf4/0x114
[   76.173634]  show_stack+0x18/0x24
[   76.174129]  __dump_stack+0x28/0x38
[   76.174569]  dump_stack_lvl+0x50/0x68
[   76.175030]  print_address_description+0x7c/0x1ec
[   76.175590]  print_report+0x50/0x68
[   76.176083]  kasan_report+0xac/0xfc
[   76.176804]  kasan_check_range+0x258/0x290
[   76.177335]  __kasan_check_write+0x2c/0x3c
[   76.177831]  kasan_bitops_generic+0xa8/0xb68
[   76.178341]  kunit_try_run_case+0x80/0x184
[   76.178829]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.179396]  kthread+0x16c/0x21c
[   76.179821]  ret_from_fork+0x10/0x20
[   76.180272] 
[   76.180520] Allocated by task 165:
[   76.180909]  kasan_set_track+0x4c/0x80
[   76.181372]  kasan_save_alloc_info+0x28/0x34
[   76.181903]  __kasan_kmalloc+0x88/0xa0
[   76.182362]  kmalloc_trace+0x54/0x68
[   76.182778]  kasan_bitops_generic+0x4c/0xb68
[   76.183291]  kunit_try_run_case+0x80/0x184
[   76.184255]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.184868]  kthread+0x16c/0x21c
[   76.185292]  ret_from_fork+0x10/0x20
[   76.185757] 
[   76.185950] The buggy address belongs to the object at ffff0000c58a7700
[   76.185950]  which belongs to the cache kmalloc-128 of size 128
[   76.186924] The buggy address is located 8 bytes inside of
[   76.186924]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.187887] 
[   76.188081] The buggy address belongs to the physical page:
[   76.188558] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.189359] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.190351] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.191040] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.191675] page dumped because: kasan: bad access detected
[   76.192619] 
[   76.192860] Memory state around the buggy address:
[   76.193277]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.193964]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.194589] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.195196]                       ^
[   76.195554]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.196430]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.197033] ==================================================================
[   76.518665] ==================================================================
[   76.519235] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb68
[   76.520542] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.521184] 
[   76.521409] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.522183] Hardware name: linux,dummy-virt (DT)
[   76.522611] Call trace:
[   76.522891]  dump_backtrace+0xf4/0x114
[   76.523388]  show_stack+0x18/0x24
[   76.523848]  __dump_stack+0x28/0x38
[   76.524297]  dump_stack_lvl+0x50/0x68
[   76.524721]  print_address_description+0x7c/0x1ec
[   76.525314]  print_report+0x50/0x68
[   76.525773]  kasan_report+0xac/0xfc
[   76.526228]  __asan_load8+0xa8/0xac
[   76.526640]  kasan_bitops_generic+0x3a0/0xb68
[   76.527158]  kunit_try_run_case+0x80/0x184
[   76.527677]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.528271]  kthread+0x16c/0x21c
[   76.528683]  ret_from_fork+0x10/0x20
[   76.529141] 
[   76.529346] Allocated by task 165:
[   76.529677]  kasan_set_track+0x4c/0x80
[   76.530709]  kasan_save_alloc_info+0x28/0x34
[   76.531181]  __kasan_kmalloc+0x88/0xa0
[   76.531628]  kmalloc_trace+0x54/0x68
[   76.532070]  kasan_bitops_generic+0x4c/0xb68
[   76.532584]  kunit_try_run_case+0x80/0x184
[   76.533051]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.533624]  kthread+0x16c/0x21c
[   76.534063]  ret_from_fork+0x10/0x20
[   76.534508] 
[   76.534713] The buggy address belongs to the object at ffff0000c58a7700
[   76.534713]  which belongs to the cache kmalloc-128 of size 128
[   76.535644] The buggy address is located 8 bytes inside of
[   76.535644]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.537121] 
[   76.537382] The buggy address belongs to the physical page:
[   76.537896] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.538712] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.539413] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.540137] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.540763] page dumped because: kasan: bad access detected
[   76.541251] 
[   76.541441] Memory state around the buggy address:
[   76.541883]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.542533]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.543159] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.544325]                       ^
[   76.544713]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.545342]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.545949] ==================================================================
[   76.737504] ==================================================================
[   76.738068] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb68
[   76.738761] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.739388] 
[   76.739632] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.740472] Hardware name: linux,dummy-virt (DT)
[   76.740930] Call trace:
[   76.741200]  dump_backtrace+0xf4/0x114
[   76.741690]  show_stack+0x18/0x24
[   76.742155]  __dump_stack+0x28/0x38
[   76.742609]  dump_stack_lvl+0x50/0x68
[   76.743079]  print_address_description+0x7c/0x1ec
[   76.743625]  print_report+0x50/0x68
[   76.744083]  kasan_report+0xac/0xfc
[   76.744526]  kasan_check_range+0x258/0x290
[   76.745026]  __kasan_check_write+0x2c/0x3c
[   76.745486]  kasan_bitops_generic+0x5f4/0xb68
[   76.746019]  kunit_try_run_case+0x80/0x184
[   76.746498]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.747086]  kthread+0x16c/0x21c
[   76.747507]  ret_from_fork+0x10/0x20
[   76.747961] 
[   76.748163] Allocated by task 165:
[   76.749979]  kasan_set_track+0x4c/0x80
[   76.750445]  kasan_save_alloc_info+0x28/0x34
[   76.751021]  __kasan_kmalloc+0x88/0xa0
[   76.751575]  kmalloc_trace+0x54/0x68
[   76.752535]  kasan_bitops_generic+0x4c/0xb68
[   76.753428]  kunit_try_run_case+0x80/0x184
[   76.754142]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.755113]  kthread+0x16c/0x21c
[   76.755853]  ret_from_fork+0x10/0x20
[   76.756612] 
[   76.757055] The buggy address belongs to the object at ffff0000c58a7700
[   76.757055]  which belongs to the cache kmalloc-128 of size 128
[   76.758620] The buggy address is located 8 bytes inside of
[   76.758620]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.760370] 
[   76.760764] The buggy address belongs to the physical page:
[   76.761347] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.762449] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.763556] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.764704] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.765659] page dumped because: kasan: bad access detected
[   76.766556] 
[   76.766958] Memory state around the buggy address:
[   76.767609]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.768679]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.769757] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.770388]                       ^
[   76.770723]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.771248]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.771717] ==================================================================
[   76.625792] ==================================================================
[   76.626370] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb68
[   76.627081] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.627674] 
[   76.627887] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.628664] Hardware name: linux,dummy-virt (DT)
[   76.629133] Call trace:
[   76.629424]  dump_backtrace+0xf4/0x114
[   76.629929]  show_stack+0x18/0x24
[   76.630393]  __dump_stack+0x28/0x38
[   76.630832]  dump_stack_lvl+0x50/0x68
[   76.631264]  print_address_description+0x7c/0x1ec
[   76.631853]  print_report+0x50/0x68
[   76.632295]  kasan_report+0xac/0xfc
[   76.632752]  __asan_load8+0xa8/0xac
[   76.633183]  kasan_bitops_generic+0x4a8/0xb68
[   76.633692]  kunit_try_run_case+0x80/0x184
[   76.634189]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.634766]  kthread+0x16c/0x21c
[   76.635184]  ret_from_fork+0x10/0x20
[   76.635623] 
[   76.635844] Allocated by task 165:
[   76.636212]  kasan_set_track+0x4c/0x80
[   76.636731]  kasan_save_alloc_info+0x28/0x34
[   76.637207]  __kasan_kmalloc+0x88/0xa0
[   76.637666]  kmalloc_trace+0x54/0x68
[   76.638098]  kasan_bitops_generic+0x4c/0xb68
[   76.638576]  kunit_try_run_case+0x80/0x184
[   76.639065]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.639644]  kthread+0x16c/0x21c
[   76.640099]  ret_from_fork+0x10/0x20
[   76.640503] 
[   76.640724] The buggy address belongs to the object at ffff0000c58a7700
[   76.640724]  which belongs to the cache kmalloc-128 of size 128
[   76.641649] The buggy address is located 8 bytes inside of
[   76.641649]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.642559] 
[   76.642774] The buggy address belongs to the physical page:
[   76.643254] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.644016] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.644720] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.645447] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.646058] page dumped because: kasan: bad access detected
[   76.646543] 
[   76.646783] Memory state around the buggy address:
[   76.647234]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.647895]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.648531] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.649140]                       ^
[   76.649548]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.650185]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.650805] ==================================================================
[   76.337148] ==================================================================
[   76.337633] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb68
[   76.338237] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.338774] 
[   76.339066] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.340174] Hardware name: linux,dummy-virt (DT)
[   76.340858] Call trace:
[   76.341363]  dump_backtrace+0xf4/0x114
[   76.342029]  show_stack+0x18/0x24
[   76.342616]  __dump_stack+0x28/0x38
[   76.343211]  dump_stack_lvl+0x50/0x68
[   76.343821]  print_address_description+0x7c/0x1ec
[   76.344585]  print_report+0x50/0x68
[   76.345207]  kasan_report+0xac/0xfc
[   76.345830]  kasan_check_range+0x258/0x290
[   76.346509]  __kasan_check_write+0x2c/0x3c
[   76.347151]  kasan_bitops_generic+0x244/0xb68
[   76.347842]  kunit_try_run_case+0x80/0x184
[   76.348508]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.349312]  kthread+0x16c/0x21c
[   76.349901]  ret_from_fork+0x10/0x20
[   76.350475] 
[   76.350758] Allocated by task 165:
[   76.351249]  kasan_set_track+0x4c/0x80
[   76.351888]  kasan_save_alloc_info+0x28/0x34
[   76.352544]  __kasan_kmalloc+0x88/0xa0
[   76.353182]  kmalloc_trace+0x54/0x68
[   76.353795]  kasan_bitops_generic+0x4c/0xb68
[   76.354463]  kunit_try_run_case+0x80/0x184
[   76.355129]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.355951]  kthread+0x16c/0x21c
[   76.356525]  ret_from_fork+0x10/0x20
[   76.357038] 
[   76.357223] The buggy address belongs to the object at ffff0000c58a7700
[   76.357223]  which belongs to the cache kmalloc-128 of size 128
[   76.357982] The buggy address is located 8 bytes inside of
[   76.357982]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.358951] 
[   76.359141] The buggy address belongs to the physical page:
[   76.359646] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.360435] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.361139] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.361800] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.362390] page dumped because: kasan: bad access detected
[   76.362863] 
[   76.363052] Memory state around the buggy address:
[   76.363502]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.364161]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.364832] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.365428]                       ^
[   76.365810]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.366449]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.367018] ==================================================================
[   76.368319] ==================================================================
[   76.368856] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb68
[   76.369558] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.370157] 
[   76.370374] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.371122] Hardware name: linux,dummy-virt (DT)
[   76.371589] Call trace:
[   76.371872]  dump_backtrace+0xf4/0x114
[   76.372383]  show_stack+0x18/0x24
[   76.372826]  __dump_stack+0x28/0x38
[   76.373236]  dump_stack_lvl+0x50/0x68
[   76.373692]  print_address_description+0x7c/0x1ec
[   76.374232]  print_report+0x50/0x68
[   76.374705]  kasan_report+0xac/0xfc
[   76.375195]  __asan_load8+0xa8/0xac
[   76.375611]  kasan_bitops_generic+0x24c/0xb68
[   76.376164]  kunit_try_run_case+0x80/0x184
[   76.376614]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.377182]  kthread+0x16c/0x21c
[   76.377599]  ret_from_fork+0x10/0x20
[   76.378050] 
[   76.378247] Allocated by task 165:
[   76.378578]  kasan_set_track+0x4c/0x80
[   76.379113]  kasan_save_alloc_info+0x28/0x34
[   76.379573]  __kasan_kmalloc+0x88/0xa0
[   76.380023]  kmalloc_trace+0x54/0x68
[   76.380429]  kasan_bitops_generic+0x4c/0xb68
[   76.380942]  kunit_try_run_case+0x80/0x184
[   76.381422]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.382002]  kthread+0x16c/0x21c
[   76.382422]  ret_from_fork+0x10/0x20
[   76.382859] 
[   76.383057] The buggy address belongs to the object at ffff0000c58a7700
[   76.383057]  which belongs to the cache kmalloc-128 of size 128
[   76.383990] The buggy address is located 8 bytes inside of
[   76.383990]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.384899] 
[   76.385115] The buggy address belongs to the physical page:
[   76.385565] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.386372] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.387081] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.387730] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.388328] page dumped because: kasan: bad access detected
[   76.388798] 
[   76.389014] Memory state around the buggy address:
[   76.389432]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.390082]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.390712] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.391306]                       ^
[   76.391687]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.392335]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.392937] ==================================================================
[   76.711007] ==================================================================
[   76.711548] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb68
[   76.712435] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.713069] 
[   76.713313] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.714064] Hardware name: linux,dummy-virt (DT)
[   76.714514] Call trace:
[   76.714805]  dump_backtrace+0xf4/0x114
[   76.715312]  show_stack+0x18/0x24
[   76.715824]  __dump_stack+0x28/0x38
[   76.716250]  dump_stack_lvl+0x50/0x68
[   76.716680]  print_address_description+0x7c/0x1ec
[   76.717241]  print_report+0x50/0x68
[   76.717697]  kasan_report+0xac/0xfc
[   76.718167]  __asan_load8+0xa8/0xac
[   76.718590]  kasan_bitops_generic+0x59c/0xb68
[   76.719075]  kunit_try_run_case+0x80/0x184
[   76.719593]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.720182]  kthread+0x16c/0x21c
[   76.720627]  ret_from_fork+0x10/0x20
[   76.721122] 
[   76.721314] Allocated by task 165:
[   76.721688]  kasan_set_track+0x4c/0x80
[   76.722158]  kasan_save_alloc_info+0x28/0x34
[   76.722638]  __kasan_kmalloc+0x88/0xa0
[   76.723105]  kmalloc_trace+0x54/0x68
[   76.723536]  kasan_bitops_generic+0x4c/0xb68
[   76.724073]  kunit_try_run_case+0x80/0x184
[   76.724617]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.725204]  kthread+0x16c/0x21c
[   76.725664]  ret_from_fork+0x10/0x20
[   76.726092] 
[   76.726314] The buggy address belongs to the object at ffff0000c58a7700
[   76.726314]  which belongs to the cache kmalloc-128 of size 128
[   76.727237] The buggy address is located 8 bytes inside of
[   76.727237]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.728151] 
[   76.728382] The buggy address belongs to the physical page:
[   76.728866] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.729661] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.730330] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.731017] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.731638] page dumped because: kasan: bad access detected
[   76.732136] 
[   76.732344] Memory state around the buggy address:
[   76.732791]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.733426]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.734069] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.734671]                       ^
[   76.735047]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.735691]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.736320] ==================================================================
[   76.449509] ==================================================================
[   76.450141] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb68
[   76.450916] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.451505] 
[   76.452456] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.453140] Hardware name: linux,dummy-virt (DT)
[   76.453507] Call trace:
[   76.453760]  dump_backtrace+0xf4/0x114
[   76.454381]  show_stack+0x18/0x24
[   76.454900]  __dump_stack+0x28/0x38
[   76.455349]  dump_stack_lvl+0x50/0x68
[   76.455847]  print_address_description+0x7c/0x1ec
[   76.456485]  print_report+0x50/0x68
[   76.456984]  kasan_report+0xac/0xfc
[   76.457536]  __asan_load8+0xa8/0xac
[   76.457997]  kasan_bitops_generic+0x2fc/0xb68
[   76.458513]  kunit_try_run_case+0x80/0x184
[   76.459073]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.459654]  kthread+0x16c/0x21c
[   76.460099]  ret_from_fork+0x10/0x20
[   76.460525] 
[   76.460756] Allocated by task 165:
[   76.461132]  kasan_set_track+0x4c/0x80
[   76.461615]  kasan_save_alloc_info+0x28/0x34
[   76.462127]  __kasan_kmalloc+0x88/0xa0
[   76.462596]  kmalloc_trace+0x54/0x68
[   76.463045]  kasan_bitops_generic+0x4c/0xb68
[   76.463507]  kunit_try_run_case+0x80/0x184
[   76.464547]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.465191]  kthread+0x16c/0x21c
[   76.465602]  ret_from_fork+0x10/0x20
[   76.466079] 
[   76.466273] The buggy address belongs to the object at ffff0000c58a7700
[   76.466273]  which belongs to the cache kmalloc-128 of size 128
[   76.467222] The buggy address is located 8 bytes inside of
[   76.467222]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.468128] 
[   76.468359] The buggy address belongs to the physical page:
[   76.468875] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.469673] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.470371] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.471013] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.471505] page dumped because: kasan: bad access detected
[   76.472840] 
[   76.473125] Memory state around the buggy address:
[   76.473772]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.474667]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.475568] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.476478]                       ^
[   76.476998]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.477914]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.478778] ==================================================================
[   76.267061] ==================================================================
[   76.268249] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb68
[   76.268945] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.269855] 
[   76.270122] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.270716] Hardware name: linux,dummy-virt (DT)
[   76.271137] Call trace:
[   76.271416]  dump_backtrace+0xf4/0x114
[   76.272109]  show_stack+0x18/0x24
[   76.272530]  __dump_stack+0x28/0x38
[   76.273055]  dump_stack_lvl+0x50/0x68
[   76.273548]  print_address_description+0x7c/0x1ec
[   76.274120]  print_report+0x50/0x68
[   76.274569]  kasan_report+0xac/0xfc
[   76.275054]  __asan_load8+0xa8/0xac
[   76.275415]  kasan_bitops_generic+0x19c/0xb68
[   76.276125]  kunit_try_run_case+0x80/0x184
[   76.276817]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.277438]  kthread+0x16c/0x21c
[   76.277844]  ret_from_fork+0x10/0x20
[   76.278224] 
[   76.278407] Allocated by task 165:
[   76.278699]  kasan_set_track+0x4c/0x80
[   76.279348]  kasan_save_alloc_info+0x28/0x34
[   76.280081]  __kasan_kmalloc+0x88/0xa0
[   76.280872]  kmalloc_trace+0x54/0x68
[   76.281499]  kasan_bitops_generic+0x4c/0xb68
[   76.282180]  kunit_try_run_case+0x80/0x184
[   76.282852]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.283678]  kthread+0x16c/0x21c
[   76.284431]  ret_from_fork+0x10/0x20
[   76.285056] 
[   76.285343] The buggy address belongs to the object at ffff0000c58a7700
[   76.285343]  which belongs to the cache kmalloc-128 of size 128
[   76.286770] The buggy address is located 8 bytes inside of
[   76.286770]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.288207] 
[   76.288542] The buggy address belongs to the physical page:
[   76.289296] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.290458] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.291442] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.292514] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.293370] page dumped because: kasan: bad access detected
[   76.293762] 
[   76.293946] Memory state around the buggy address:
[   76.294302]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.294801]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.295687] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.296987]                       ^
[   76.297638]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.298566]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.299455] ==================================================================
[   76.678180] ==================================================================
[   76.678775] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb68
[   76.679439] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.680143] 
[   76.680451] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.681549] Hardware name: linux,dummy-virt (DT)
[   76.682180] Call trace:
[   76.682566]  dump_backtrace+0xf4/0x114
[   76.683227]  show_stack+0x18/0x24
[   76.683839]  __dump_stack+0x28/0x38
[   76.684427]  dump_stack_lvl+0x50/0x68
[   76.685092]  print_address_description+0x7c/0x1ec
[   76.685872]  print_report+0x50/0x68
[   76.686494]  kasan_report+0xac/0xfc
[   76.687125]  __asan_load8+0xa8/0xac
[   76.687687]  kasan_bitops_generic+0x54c/0xb68
[   76.688378]  kunit_try_run_case+0x80/0x184
[   76.689060]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.689893]  kthread+0x16c/0x21c
[   76.690474]  ret_from_fork+0x10/0x20
[   76.690978] 
[   76.691170] Allocated by task 165:
[   76.691475]  kasan_set_track+0x4c/0x80
[   76.691918]  kasan_save_alloc_info+0x28/0x34
[   76.692331]  __kasan_kmalloc+0x88/0xa0
[   76.692779]  kmalloc_trace+0x54/0x68
[   76.693376]  kasan_bitops_generic+0x4c/0xb68
[   76.694075]  kunit_try_run_case+0x80/0x184
[   76.694736]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.695557]  kthread+0x16c/0x21c
[   76.696188]  ret_from_fork+0x10/0x20
[   76.696787] 
[   76.697066] The buggy address belongs to the object at ffff0000c58a7700
[   76.697066]  which belongs to the cache kmalloc-128 of size 128
[   76.698484] The buggy address is located 8 bytes inside of
[   76.698484]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.699840] 
[   76.700125] The buggy address belongs to the physical page:
[   76.700807] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.701949] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.702916] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.703906] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.704840] page dumped because: kasan: bad access detected
[   76.705537] 
[   76.705833] Memory state around the buggy address:
[   76.706473]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.707385]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.708099] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.708574]                       ^
[   76.708918]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.709541]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.710162] ==================================================================
[   76.421500] ==================================================================
[   76.422039] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb68
[   76.422833] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.423484] 
[   76.423688] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.425005] Hardware name: linux,dummy-virt (DT)
[   76.425454] Call trace:
[   76.425770]  dump_backtrace+0xf4/0x114
[   76.426233]  show_stack+0x18/0x24
[   76.426670]  __dump_stack+0x28/0x38
[   76.427123]  dump_stack_lvl+0x50/0x68
[   76.427543]  print_address_description+0x7c/0x1ec
[   76.428083]  print_report+0x50/0x68
[   76.428545]  kasan_report+0xac/0xfc
[   76.428991]  kasan_check_range+0x258/0x290
[   76.429483]  __kasan_check_write+0x2c/0x3c
[   76.429969]  kasan_bitops_generic+0x2ac/0xb68
[   76.430442]  kunit_try_run_case+0x80/0x184
[   76.430911]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.431484]  kthread+0x16c/0x21c
[   76.432456]  ret_from_fork+0x10/0x20
[   76.432906] 
[   76.433096] Allocated by task 165:
[   76.433465]  kasan_set_track+0x4c/0x80
[   76.433968]  kasan_save_alloc_info+0x28/0x34
[   76.434430]  __kasan_kmalloc+0x88/0xa0
[   76.434894]  kmalloc_trace+0x54/0x68
[   76.435307]  kasan_bitops_generic+0x4c/0xb68
[   76.435779]  kunit_try_run_case+0x80/0x184
[   76.436270]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.436849]  kthread+0x16c/0x21c
[   76.437258]  ret_from_fork+0x10/0x20
[   76.437658] 
[   76.437878] The buggy address belongs to the object at ffff0000c58a7700
[   76.437878]  which belongs to the cache kmalloc-128 of size 128
[   76.438831] The buggy address is located 8 bytes inside of
[   76.438831]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.440298] 
[   76.440507] The buggy address belongs to the physical page:
[   76.440969] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.441829] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.442520] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.443185] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.443951] page dumped because: kasan: bad access detected
[   76.444440] 
[   76.444630] Memory state around the buggy address:
[   76.445088]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.445728]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.446359] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.446974]                       ^
[   76.447334]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.448100]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.448707] ==================================================================
[   76.573513] ==================================================================
[   76.574098] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb68
[   76.574789] Read of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.575398] 
[   76.575626] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.576569] Hardware name: linux,dummy-virt (DT)
[   76.576987] Call trace:
[   76.577249]  dump_backtrace+0xf4/0x114
[   76.577751]  show_stack+0x18/0x24
[   76.578192]  __dump_stack+0x28/0x38
[   76.578594]  dump_stack_lvl+0x50/0x68
[   76.579051]  print_address_description+0x7c/0x1ec
[   76.579578]  print_report+0x50/0x68
[   76.580051]  kasan_report+0xac/0xfc
[   76.580494]  __asan_load8+0xa8/0xac
[   76.580918]  kasan_bitops_generic+0x3fc/0xb68
[   76.581439]  kunit_try_run_case+0x80/0x184
[   76.581908]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.582496]  kthread+0x16c/0x21c
[   76.582908]  ret_from_fork+0x10/0x20
[   76.583319] 
[   76.583519] Allocated by task 165:
[   76.583880]  kasan_set_track+0x4c/0x80
[   76.584362]  kasan_save_alloc_info+0x28/0x34
[   76.584839]  __kasan_kmalloc+0x88/0xa0
[   76.585352]  kmalloc_trace+0x54/0x68
[   76.585774]  kasan_bitops_generic+0x4c/0xb68
[   76.586261]  kunit_try_run_case+0x80/0x184
[   76.586720]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.587317]  kthread+0x16c/0x21c
[   76.587753]  ret_from_fork+0x10/0x20
[   76.588193] 
[   76.588381] The buggy address belongs to the object at ffff0000c58a7700
[   76.588381]  which belongs to the cache kmalloc-128 of size 128
[   76.589203] The buggy address is located 8 bytes inside of
[   76.589203]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.590143] 
[   76.590371] The buggy address belongs to the physical page:
[   76.590827] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.591616] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.592318] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.592985] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.593620] page dumped because: kasan: bad access detected
[   76.594104] 
[   76.594304] Memory state around the buggy address:
[   76.594765]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.595359]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.595986] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.596548]                       ^
[   76.596938]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.597577]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.598206] ==================================================================
[   76.546834] ==================================================================
[   76.547396] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb68
[   76.548461] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.549109] 
[   76.549380] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.550126] Hardware name: linux,dummy-virt (DT)
[   76.550549] Call trace:
[   76.550806]  dump_backtrace+0xf4/0x114
[   76.551318]  show_stack+0x18/0x24
[   76.551807]  __dump_stack+0x28/0x38
[   76.552304]  dump_stack_lvl+0x50/0x68
[   76.552730]  print_address_description+0x7c/0x1ec
[   76.553263]  print_report+0x50/0x68
[   76.553707]  kasan_report+0xac/0xfc
[   76.554183]  kasan_check_range+0x258/0x290
[   76.554673]  __kasan_check_write+0x2c/0x3c
[   76.555129]  kasan_bitops_generic+0x3f4/0xb68
[   76.555604]  kunit_try_run_case+0x80/0x184
[   76.556086]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.556673]  kthread+0x16c/0x21c
[   76.557127]  ret_from_fork+0x10/0x20
[   76.557540] 
[   76.557755] Allocated by task 165:
[   76.558095]  kasan_set_track+0x4c/0x80
[   76.558576]  kasan_save_alloc_info+0x28/0x34
[   76.559036]  __kasan_kmalloc+0x88/0xa0
[   76.559490]  kmalloc_trace+0x54/0x68
[   76.559936]  kasan_bitops_generic+0x4c/0xb68
[   76.560446]  kunit_try_run_case+0x80/0x184
[   76.560952]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.561535]  kthread+0x16c/0x21c
[   76.561981]  ret_from_fork+0x10/0x20
[   76.562391] 
[   76.562588] The buggy address belongs to the object at ffff0000c58a7700
[   76.562588]  which belongs to the cache kmalloc-128 of size 128
[   76.563561] The buggy address is located 8 bytes inside of
[   76.563561]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.564477] 
[   76.564715] The buggy address belongs to the physical page:
[   76.565195] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.565965] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.566657] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.567321] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.567957] page dumped because: kasan: bad access detected
[   76.568432] 
[   76.568620] Memory state around the buggy address:
[   76.569091]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.569728]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.570335] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.570923]                       ^
[   76.571297]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.571932]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.572539] ==================================================================
[   76.479537] ==================================================================
[   76.481011] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb68
[   76.482014] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.482938] 
[   76.483233] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.484300] Hardware name: linux,dummy-virt (DT)
[   76.484847] Call trace:
[   76.485092]  dump_backtrace+0xf4/0x114
[   76.485535]  show_stack+0x18/0x24
[   76.485952]  __dump_stack+0x28/0x38
[   76.486413]  dump_stack_lvl+0x50/0x68
[   76.486926]  print_address_description+0x7c/0x1ec
[   76.487490]  print_report+0x50/0x68
[   76.487992]  kasan_report+0xac/0xfc
[   76.489001]  kasan_check_range+0x258/0x290
[   76.489478]  __kasan_check_write+0x2c/0x3c
[   76.491158]  kasan_bitops_generic+0x350/0xb68
[   76.491606]  kunit_try_run_case+0x80/0x184
[   76.492057]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.492558]  kthread+0x16c/0x21c
[   76.494044]  ret_from_fork+0x10/0x20
[   76.494656] 
[   76.495022] Allocated by task 165:
[   76.496454]  kasan_set_track+0x4c/0x80
[   76.497311]  kasan_save_alloc_info+0x28/0x34
[   76.498263]  __kasan_kmalloc+0x88/0xa0
[   76.499091]  kmalloc_trace+0x54/0x68
[   76.499854]  kasan_bitops_generic+0x4c/0xb68
[   76.500687]  kunit_try_run_case+0x80/0x184
[   76.501520]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.502501]  kthread+0x16c/0x21c
[   76.503147]  ret_from_fork+0x10/0x20
[   76.503835] 
[   76.504178] The buggy address belongs to the object at ffff0000c58a7700
[   76.504178]  which belongs to the cache kmalloc-128 of size 128
[   76.505962] The buggy address is located 8 bytes inside of
[   76.505962]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.506871] 
[   76.507066] The buggy address belongs to the physical page:
[   76.507439] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.508446] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.509418] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.510424] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.511341] page dumped because: kasan: bad access detected
[   76.512102] 
[   76.512968] Memory state around the buggy address:
[   76.513624]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.514561]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.515455] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.516328]                       ^
[   76.516808]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.517303]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.517806] ==================================================================
[   76.651644] ==================================================================
[   76.652253] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb68
[   76.652983] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.653590] 
[   76.653831] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.654577] Hardware name: linux,dummy-virt (DT)
[   76.655050] Call trace:
[   76.655335]  dump_backtrace+0xf4/0x114
[   76.655820]  show_stack+0x18/0x24
[   76.656267]  __dump_stack+0x28/0x38
[   76.656717]  dump_stack_lvl+0x50/0x68
[   76.657199]  print_address_description+0x7c/0x1ec
[   76.657746]  print_report+0x50/0x68
[   76.658205]  kasan_report+0xac/0xfc
[   76.658662]  kasan_check_range+0x258/0x290
[   76.659159]  __kasan_check_write+0x2c/0x3c
[   76.659648]  kasan_bitops_generic+0x4fc/0xb68
[   76.660176]  kunit_try_run_case+0x80/0x184
[   76.660664]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.661253]  kthread+0x16c/0x21c
[   76.661679]  ret_from_fork+0x10/0x20
[   76.662142] 
[   76.662350] Allocated by task 165:
[   76.662706]  kasan_set_track+0x4c/0x80
[   76.663174]  kasan_save_alloc_info+0x28/0x34
[   76.663619]  __kasan_kmalloc+0x88/0xa0
[   76.664129]  kmalloc_trace+0x54/0x68
[   76.664546]  kasan_bitops_generic+0x4c/0xb68
[   76.665022]  kunit_try_run_case+0x80/0x184
[   76.665489]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.666072]  kthread+0x16c/0x21c
[   76.666480]  ret_from_fork+0x10/0x20
[   76.666903] 
[   76.667125] The buggy address belongs to the object at ffff0000c58a7700
[   76.667125]  which belongs to the cache kmalloc-128 of size 128
[   76.668052] The buggy address is located 8 bytes inside of
[   76.668052]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.668926] 
[   76.669151] The buggy address belongs to the physical page:
[   76.669623] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.670413] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.671127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.671849] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.672442] page dumped because: kasan: bad access detected
[   76.672936] 
[   76.673136] Memory state around the buggy address:
[   76.673591]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.674243]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.674850] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.675438]                       ^
[   76.675814]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.676422]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.677036] ==================================================================
[   76.393959] ==================================================================
[   76.394613] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb68
[   76.395385] Write of size 8 at addr ffff0000c58a7708 by task kunit_try_catch/165
[   76.396174] 
[   76.396433] CPU: 0 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.397195] Hardware name: linux,dummy-virt (DT)
[   76.397551] Call trace:
[   76.397888]  dump_backtrace+0xf4/0x114
[   76.398449]  show_stack+0x18/0x24
[   76.398899]  __dump_stack+0x28/0x38
[   76.399313]  dump_stack_lvl+0x50/0x68
[   76.399812]  print_address_description+0x7c/0x1ec
[   76.400349]  print_report+0x50/0x68
[   76.400890]  kasan_report+0xac/0xfc
[   76.401417]  kasan_check_range+0x258/0x290
[   76.401950]  __kasan_check_write+0x2c/0x3c
[   76.402399]  kasan_bitops_generic+0x260/0xb68
[   76.402932]  kunit_try_run_case+0x80/0x184
[   76.403409]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.404017]  kthread+0x16c/0x21c
[   76.404423]  ret_from_fork+0x10/0x20
[   76.404863] 
[   76.405052] Allocated by task 165:
[   76.405414]  kasan_set_track+0x4c/0x80
[   76.405948]  kasan_save_alloc_info+0x28/0x34
[   76.406399]  __kasan_kmalloc+0x88/0xa0
[   76.406906]  kmalloc_trace+0x54/0x68
[   76.407331]  kasan_bitops_generic+0x4c/0xb68
[   76.407889]  kunit_try_run_case+0x80/0x184
[   76.408395]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.408977]  kthread+0x16c/0x21c
[   76.409460]  ret_from_fork+0x10/0x20
[   76.409960] 
[   76.410194] The buggy address belongs to the object at ffff0000c58a7700
[   76.410194]  which belongs to the cache kmalloc-128 of size 128
[   76.411123] The buggy address is located 8 bytes inside of
[   76.411123]  128-byte region [ffff0000c58a7700, ffff0000c58a7780)
[   76.412033] 
[   76.412252] The buggy address belongs to the physical page:
[   76.412706] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.413502] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.414186] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.414869] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.415484] page dumped because: kasan: bad access detected
[   76.415970] 
[   76.416170] Memory state around the buggy address:
[   76.416748]  ffff0000c58a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   76.417341]  ffff0000c58a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.417981] >ffff0000c58a7700: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.418580]                       ^
[   76.419281]  ffff0000c58a7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.419939]  ffff0000c58a7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.420546] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   76.899514] ==================================================================
[   76.900507] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c
[   76.901187] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169
[   76.901721] 
[   76.901964] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.902684] Hardware name: linux,dummy-virt (DT)
[   76.903149] Call trace:
[   76.903435]  dump_backtrace+0xf4/0x114
[   76.904053]  show_stack+0x18/0x24
[   76.904583]  __dump_stack+0x28/0x38
[   76.905039]  dump_stack_lvl+0x50/0x68
[   76.905520]  print_address_description+0x7c/0x1ec
[   76.906122]  print_report+0x50/0x68
[   76.906647]  kasan_report+0xac/0xfc
[   76.907127]  __asan_load1+0x6c/0x70
[   76.907581]  vmalloc_oob+0xe4/0x25c
[   76.908067]  kunit_try_run_case+0x80/0x184
[   76.908830]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.909440]  kthread+0x16c/0x21c
[   76.909955]  ret_from_fork+0x10/0x20
[   76.910474] 
[   76.910700] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping
[   76.911340] The buggy address belongs to the physical page:
[   76.911876] page:000000006e24e2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916
[   76.912867] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   76.913752] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   76.914517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   76.915109] page dumped because: kasan: bad access detected
[   76.915568] 
[   76.915913] Memory state around the buggy address:
[   76.916565]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.917475]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.918376] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   76.919244]                                                                 ^
[   76.920181]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.921341]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.922270] ==================================================================
[   76.865914] ==================================================================
[   76.867155] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c
[   76.868249] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169
[   76.869479] 
[   76.870003] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.871217] Hardware name: linux,dummy-virt (DT)
[   76.872147] Call trace:
[   76.872798]  dump_backtrace+0xf4/0x114
[   76.873722]  show_stack+0x18/0x24
[   76.874602]  __dump_stack+0x28/0x38
[   76.875481]  dump_stack_lvl+0x50/0x68
[   76.876407]  print_address_description+0x7c/0x1ec
[   76.877566]  print_report+0x50/0x68
[   76.878348]  kasan_report+0xac/0xfc
[   76.879256]  __asan_load1+0x6c/0x70
[   76.880328]  vmalloc_oob+0x9c/0x25c
[   76.881051]  kunit_try_run_case+0x80/0x184
[   76.881499]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.882654]  kthread+0x16c/0x21c
[   76.883539]  ret_from_fork+0x10/0x20
[   76.884527] 
[   76.885018] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping
[   76.886213] The buggy address belongs to the physical page:
[   76.887181] page:000000006e24e2fe refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105916
[   76.888831] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   76.890023] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   76.890950] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   76.892202] page dumped because: kasan: bad access detected
[   76.893167] 
[   76.893379] Memory state around the buggy address:
[   76.894002]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.894730]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.895516] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   76.896291]                                                              ^
[   76.897012]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.897694]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   76.898288] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   76.824030] ==================================================================
[   76.825059] BUG: KASAN: double-free in kfree_sensitive+0x88/0xa4
[   76.825939] Free of addr ffff0000c58a7b00 by task kunit_try_catch/167
[   76.826756] 
[   76.827054] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.828243] Hardware name: linux,dummy-virt (DT)
[   76.828892] Call trace:
[   76.829283]  dump_backtrace+0xf4/0x114
[   76.829860]  show_stack+0x18/0x24
[   76.830273]  __dump_stack+0x28/0x38
[   76.830664]  dump_stack_lvl+0x50/0x68
[   76.831134]  print_address_description+0x7c/0x1ec
[   76.831729]  print_report+0x50/0x68
[   76.832246]  kasan_report_invalid_free+0x9c/0xe4
[   76.832830]  ____kasan_slab_free+0x108/0x140
[   76.833356]  __kasan_slab_free+0x18/0x28
[   76.833861]  __kmem_cache_free+0xdc/0x27c
[   76.834346]  kfree_sensitive+0x88/0xa4
[   76.834795]  kmalloc_double_kzfree+0xa4/0x144
[   76.835286]  kunit_try_run_case+0x80/0x184
[   76.835814]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.836509]  kthread+0x16c/0x21c
[   76.836958]  ret_from_fork+0x10/0x20
[   76.837392] 
[   76.837595] Allocated by task 167:
[   76.837946]  kasan_set_track+0x4c/0x80
[   76.838413]  kasan_save_alloc_info+0x28/0x34
[   76.838917]  __kasan_kmalloc+0x88/0xa0
[   76.839423]  kmalloc_trace+0x54/0x68
[   76.839967]  kmalloc_double_kzfree+0x48/0x144
[   76.840512]  kunit_try_run_case+0x80/0x184
[   76.841044]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.841630]  kthread+0x16c/0x21c
[   76.842066]  ret_from_fork+0x10/0x20
[   76.842520] 
[   76.842715] Freed by task 167:
[   76.843069]  kasan_set_track+0x4c/0x80
[   76.843530]  kasan_save_free_info+0x3c/0x60
[   76.844140]  ____kasan_slab_free+0xe8/0x140
[   76.844733]  __kasan_slab_free+0x18/0x28
[   76.845241]  __kmem_cache_free+0xdc/0x27c
[   76.845757]  kfree_sensitive+0x88/0xa4
[   76.846242]  kmalloc_double_kzfree+0x90/0x144
[   76.846768]  kunit_try_run_case+0x80/0x184
[   76.847251]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.847933]  kthread+0x16c/0x21c
[   76.848409]  ret_from_fork+0x10/0x20
[   76.848859] 
[   76.849077] The buggy address belongs to the object at ffff0000c58a7b00
[   76.849077]  which belongs to the cache kmalloc-128 of size 128
[   76.850013] The buggy address is located 0 bytes inside of
[   76.850013]  128-byte region [ffff0000c58a7b00, ffff0000c58a7b80)
[   76.850916] 
[   76.851130] The buggy address belongs to the physical page:
[   76.851586] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.852671] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.853391] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.854066] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.854677] page dumped because: kasan: bad access detected
[   76.855172] 
[   76.855372] Memory state around the buggy address:
[   76.855886]  ffff0000c58a7a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.856569]  ffff0000c58a7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.857251] >ffff0000c58a7b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.857863]                    ^
[   76.858236]  ffff0000c58a7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.858889]  ffff0000c58a7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.859500] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kfree_sensitive
[   76.778528] ==================================================================
[   76.780377] BUG: KASAN: use-after-free in kfree_sensitive+0x1c/0xa4
[   76.781366] Read of size 1 at addr ffff0000c58a7b00 by task kunit_try_catch/167
[   76.782309] 
[   76.782638] CPU: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.783792] Hardware name: linux,dummy-virt (DT)
[   76.784537] Call trace:
[   76.784958]  dump_backtrace+0xf4/0x114
[   76.785646]  show_stack+0x18/0x24
[   76.786285]  __dump_stack+0x28/0x38
[   76.786907]  dump_stack_lvl+0x50/0x68
[   76.787534]  print_address_description+0x7c/0x1ec
[   76.788260]  print_report+0x50/0x68
[   76.788686]  kasan_report+0xac/0xfc
[   76.789214]  __kasan_check_byte+0x3c/0x54
[   76.789714]  ksize+0x34/0x13c
[   76.790152]  kfree_sensitive+0x1c/0xa4
[   76.790556]  kmalloc_double_kzfree+0xa4/0x144
[   76.791309]  kunit_try_run_case+0x80/0x184
[   76.792092]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.792965]  kthread+0x16c/0x21c
[   76.793578]  ret_from_fork+0x10/0x20
[   76.794206] 
[   76.794503] Allocated by task 167:
[   76.795025]  kasan_set_track+0x4c/0x80
[   76.795757]  kasan_save_alloc_info+0x28/0x34
[   76.796462]  __kasan_kmalloc+0x88/0xa0
[   76.796981]  kmalloc_trace+0x54/0x68
[   76.797384]  kmalloc_double_kzfree+0x48/0x144
[   76.797921]  kunit_try_run_case+0x80/0x184
[   76.798597]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.799437]  kthread+0x16c/0x21c
[   76.800109]  ret_from_fork+0x10/0x20
[   76.800792] 
[   76.801167] Freed by task 167:
[   76.801651]  kasan_set_track+0x4c/0x80
[   76.802319]  kasan_save_free_info+0x3c/0x60
[   76.803003]  ____kasan_slab_free+0xe8/0x140
[   76.803782]  __kasan_slab_free+0x18/0x28
[   76.804498]  __kmem_cache_free+0xdc/0x27c
[   76.805172]  kfree_sensitive+0x88/0xa4
[   76.805735]  kmalloc_double_kzfree+0x90/0x144
[   76.806196]  kunit_try_run_case+0x80/0x184
[   76.806619]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.807140]  kthread+0x16c/0x21c
[   76.807532]  ret_from_fork+0x10/0x20
[   76.808307] 
[   76.808655] The buggy address belongs to the object at ffff0000c58a7b00
[   76.808655]  which belongs to the cache kmalloc-128 of size 128
[   76.810120] The buggy address is located 0 bytes inside of
[   76.810120]  128-byte region [ffff0000c58a7b00, ffff0000c58a7b80)
[   76.811477] 
[   76.811824] The buggy address belongs to the physical page:
[   76.812616] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.813772] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.814725] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.815734] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.816686] page dumped because: kasan: bad access detected
[   76.817390] 
[   76.817675] Memory state around the buggy address:
[   76.818315]  ffff0000c58a7a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.819239]  ffff0000c58a7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.820262] >ffff0000c58a7b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.821241]                    ^
[   76.821793]  ffff0000c58a7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.822697]  ffff0000c58a7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.823238] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strnlen
[   76.130871] ==================================================================
[   76.131485] BUG: KASAN: use-after-free in strnlen+0x3c/0x74
[   76.132344] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   76.133237] 
[   76.133575] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.134412] Hardware name: linux,dummy-virt (DT)
[   76.134864] Call trace:
[   76.135137]  dump_backtrace+0xf4/0x114
[   76.135654]  show_stack+0x18/0x24
[   76.136187]  __dump_stack+0x28/0x38
[   76.136794]  dump_stack_lvl+0x50/0x68
[   76.137233]  print_address_description+0x7c/0x1ec
[   76.137812]  print_report+0x50/0x68
[   76.138277]  kasan_report+0xac/0xfc
[   76.138747]  __asan_load1+0x6c/0x70
[   76.139189]  strnlen+0x3c/0x74
[   76.139582]  kasan_strings+0x234/0x404
[   76.140111]  kunit_try_run_case+0x80/0x184
[   76.140701]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.141360]  kthread+0x16c/0x21c
[   76.141819]  ret_from_fork+0x10/0x20
[   76.142348] 
[   76.142574] Allocated by task 164:
[   76.142924]  kasan_set_track+0x4c/0x80
[   76.143444]  kasan_save_alloc_info+0x28/0x34
[   76.144016]  __kasan_kmalloc+0x88/0xa0
[   76.144594]  kmalloc_trace+0x54/0x68
[   76.145091]  kasan_strings+0x48/0x404
[   76.145566]  kunit_try_run_case+0x80/0x184
[   76.146065]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.146647]  kthread+0x16c/0x21c
[   76.147096]  ret_from_fork+0x10/0x20
[   76.147544] 
[   76.147767] Freed by task 164:
[   76.148145]  kasan_set_track+0x4c/0x80
[   76.148689]  kasan_save_free_info+0x3c/0x60
[   76.149161]  ____kasan_slab_free+0xe8/0x140
[   76.149714]  __kasan_slab_free+0x18/0x28
[   76.150265]  __kmem_cache_free+0xdc/0x27c
[   76.150754]  kfree+0x60/0x74
[   76.151131]  kasan_strings+0x90/0x404
[   76.151610]  kunit_try_run_case+0x80/0x184
[   76.152356]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.152972]  kthread+0x16c/0x21c
[   76.153384]  ret_from_fork+0x10/0x20
[   76.153838] 
[   76.154037] The buggy address belongs to the object at ffff0000c58a7500
[   76.154037]  which belongs to the cache kmalloc-128 of size 128
[   76.154984] The buggy address is located 16 bytes inside of
[   76.154984]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   76.155954] 
[   76.156243] The buggy address belongs to the physical page:
[   76.156795] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.157748] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.158513] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.159227] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.159929] page dumped because: kasan: bad access detected
[   76.160538] 
[   76.160922] Memory state around the buggy address:
[   76.161357]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.161981]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.162616] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.163191]                          ^
[   76.163562]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.164148]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.164816] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strlen
[   76.094900] ==================================================================
[   76.095487] BUG: KASAN: use-after-free in strlen+0x28/0x50
[   76.096123] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   76.096815] 
[   76.097132] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.098028] Hardware name: linux,dummy-virt (DT)
[   76.098510] Call trace:
[   76.098803]  dump_backtrace+0xf4/0x114
[   76.099322]  show_stack+0x18/0x24
[   76.099876]  __dump_stack+0x28/0x38
[   76.100362]  dump_stack_lvl+0x50/0x68
[   76.100874]  print_address_description+0x7c/0x1ec
[   76.101518]  print_report+0x50/0x68
[   76.102012]  kasan_report+0xac/0xfc
[   76.102501]  __asan_load1+0x6c/0x70
[   76.103039]  strlen+0x28/0x50
[   76.103457]  kasan_strings+0x1e8/0x404
[   76.104052]  kunit_try_run_case+0x80/0x184
[   76.104607]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.105206]  kthread+0x16c/0x21c
[   76.105645]  ret_from_fork+0x10/0x20
[   76.106086] 
[   76.106308] Allocated by task 164:
[   76.106672]  kasan_set_track+0x4c/0x80
[   76.107157]  kasan_save_alloc_info+0x28/0x34
[   76.107635]  __kasan_kmalloc+0x88/0xa0
[   76.108215]  kmalloc_trace+0x54/0x68
[   76.108796]  kasan_strings+0x48/0x404
[   76.109462]  kunit_try_run_case+0x80/0x184
[   76.110066]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.110767]  kthread+0x16c/0x21c
[   76.111313]  ret_from_fork+0x10/0x20
[   76.111956] 
[   76.112164] Freed by task 164:
[   76.112692]  kasan_set_track+0x4c/0x80
[   76.113197]  kasan_save_free_info+0x3c/0x60
[   76.113722]  ____kasan_slab_free+0xe8/0x140
[   76.114251]  __kasan_slab_free+0x18/0x28
[   76.114748]  __kmem_cache_free+0xdc/0x27c
[   76.115214]  kfree+0x60/0x74
[   76.115632]  kasan_strings+0x90/0x404
[   76.116178]  kunit_try_run_case+0x80/0x184
[   76.116659]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.117363]  kthread+0x16c/0x21c
[   76.117833]  ret_from_fork+0x10/0x20
[   76.118288] 
[   76.118520] The buggy address belongs to the object at ffff0000c58a7500
[   76.118520]  which belongs to the cache kmalloc-128 of size 128
[   76.119474] The buggy address is located 16 bytes inside of
[   76.119474]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   76.120557] 
[   76.120809] The buggy address belongs to the physical page:
[   76.121569] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.122365] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.123113] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.123792] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.124526] page dumped because: kasan: bad access detected
[   76.125034] 
[   76.125279] Memory state around the buggy address:
[   76.125682]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.126501]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.127177] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.127890]                          ^
[   76.128475]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.129198]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.129864] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strncmp
[   76.057400] ==================================================================
[   76.057892] BUG: KASAN: use-after-free in strncmp+0x3c/0xa0
[   76.058480] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   76.059117] 
[   76.059332] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.060284] Hardware name: linux,dummy-virt (DT)
[   76.060958] Call trace:
[   76.061237]  dump_backtrace+0xf4/0x114
[   76.061771]  show_stack+0x18/0x24
[   76.062224]  __dump_stack+0x28/0x38
[   76.062732]  dump_stack_lvl+0x50/0x68
[   76.063205]  print_address_description+0x7c/0x1ec
[   76.064304]  print_report+0x50/0x68
[   76.064838]  kasan_report+0xac/0xfc
[   76.065325]  __asan_load1+0x6c/0x70
[   76.065830]  strncmp+0x3c/0xa0
[   76.066272]  kasan_strings+0x1a0/0x404
[   76.066695]  kunit_try_run_case+0x80/0x184
[   76.067180]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.068013]  kthread+0x16c/0x21c
[   76.068448]  ret_from_fork+0x10/0x20
[   76.068920] 
[   76.069137] Allocated by task 164:
[   76.069492]  kasan_set_track+0x4c/0x80
[   76.070005]  kasan_save_alloc_info+0x28/0x34
[   76.070462]  __kasan_kmalloc+0x88/0xa0
[   76.070956]  kmalloc_trace+0x54/0x68
[   76.071380]  kasan_strings+0x48/0x404
[   76.072335]  kunit_try_run_case+0x80/0x184
[   76.072876]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.073440]  kthread+0x16c/0x21c
[   76.073867]  ret_from_fork+0x10/0x20
[   76.074318] 
[   76.074509] Freed by task 164:
[   76.074874]  kasan_set_track+0x4c/0x80
[   76.075377]  kasan_save_free_info+0x3c/0x60
[   76.076102]  ____kasan_slab_free+0xe8/0x140
[   76.076644]  __kasan_slab_free+0x18/0x28
[   76.077129]  __kmem_cache_free+0xdc/0x27c
[   76.077581]  kfree+0x60/0x74
[   76.077975]  kasan_strings+0x90/0x404
[   76.078422]  kunit_try_run_case+0x80/0x184
[   76.078925]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.079480]  kthread+0x16c/0x21c
[   76.080450]  ret_from_fork+0x10/0x20
[   76.080924] 
[   76.081152] The buggy address belongs to the object at ffff0000c58a7500
[   76.081152]  which belongs to the cache kmalloc-128 of size 128
[   76.082112] The buggy address is located 16 bytes inside of
[   76.082112]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   76.082847] 
[   76.083039] The buggy address belongs to the physical page:
[   76.083409] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.084884] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.085848] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.086838] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.088250] page dumped because: kasan: bad access detected
[   76.088962] 
[   76.089242] Memory state around the buggy address:
[   76.089877]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.090771]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.091382] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.092230]                          ^
[   76.092656]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.093315]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.093920] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strcmp
[   76.011985] ==================================================================
[   76.012888] BUG: KASAN: use-after-free in strcmp+0x30/0x84
[   76.013662] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   76.014575] 
[   76.014872] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.016001] Hardware name: linux,dummy-virt (DT)
[   76.016837] Call trace:
[   76.017317]  dump_backtrace+0xf4/0x114
[   76.018022]  show_stack+0x18/0x24
[   76.018667]  __dump_stack+0x28/0x38
[   76.019272]  dump_stack_lvl+0x50/0x68
[   76.019975]  print_address_description+0x7c/0x1ec
[   76.020885]  print_report+0x50/0x68
[   76.021555]  kasan_report+0xac/0xfc
[   76.022196]  __asan_load1+0x6c/0x70
[   76.022692]  strcmp+0x30/0x84
[   76.023039]  kasan_strings+0x148/0x404
[   76.023436]  kunit_try_run_case+0x80/0x184
[   76.023940]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.024833]  kthread+0x16c/0x21c
[   76.025453]  ret_from_fork+0x10/0x20
[   76.025929] 
[   76.026119] Allocated by task 164:
[   76.026409]  kasan_set_track+0x4c/0x80
[   76.026985]  kasan_save_alloc_info+0x28/0x34
[   76.027705]  __kasan_kmalloc+0x88/0xa0
[   76.028431]  kmalloc_trace+0x54/0x68
[   76.029096]  kasan_strings+0x48/0x404
[   76.029783]  kunit_try_run_case+0x80/0x184
[   76.030508]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.031376]  kthread+0x16c/0x21c
[   76.032177]  ret_from_fork+0x10/0x20
[   76.032962] 
[   76.033247] Freed by task 164:
[   76.033798]  kasan_set_track+0x4c/0x80
[   76.034463]  kasan_save_free_info+0x3c/0x60
[   76.035134]  ____kasan_slab_free+0xe8/0x140
[   76.035906]  __kasan_slab_free+0x18/0x28
[   76.036420]  __kmem_cache_free+0xdc/0x27c
[   76.036846]  kfree+0x60/0x74
[   76.037184]  kasan_strings+0x90/0x404
[   76.037575]  kunit_try_run_case+0x80/0x184
[   76.037999]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.038494]  kthread+0x16c/0x21c
[   76.039032]  ret_from_fork+0x10/0x20
[   76.039613] 
[   76.039900] The buggy address belongs to the object at ffff0000c58a7500
[   76.039900]  which belongs to the cache kmalloc-128 of size 128
[   76.041499] The buggy address is located 16 bytes inside of
[   76.041499]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   76.042973] 
[   76.043271] The buggy address belongs to the physical page:
[   76.044286] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.045468] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.046415] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.047408] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.048466] page dumped because: kasan: bad access detected
[   76.049524] 
[   76.049831] Memory state around the buggy address:
[   76.050463]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.051365]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.052376] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.053508]                          ^
[   76.054055]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.054955]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.055858] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strrchr
[   75.963529] ==================================================================
[   75.964659] BUG: KASAN: use-after-free in strrchr+0x34/0x68
[   75.965472] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   75.966388] 
[   75.966681] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.968242] Hardware name: linux,dummy-virt (DT)
[   75.969280] Call trace:
[   75.969684]  dump_backtrace+0xf4/0x114
[   75.970428]  show_stack+0x18/0x24
[   75.971042]  __dump_stack+0x28/0x38
[   75.971995]  dump_stack_lvl+0x50/0x68
[   75.972421]  print_address_description+0x7c/0x1ec
[   75.972942]  print_report+0x50/0x68
[   75.973363]  kasan_report+0xac/0xfc
[   75.974411]  __asan_load1+0x6c/0x70
[   75.975195]  strrchr+0x34/0x68
[   75.975944]  kasan_strings+0xf8/0x404
[   75.976536]  kunit_try_run_case+0x80/0x184
[   75.977796]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.978638]  kthread+0x16c/0x21c
[   75.979583]  ret_from_fork+0x10/0x20
[   75.980593] 
[   75.981084] Allocated by task 164:
[   75.981661]  kasan_set_track+0x4c/0x80
[   75.982602]  kasan_save_alloc_info+0x28/0x34
[   75.983218]  __kasan_kmalloc+0x88/0xa0
[   75.983888]  kmalloc_trace+0x54/0x68
[   75.984611]  kasan_strings+0x48/0x404
[   75.985495]  kunit_try_run_case+0x80/0x184
[   75.986407]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.987490]  kthread+0x16c/0x21c
[   75.988373]  ret_from_fork+0x10/0x20
[   75.989096] 
[   75.989291] Freed by task 164:
[   75.989572]  kasan_set_track+0x4c/0x80
[   75.990330]  kasan_save_free_info+0x3c/0x60
[   75.991025]  ____kasan_slab_free+0xe8/0x140
[   75.991798]  __kasan_slab_free+0x18/0x28
[   75.992601]  __kmem_cache_free+0xdc/0x27c
[   75.993307]  kfree+0x60/0x74
[   75.993875]  kasan_strings+0x90/0x404
[   75.994518]  kunit_try_run_case+0x80/0x184
[   75.995208]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.995882]  kthread+0x16c/0x21c
[   75.996279]  ret_from_fork+0x10/0x20
[   75.996653] 
[   75.996883] The buggy address belongs to the object at ffff0000c58a7500
[   75.996883]  which belongs to the cache kmalloc-128 of size 128
[   75.998530] The buggy address is located 16 bytes inside of
[   75.998530]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   76.000003] 
[   76.000331] The buggy address belongs to the physical page:
[   76.001133] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   76.002316] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.003149] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.003699] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.004876] page dumped because: kasan: bad access detected
[   76.005596] 
[   76.005882] Memory state around the buggy address:
[   76.006505]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.007396]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.008408] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.009425]                          ^
[   76.010047]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.010758]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.011219] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strchr
[   75.916364] ==================================================================
[   75.917414] BUG: KASAN: use-after-free in strchr+0x20/0x6c
[   75.917907] Read of size 1 at addr ffff0000c58a7510 by task kunit_try_catch/164
[   75.918414] 
[   75.918621] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.920393] Hardware name: linux,dummy-virt (DT)
[   75.921313] Call trace:
[   75.921916]  dump_backtrace+0xf4/0x114
[   75.922717]  show_stack+0x18/0x24
[   75.923508]  __dump_stack+0x28/0x38
[   75.924303]  dump_stack_lvl+0x50/0x68
[   75.925032]  print_address_description+0x7c/0x1ec
[   75.925926]  print_report+0x50/0x68
[   75.926650]  kasan_report+0xac/0xfc
[   75.927390]  __asan_load1+0x6c/0x70
[   75.928202]  strchr+0x20/0x6c
[   75.928795]  kasan_strings+0xa8/0x404
[   75.929602]  kunit_try_run_case+0x80/0x184
[   75.930430]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.931376]  kthread+0x16c/0x21c
[   75.932582]  ret_from_fork+0x10/0x20
[   75.933236] 
[   75.933552] Allocated by task 164:
[   75.934084]  kasan_set_track+0x4c/0x80
[   75.934775]  kasan_save_alloc_info+0x28/0x34
[   75.935341]  __kasan_kmalloc+0x88/0xa0
[   75.936354]  kmalloc_trace+0x54/0x68
[   75.936983]  kasan_strings+0x48/0x404
[   75.937589]  kunit_try_run_case+0x80/0x184
[   75.938254]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.939069]  kthread+0x16c/0x21c
[   75.939525]  ret_from_fork+0x10/0x20
[   75.940144] 
[   75.940612] Freed by task 164:
[   75.941093]  kasan_set_track+0x4c/0x80
[   75.941733]  kasan_save_free_info+0x3c/0x60
[   75.942194]  ____kasan_slab_free+0xe8/0x140
[   75.942639]  __kasan_slab_free+0x18/0x28
[   75.943076]  __kmem_cache_free+0xdc/0x27c
[   75.943484]  kfree+0x60/0x74
[   75.944500]  kasan_strings+0x90/0x404
[   75.945136]  kunit_try_run_case+0x80/0x184
[   75.945810]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.946616]  kthread+0x16c/0x21c
[   75.947209]  ret_from_fork+0x10/0x20
[   75.947857] 
[   75.948078] The buggy address belongs to the object at ffff0000c58a7500
[   75.948078]  which belongs to the cache kmalloc-128 of size 128
[   75.949024] The buggy address is located 16 bytes inside of
[   75.949024]  128-byte region [ffff0000c58a7500, ffff0000c58a7580)
[   75.950197] 
[   75.950401] The buggy address belongs to the physical page:
[   75.950866] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   75.952127] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.953100] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.954089] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.955002] page dumped because: kasan: bad access detected
[   75.955958] 
[   75.956252] Memory state around the buggy address:
[   75.956887]  ffff0000c58a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.957789]  ffff0000c58a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.958679] >ffff0000c58a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.959375]                          ^
[   75.959719]  ffff0000c58a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.961129]  ffff0000c58a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.962030] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   75.877435] ==================================================================
[   75.878180] BUG: KASAN: slab-out-of-bounds in memcmp+0x8c/0xd8
[   75.878666] Read of size 1 at addr ffff0000c58a3b18 by task kunit_try_catch/163
[   75.879775] 
[   75.880121] CPU: 1 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.881222] Hardware name: linux,dummy-virt (DT)
[   75.881873] Call trace:
[   75.882276]  dump_backtrace+0xf4/0x114
[   75.882957]  show_stack+0x18/0x24
[   75.883578]  __dump_stack+0x28/0x38
[   75.884347]  dump_stack_lvl+0x50/0x68
[   75.884986]  print_address_description+0x7c/0x1ec
[   75.885772]  print_report+0x50/0x68
[   75.886409]  kasan_report+0xac/0xfc
[   75.887047]  __asan_load1+0x6c/0x70
[   75.887685]  memcmp+0x8c/0xd8
[   75.888272]  kasan_memcmp+0xc8/0x178
[   75.888888]  kunit_try_run_case+0x80/0x184
[   75.889432]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.890195]  kthread+0x16c/0x21c
[   75.890779]  ret_from_fork+0x10/0x20
[   75.891362] 
[   75.891634] Allocated by task 163:
[   75.892221]  kasan_set_track+0x4c/0x80
[   75.892894]  kasan_save_alloc_info+0x28/0x34
[   75.893547]  __kasan_kmalloc+0x88/0xa0
[   75.894189]  kmalloc_trace+0x54/0x68
[   75.894615]  kasan_memcmp+0x58/0x178
[   75.895020]  kunit_try_run_case+0x80/0x184
[   75.895441]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.896342]  kthread+0x16c/0x21c
[   75.896954]  ret_from_fork+0x10/0x20
[   75.897547] 
[   75.897834] The buggy address belongs to the object at ffff0000c58a3b00
[   75.897834]  which belongs to the cache kmalloc-128 of size 128
[   75.899235] The buggy address is located 24 bytes inside of
[   75.899235]  128-byte region [ffff0000c58a3b00, ffff0000c58a3b80)
[   75.900731] 
[   75.901135] The buggy address belongs to the physical page:
[   75.901871] page:000000002b58a59c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a3
[   75.902999] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.904045] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.905044] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.905779] page dumped because: kasan: bad access detected
[   75.906459] 
[   75.906730] Memory state around the buggy address:
[   75.907258]  ffff0000c58a3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.908029]  ffff0000c58a3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.909021] >ffff0000c58a3b00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.909907]                             ^
[   75.910471]  ffff0000c58a3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.911370]  ffff0000c58a3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.912285] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[   75.837771] ==================================================================
[   75.838719] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64
[   75.839322] Read of size 1 at addr ffff0000c58a7118 by task kunit_try_catch/162
[   75.840487] 
[   75.840708] CPU: 0 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.841555] Hardware name: linux,dummy-virt (DT)
[   75.841930] Call trace:
[   75.842174]  dump_backtrace+0xf4/0x114
[   75.842601]  show_stack+0x18/0x24
[   75.843584]  __dump_stack+0x28/0x38
[   75.844464]  dump_stack_lvl+0x50/0x68
[   75.845237]  print_address_description+0x7c/0x1ec
[   75.846142]  print_report+0x50/0x68
[   75.846919]  kasan_report+0xac/0xfc
[   75.847711]  __asan_load1+0x6c/0x70
[   75.848599]  memchr+0x34/0x64
[   75.849263]  kasan_memchr+0xa8/0x158
[   75.849918]  kunit_try_run_case+0x80/0x184
[   75.850597]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.851429]  kthread+0x16c/0x21c
[   75.852260]  ret_from_fork+0x10/0x20
[   75.852902] 
[   75.853201] Allocated by task 162:
[   75.853703]  kasan_set_track+0x4c/0x80
[   75.854373]  kasan_save_alloc_info+0x28/0x34
[   75.854854]  __kasan_kmalloc+0x88/0xa0
[   75.855280]  kmalloc_trace+0x54/0x68
[   75.855663]  kasan_memchr+0x48/0x158
[   75.856377]  kunit_try_run_case+0x80/0x184
[   75.857180]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.858069]  kthread+0x16c/0x21c
[   75.858656]  ret_from_fork+0x10/0x20
[   75.859269] 
[   75.859566] The buggy address belongs to the object at ffff0000c58a7100
[   75.859566]  which belongs to the cache kmalloc-128 of size 128
[   75.861204] The buggy address is located 24 bytes inside of
[   75.861204]  128-byte region [ffff0000c58a7100, ffff0000c58a7180)
[   75.862625] 
[   75.862936] The buggy address belongs to the physical page:
[   75.863638] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   75.864930] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.865993] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.866995] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.867584] page dumped because: kasan: bad access detected
[   75.868307] 
[   75.868662] Memory state around the buggy address:
[   75.869331]  ffff0000c58a7000: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.870257]  ffff0000c58a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.871178] >ffff0000c58a7100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.871998]                             ^
[   75.872684]  ffff0000c58a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.873385]  ffff0000c58a7200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.873872] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmem_cache_double_destroy
[   75.792417] ==================================================================
[   75.793732] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xa4/0x144
[   75.794496] Read of size 1 at addr ffff0000c159ed80 by task kunit_try_catch/161
[   75.795134] 
[   75.795379] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.797193] Hardware name: linux,dummy-virt (DT)
[   75.797570] Call trace:
[   75.797824]  dump_backtrace+0xf4/0x114
[   75.798602]  show_stack+0x18/0x24
[   75.799037]  __dump_stack+0x28/0x38
[   75.799430]  dump_stack_lvl+0x50/0x68
[   75.800230]  print_address_description+0x7c/0x1ec
[   75.801191]  print_report+0x50/0x68
[   75.802015]  kasan_report+0xac/0xfc
[   75.802798]  __kasan_check_byte+0x3c/0x54
[   75.803609]  kmem_cache_destroy+0x3c/0x14c
[   75.804469]  kmem_cache_double_destroy+0xa4/0x144
[   75.805180]  kunit_try_run_case+0x80/0x184
[   75.805617]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.806325]  kthread+0x16c/0x21c
[   75.806825]  ret_from_fork+0x10/0x20
[   75.807303] 
[   75.807566] Allocated by task 161:
[   75.807997]  kasan_set_track+0x4c/0x80
[   75.808544]  kasan_save_alloc_info+0x28/0x34
[   75.809049]  __kasan_slab_alloc+0x58/0x70
[   75.809554]  slab_post_alloc_hook+0x70/0x2e8
[   75.810032]  kmem_cache_alloc+0x164/0x254
[   75.810549]  kmem_cache_create_usercopy+0x108/0x2a0
[   75.811065]  kmem_cache_create+0x1c/0x28
[   75.811495]  kmem_cache_double_destroy+0x48/0x144
[   75.812071]  kunit_try_run_case+0x80/0x184
[   75.812639]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.813313]  kthread+0x16c/0x21c
[   75.813748]  ret_from_fork+0x10/0x20
[   75.814166] 
[   75.814404] Freed by task 161:
[   75.814758]  kasan_set_track+0x4c/0x80
[   75.815261]  kasan_save_free_info+0x3c/0x60
[   75.815759]  ____kasan_slab_free+0xe8/0x140
[   75.816418]  __kasan_slab_free+0x18/0x28
[   75.816926]  kmem_cache_free+0xe0/0x34c
[   75.817406]  slab_kmem_cache_release+0x30/0x40
[   75.817888]  kmem_cache_release+0x14/0x20
[   75.818379]  kobject_put+0xd8/0x13c
[   75.818788]  sysfs_slab_release+0x28/0x34
[   75.819232]  kmem_cache_destroy+0x148/0x14c
[   75.819883]  kmem_cache_double_destroy+0x90/0x144
[   75.820389]  kunit_try_run_case+0x80/0x184
[   75.820873]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.821437]  kthread+0x16c/0x21c
[   75.821884]  ret_from_fork+0x10/0x20
[   75.822308] 
[   75.822511] The buggy address belongs to the object at ffff0000c159ed80
[   75.822511]  which belongs to the cache kmem_cache of size 216
[   75.823460] The buggy address is located 0 bytes inside of
[   75.823460]  216-byte region [ffff0000c159ed80, ffff0000c159ee58)
[   75.824508] 
[   75.824761] The buggy address belongs to the physical page:
[   75.825260] page:00000000acb072d7 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10159e
[   75.826064] head:00000000acb072d7 order:1 compound_mapcount:0 compound_pincount:0
[   75.826707] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.827486] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[   75.828372] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[   75.829028] page dumped because: kasan: bad access detected
[   75.829519] 
[   75.829711] Memory state around the buggy address:
[   75.830168]  ffff0000c159ec80: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   75.830812]  ffff0000c159ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.831432] >ffff0000c159ed80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.832513]                    ^
[   75.832914]  ffff0000c159ee00: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   75.833556]  ffff0000c159ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.834167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   75.743415] ==================================================================
[   75.745480] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8
[   75.746468] Free of addr ffff0000c58a7001 by task kunit_try_catch/160
[   75.747280] 
[   75.747573] CPU: 1 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.748777] Hardware name: linux,dummy-virt (DT)
[   75.749474] Call trace:
[   75.749894]  dump_backtrace+0xf4/0x114
[   75.750542]  show_stack+0x18/0x24
[   75.751143]  __dump_stack+0x28/0x38
[   75.751782]  dump_stack_lvl+0x50/0x68
[   75.752260]  print_address_description+0x7c/0x1ec
[   75.752776]  print_report+0x50/0x68
[   75.753221]  kasan_report_invalid_free+0x9c/0xe4
[   75.753836]  ____kasan_slab_free+0x108/0x140
[   75.754409]  __kasan_slab_free+0x18/0x28
[   75.754900]  kmem_cache_free+0xe0/0x34c
[   75.755360]  kmem_cache_invalid_free+0xb0/0x1b8
[   75.755863]  kunit_try_run_case+0x80/0x184
[   75.756324]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.756909]  kthread+0x16c/0x21c
[   75.757366]  ret_from_fork+0x10/0x20
[   75.757815] 
[   75.758013] Allocated by task 160:
[   75.758351]  kasan_set_track+0x4c/0x80
[   75.758811]  kasan_save_alloc_info+0x28/0x34
[   75.759263]  __kasan_slab_alloc+0x58/0x70
[   75.759815]  slab_post_alloc_hook+0x70/0x2e8
[   75.760326]  kmem_cache_alloc+0x164/0x254
[   75.760765]  kmem_cache_invalid_free+0x90/0x1b8
[   75.761258]  kunit_try_run_case+0x80/0x184
[   75.762341]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.762958]  kthread+0x16c/0x21c
[   75.763375]  ret_from_fork+0x10/0x20
[   75.763827] 
[   75.764027] The buggy address belongs to the object at ffff0000c58a7000
[   75.764027]  which belongs to the cache test_cache of size 200
[   75.764974] The buggy address is located 1 bytes inside of
[   75.764974]  200-byte region [ffff0000c58a7000, ffff0000c58a70c8)
[   75.765916] 
[   75.766123] The buggy address belongs to the physical page:
[   75.766590] page:00000000333134b1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a7
[   75.767306] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.768595] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159ec00
[   75.769301] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   75.769951] page dumped because: kasan: bad access detected
[   75.770427] 
[   75.770616] Memory state around the buggy address:
[   75.771105]  ffff0000c58a6f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.771727]  ffff0000c58a6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.772342] >ffff0000c58a7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.772963]                    ^
[   75.773336]  ffff0000c58a7080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   75.774004]  ffff0000c58a7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.774570] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   75.684303] ==================================================================
[   75.685401] BUG: KASAN: double-free in kmem_cache_double_free+0xbc/0x1b8
[   75.686442] Free of addr ffff0000c58a5000 by task kunit_try_catch/159
[   75.687272] 
[   75.687486] CPU: 1 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.688665] Hardware name: linux,dummy-virt (DT)
[   75.689317] Call trace:
[   75.689726]  dump_backtrace+0xf4/0x114
[   75.690415]  show_stack+0x18/0x24
[   75.691039]  __dump_stack+0x28/0x38
[   75.691641]  dump_stack_lvl+0x50/0x68
[   75.692376]  print_address_description+0x7c/0x1ec
[   75.693178]  print_report+0x50/0x68
[   75.693824]  kasan_report_invalid_free+0x9c/0xe4
[   75.694464]  ____kasan_slab_free+0x108/0x140
[   75.694932]  __kasan_slab_free+0x18/0x28
[   75.695374]  kmem_cache_free+0xe0/0x34c
[   75.696108]  kmem_cache_double_free+0xbc/0x1b8
[   75.696856]  kunit_try_run_case+0x80/0x184
[   75.697548]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.698388]  kthread+0x16c/0x21c
[   75.698998]  ret_from_fork+0x10/0x20
[   75.699612] 
[   75.699945] Allocated by task 159:
[   75.700477]  kasan_set_track+0x4c/0x80
[   75.701138]  kasan_save_alloc_info+0x28/0x34
[   75.701824]  __kasan_slab_alloc+0x58/0x70
[   75.702507]  slab_post_alloc_hook+0x70/0x2e8
[   75.703192]  kmem_cache_alloc+0x164/0x254
[   75.703932]  kmem_cache_double_free+0x90/0x1b8
[   75.704694]  kunit_try_run_case+0x80/0x184
[   75.705452]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.706288]  kthread+0x16c/0x21c
[   75.706892]  ret_from_fork+0x10/0x20
[   75.707496] 
[   75.707825] Freed by task 159:
[   75.708365]  kasan_set_track+0x4c/0x80
[   75.709563]  kasan_save_free_info+0x3c/0x60
[   75.710073]  ____kasan_slab_free+0xe8/0x140
[   75.710530]  __kasan_slab_free+0x18/0x28
[   75.711349]  kmem_cache_free+0xe0/0x34c
[   75.712444]  kmem_cache_double_free+0xa4/0x1b8
[   75.713673]  kunit_try_run_case+0x80/0x184
[   75.714163]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.714665]  kthread+0x16c/0x21c
[   75.715120]  ret_from_fork+0x10/0x20
[   75.715536] 
[   75.716862] The buggy address belongs to the object at ffff0000c58a5000
[   75.716862]  which belongs to the cache test_cache of size 200
[   75.717709] The buggy address is located 0 bytes inside of
[   75.717709]  200-byte region [ffff0000c58a5000, ffff0000c58a50c8)
[   75.719110] 
[   75.719317] The buggy address belongs to the physical page:
[   75.719708] page:000000004e985ca6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058a5
[   75.720985] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.721952] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159ea80
[   75.722940] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   75.723915] page dumped because: kasan: bad access detected
[   75.725073] 
[   75.725269] Memory state around the buggy address:
[   75.725640]  ffff0000c58a4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.726152]  ffff0000c58a4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.726650] >ffff0000c58a5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.727514]                    ^
[   75.728235]  ffff0000c58a5080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   75.729184]  ffff0000c58a5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.730063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-ksize_uaf
[   75.590434] ==================================================================
[   75.591328] BUG: KASAN: use-after-free in ksize_uaf+0xe8/0x24c
[   75.592119] Read of size 1 at addr ffff0000c5a06600 by task kunit_try_catch/158
[   75.593131] 
[   75.593456] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.594523] Hardware name: linux,dummy-virt (DT)
[   75.594936] Call trace:
[   75.595176]  dump_backtrace+0xf4/0x114
[   75.595599]  show_stack+0x18/0x24
[   75.596287]  __dump_stack+0x28/0x38
[   75.596910]  dump_stack_lvl+0x50/0x68
[   75.597562]  print_address_description+0x7c/0x1ec
[   75.598314]  print_report+0x50/0x68
[   75.598927]  kasan_report+0xac/0xfc
[   75.599540]  __asan_load1+0x6c/0x70
[   75.600273]  ksize_uaf+0xe8/0x24c
[   75.600852]  kunit_try_run_case+0x80/0x184
[   75.601521]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.602337]  kthread+0x16c/0x21c
[   75.602921]  ret_from_fork+0x10/0x20
[   75.603526] 
[   75.603870] Allocated by task 158:
[   75.604367]  kasan_set_track+0x4c/0x80
[   75.604808]  kasan_save_alloc_info+0x28/0x34
[   75.605214]  __kasan_kmalloc+0x88/0xa0
[   75.605640]  kmalloc_trace+0x54/0x68
[   75.606238]  ksize_uaf+0x48/0x24c
[   75.606805]  kunit_try_run_case+0x80/0x184
[   75.607468]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.608382]  kthread+0x16c/0x21c
[   75.608999]  ret_from_fork+0x10/0x20
[   75.609599] 
[   75.609884] Freed by task 158:
[   75.610337]  kasan_set_track+0x4c/0x80
[   75.610974]  kasan_save_free_info+0x3c/0x60
[   75.611620]  ____kasan_slab_free+0xe8/0x140
[   75.612411]  __kasan_slab_free+0x18/0x28
[   75.613113]  __kmem_cache_free+0xdc/0x27c
[   75.613759]  kfree+0x60/0x74
[   75.614273]  ksize_uaf+0x90/0x24c
[   75.614841]  kunit_try_run_case+0x80/0x184
[   75.615500]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.616414]  kthread+0x16c/0x21c
[   75.617058]  ret_from_fork+0x10/0x20
[   75.617652] 
[   75.617937] The buggy address belongs to the object at ffff0000c5a06600
[   75.617937]  which belongs to the cache kmalloc-128 of size 128
[   75.619330] The buggy address is located 0 bytes inside of
[   75.619330]  128-byte region [ffff0000c5a06600, ffff0000c5a06680)
[   75.620760] 
[   75.621067] The buggy address belongs to the physical page:
[   75.621772] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06
[   75.622674] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.623252] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.623947] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.624950] page dumped because: kasan: bad access detected
[   75.625652] 
[   75.625935] Memory state around the buggy address:
[   75.626565]  ffff0000c5a06500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.627459]  ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.628479] >ffff0000c5a06600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.629518]                    ^
[   75.630062]  ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.630983]  ffff0000c5a06700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.631926] ==================================================================
[   75.545296] ==================================================================
[   75.546698] BUG: KASAN: use-after-free in ksize_uaf+0xa4/0x24c
[   75.547537] Read of size 1 at addr ffff0000c5a06600 by task kunit_try_catch/158
[   75.548619] 
[   75.548967] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.550167] Hardware name: linux,dummy-virt (DT)
[   75.550780] Call trace:
[   75.551159]  dump_backtrace+0xf4/0x114
[   75.551872]  show_stack+0x18/0x24
[   75.552554]  __dump_stack+0x28/0x38
[   75.553153]  dump_stack_lvl+0x50/0x68
[   75.553773]  print_address_description+0x7c/0x1ec
[   75.554301]  print_report+0x50/0x68
[   75.554712]  kasan_report+0xac/0xfc
[   75.555348]  __kasan_check_byte+0x3c/0x54
[   75.556123]  ksize+0x34/0x13c
[   75.556716]  ksize_uaf+0xa4/0x24c
[   75.557299]  kunit_try_run_case+0x80/0x184
[   75.557984]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.558803]  kthread+0x16c/0x21c
[   75.559375]  ret_from_fork+0x10/0x20
[   75.560061] 
[   75.560488] Allocated by task 158:
[   75.561004]  kasan_set_track+0x4c/0x80
[   75.561624]  kasan_save_alloc_info+0x28/0x34
[   75.562047]  __kasan_kmalloc+0x88/0xa0
[   75.562469]  kmalloc_trace+0x54/0x68
[   75.562983]  ksize_uaf+0x48/0x24c
[   75.563539]  kunit_try_run_case+0x80/0x184
[   75.564346]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.565219]  kthread+0x16c/0x21c
[   75.565812]  ret_from_fork+0x10/0x20
[   75.566399] 
[   75.566672] Freed by task 158:
[   75.567138]  kasan_set_track+0x4c/0x80
[   75.567828]  kasan_save_free_info+0x3c/0x60
[   75.568489]  ____kasan_slab_free+0xe8/0x140
[   75.569185]  __kasan_slab_free+0x18/0x28
[   75.569848]  __kmem_cache_free+0xdc/0x27c
[   75.570483]  kfree+0x60/0x74
[   75.571011]  ksize_uaf+0x90/0x24c
[   75.571578]  kunit_try_run_case+0x80/0x184
[   75.572341]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.573225]  kthread+0x16c/0x21c
[   75.573822]  ret_from_fork+0x10/0x20
[   75.574254] 
[   75.574442] The buggy address belongs to the object at ffff0000c5a06600
[   75.574442]  which belongs to the cache kmalloc-128 of size 128
[   75.575173] The buggy address is located 0 bytes inside of
[   75.575173]  128-byte region [ffff0000c5a06600, ffff0000c5a06680)
[   75.576223] 
[   75.576508] The buggy address belongs to the physical page:
[   75.577338] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06
[   75.578485] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.579463] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.580531] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.581556] page dumped because: kasan: bad access detected
[   75.582346] 
[   75.582635] Memory state around the buggy address:
[   75.583280]  ffff0000c5a06500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.584296]  ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.585287] >ffff0000c5a06600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.586165]                    ^
[   75.586652]  ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.587548]  ffff0000c5a06700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.588492] ==================================================================
[   75.633076] ==================================================================
[   75.633723] BUG: KASAN: use-after-free in ksize_uaf+0x130/0x24c
[   75.634576] Read of size 1 at addr ffff0000c5a06678 by task kunit_try_catch/158
[   75.635491] 
[   75.635806] CPU: 0 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.636958] Hardware name: linux,dummy-virt (DT)
[   75.637411] Call trace:
[   75.637647]  dump_backtrace+0xf4/0x114
[   75.638093]  show_stack+0x18/0x24
[   75.638492]  __dump_stack+0x28/0x38
[   75.639031]  dump_stack_lvl+0x50/0x68
[   75.639624]  print_address_description+0x7c/0x1ec
[   75.640505]  print_report+0x50/0x68
[   75.641134]  kasan_report+0xac/0xfc
[   75.641748]  __asan_load1+0x6c/0x70
[   75.642361]  ksize_uaf+0x130/0x24c
[   75.642947]  kunit_try_run_case+0x80/0x184
[   75.643620]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.644569]  kthread+0x16c/0x21c
[   75.645226]  ret_from_fork+0x10/0x20
[   75.645828] 
[   75.646103] Allocated by task 158:
[   75.646592]  kasan_set_track+0x4c/0x80
[   75.647236]  kasan_save_alloc_info+0x28/0x34
[   75.647970]  __kasan_kmalloc+0x88/0xa0
[   75.648689]  kmalloc_trace+0x54/0x68
[   75.649301]  ksize_uaf+0x48/0x24c
[   75.649880]  kunit_try_run_case+0x80/0x184
[   75.650543]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.651361]  kthread+0x16c/0x21c
[   75.652017]  ret_from_fork+0x10/0x20
[   75.652659] 
[   75.652964] Freed by task 158:
[   75.653439]  kasan_set_track+0x4c/0x80
[   75.654006]  kasan_save_free_info+0x3c/0x60
[   75.654419]  ____kasan_slab_free+0xe8/0x140
[   75.654876]  __kasan_slab_free+0x18/0x28
[   75.655310]  __kmem_cache_free+0xdc/0x27c
[   75.655825]  kfree+0x60/0x74
[   75.656351]  ksize_uaf+0x90/0x24c
[   75.656975]  kunit_try_run_case+0x80/0x184
[   75.657632]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.658457]  kthread+0x16c/0x21c
[   75.659031]  ret_from_fork+0x10/0x20
[   75.659613] 
[   75.659928] The buggy address belongs to the object at ffff0000c5a06600
[   75.659928]  which belongs to the cache kmalloc-128 of size 128
[   75.661483] The buggy address is located 120 bytes inside of
[   75.661483]  128-byte region [ffff0000c5a06600, ffff0000c5a06680)
[   75.662850] 
[   75.663130] The buggy address belongs to the physical page:
[   75.663851] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06
[   75.664999] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.665951] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.666941] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.667930] page dumped because: kasan: bad access detected
[   75.668668] 
[   75.668962] Memory state around the buggy address:
[   75.669596]  ffff0000c5a06500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.670346]  ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.670863] >ffff0000c5a06600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.671489]                                                                 ^
[   75.672172]  ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.672785]  ffff0000c5a06700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.673387] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   75.502787] ==================================================================
[   75.503684] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xb8/0x164
[   75.505192] Read of size 1 at addr ffff0000c5a06580 by task kunit_try_catch/157
[   75.506517] 
[   75.506990] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.508343] Hardware name: linux,dummy-virt (DT)
[   75.508985] Call trace:
[   75.509674]  dump_backtrace+0xf4/0x114
[   75.510494]  show_stack+0x18/0x24
[   75.511181]  __dump_stack+0x28/0x38
[   75.511578]  dump_stack_lvl+0x50/0x68
[   75.512409]  print_address_description+0x7c/0x1ec
[   75.513342]  print_report+0x50/0x68
[   75.514061]  kasan_report+0xac/0xfc
[   75.514757]  __asan_load1+0x6c/0x70
[   75.515481]  ksize_unpoisons_memory+0xb8/0x164
[   75.516448]  kunit_try_run_case+0x80/0x184
[   75.517175]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.517851]  kthread+0x16c/0x21c
[   75.518249]  ret_from_fork+0x10/0x20
[   75.518629] 
[   75.518899] Allocated by task 157:
[   75.519434]  kasan_set_track+0x4c/0x80
[   75.520218]  kasan_save_alloc_info+0x28/0x34
[   75.520996]  __kasan_kmalloc+0x88/0xa0
[   75.521691]  kmalloc_trace+0x54/0x68
[   75.522341]  ksize_unpoisons_memory+0x48/0x164
[   75.523082]  kunit_try_run_case+0x80/0x184
[   75.523812]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.524887]  kthread+0x16c/0x21c
[   75.525613]  ret_from_fork+0x10/0x20
[   75.526278] 
[   75.526610] The buggy address belongs to the object at ffff0000c5a06500
[   75.526610]  which belongs to the cache kmalloc-128 of size 128
[   75.528219] The buggy address is located 0 bytes to the right of
[   75.528219]  128-byte region [ffff0000c5a06500, ffff0000c5a06580)
[   75.529951] 
[   75.530150] The buggy address belongs to the physical page:
[   75.530528] page:00000000cc3fd307 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a06
[   75.531780] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.532923] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.533992] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.534948] page dumped because: kasan: bad access detected
[   75.535665] 
[   75.536058] Memory state around the buggy address:
[   75.536867]  ffff0000c5a06480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.537852]  ffff0000c5a06500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.538628] >ffff0000c5a06580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.539110]                    ^
[   75.539415]  ffff0000c5a06600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.540186]  ffff0000c5a06680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.541244] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_left
[   75.466244] ==================================================================
[   75.467109] BUG: KASAN: global-out-of-bounds in kasan_global_oob_left+0x50/0xf4
[   75.467934] Read of size 1 at addr ffffa980ac4c15bd by task kunit_try_catch/153
[   75.468712] 
[   75.468940] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.469646] Hardware name: linux,dummy-virt (DT)
[   75.470185] Call trace:
[   75.470458]  dump_backtrace+0xf4/0x114
[   75.470948]  show_stack+0x18/0x24
[   75.471369]  __dump_stack+0x28/0x38
[   75.471956]  dump_stack_lvl+0x50/0x68
[   75.472403]  print_address_description+0x7c/0x1ec
[   75.472959]  print_report+0x50/0x68
[   75.473476]  kasan_report+0xac/0xfc
[   75.473967]  __asan_load1+0x6c/0x70
[   75.474412]  kasan_global_oob_left+0x50/0xf4
[   75.474934]  kunit_try_run_case+0x80/0x184
[   75.475412]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.476151]  kthread+0x16c/0x21c
[   75.476579]  ret_from_fork+0x10/0x20
[   75.477032] 
[   75.477234] The buggy address belongs to the variable:
[   75.477675]  resource+0x5d/0x60
[   75.478119] 
[   75.478318] The buggy address ffffa980ac4c15bd belongs to a vmalloc virtual mapping
[   75.478933] The buggy address belongs to the physical page:
[   75.479388] page:0000000009454da2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cc1
[   75.480368] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   75.481095] raw: 03fffc0000001000 fffffc00000f3048 fffffc00000f3048 0000000000000000
[   75.481771] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.482412] page dumped because: kasan: bad access detected
[   75.482919] 
[   75.483106] Memory state around the buggy address:
[   75.483548]  ffffa980ac4c1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9
[   75.484347]  ffffa980ac4c1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00
[   75.484992] >ffffa980ac4c1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9
[   75.485600]                                         ^
[   75.486116]  ffffa980ac4c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.486753]  ffffa980ac4c1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.487337] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   75.437504] ==================================================================
[   75.438414] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0
[   75.439140] Read of size 1 at addr ffffa980ac4c15cd by task kunit_try_catch/152
[   75.439760] 
[   75.440110] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.441380] Hardware name: linux,dummy-virt (DT)
[   75.441800] Call trace:
[   75.442217]  dump_backtrace+0xf4/0x114
[   75.442791]  show_stack+0x18/0x24
[   75.443304]  __dump_stack+0x28/0x38
[   75.443896]  dump_stack_lvl+0x50/0x68
[   75.444453]  print_address_description+0x7c/0x1ec
[   75.445126]  print_report+0x50/0x68
[   75.445662]  kasan_report+0xac/0xfc
[   75.446153]  __asan_load1+0x6c/0x70
[   75.446633]  kasan_global_oob_right+0x4c/0xf0
[   75.447522]  kunit_try_run_case+0x80/0x184
[   75.447978]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.448486]  kthread+0x16c/0x21c
[   75.448977]  ret_from_fork+0x10/0x20
[   75.449422] 
[   75.449697] The buggy address belongs to the variable:
[   75.450170]  global_array+0xd/0x20
[   75.450663] 
[   75.450951] The buggy address ffffa980ac4c15cd belongs to a vmalloc virtual mapping
[   75.451571] The buggy address belongs to the physical page:
[   75.452193] page:0000000009454da2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cc1
[   75.453890] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   75.454923] raw: 03fffc0000001000 fffffc00000f3048 fffffc00000f3048 0000000000000000
[   75.455606] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.457023] page dumped because: kasan: bad access detected
[   75.457853] 
[   75.458283] Memory state around the buggy address:
[   75.458982]  ffffa980ac4c1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9
[   75.459593]  ffffa980ac4c1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00
[   75.460770] >ffffa980ac4c1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9
[   75.461391]                                               ^
[   75.461898]  ffffa980ac4c1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.462531]  ffffa980ac4c1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.463141] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   74.821072] ==================================================================
[   74.821972] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xb0/0x1cc
[   74.823215] Read of size 1 at addr ffff0000c3c320c8 by task kunit_try_catch/149
[   74.824376] 
[   74.824592] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.825204] Hardware name: linux,dummy-virt (DT)
[   74.825554] Call trace:
[   74.826122]  dump_backtrace+0xf4/0x114
[   74.827007]  show_stack+0x18/0x24
[   74.827894]  __dump_stack+0x28/0x38
[   74.828902]  dump_stack_lvl+0x50/0x68
[   74.829622]  print_address_description+0x7c/0x1ec
[   74.830609]  print_report+0x50/0x68
[   74.831417]  kasan_report+0xac/0xfc
[   74.832320]  __asan_load1+0x6c/0x70
[   74.833193]  kmem_cache_oob+0xb0/0x1cc
[   74.834054]  kunit_try_run_case+0x80/0x184
[   74.834965]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.836245]  kthread+0x16c/0x21c
[   74.836985]  ret_from_fork+0x10/0x20
[   74.837879] 
[   74.838343] Allocated by task 149:
[   74.838971]  kasan_set_track+0x4c/0x80
[   74.840245]  kasan_save_alloc_info+0x28/0x34
[   74.841079]  __kasan_slab_alloc+0x58/0x70
[   74.842005]  slab_post_alloc_hook+0x70/0x2e8
[   74.842927]  kmem_cache_alloc+0x164/0x254
[   74.843874]  kmem_cache_oob+0x94/0x1cc
[   74.844647]  kunit_try_run_case+0x80/0x184
[   74.845341]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.846269]  kthread+0x16c/0x21c
[   74.847008]  ret_from_fork+0x10/0x20
[   74.847905] 
[   74.848493] The buggy address belongs to the object at ffff0000c3c32000
[   74.848493]  which belongs to the cache test_cache of size 200
[   74.850267] The buggy address is located 0 bytes to the right of
[   74.850267]  200-byte region [ffff0000c3c32000, ffff0000c3c320c8)
[   74.851919] 
[   74.852443] The buggy address belongs to the physical page:
[   74.853250] page:00000000cdc41bd8 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103c32
[   74.853917] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.854674] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c159e780
[   74.855388] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   74.856276] page dumped because: kasan: bad access detected
[   74.857085] 
[   74.857395] Memory state around the buggy address:
[   74.858055]  ffff0000c3c31f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.858678]  ffff0000c3c32000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.859596] >ffff0000c3c32080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   74.860611]                                               ^
[   74.861747]  ffff0000c3c32100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.862325]  ffff0000c3c32180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.862851] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf2
[   74.770299] ==================================================================
[   74.771175] BUG: KASAN: use-after-free in kmalloc_uaf2+0xfc/0x1e8
[   74.771813] Read of size 1 at addr ffff0000c5a14228 by task kunit_try_catch/145
[   74.772671] 
[   74.773021] CPU: 0 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.773842] Hardware name: linux,dummy-virt (DT)
[   74.774364] Call trace:
[   74.774763]  dump_backtrace+0xf4/0x114
[   74.775331]  show_stack+0x18/0x24
[   74.776010]  __dump_stack+0x28/0x38
[   74.776440]  dump_stack_lvl+0x50/0x68
[   74.776886]  print_address_description+0x7c/0x1ec
[   74.777509]  print_report+0x50/0x68
[   74.778036]  kasan_report+0xac/0xfc
[   74.778469]  __asan_load1+0x6c/0x70
[   74.778911]  kmalloc_uaf2+0xfc/0x1e8
[   74.779315]  kunit_try_run_case+0x80/0x184
[   74.779818]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.780400]  kthread+0x16c/0x21c
[   74.780848]  ret_from_fork+0x10/0x20
[   74.781263] 
[   74.781469] Allocated by task 145:
[   74.781816]  kasan_set_track+0x4c/0x80
[   74.782309]  kasan_save_alloc_info+0x28/0x34
[   74.782785]  __kasan_kmalloc+0x88/0xa0
[   74.783287]  kmalloc_trace+0x54/0x68
[   74.783746]  kmalloc_uaf2+0x48/0x1e8
[   74.784169]  kunit_try_run_case+0x80/0x184
[   74.784675]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.785286]  kthread+0x16c/0x21c
[   74.785748]  ret_from_fork+0x10/0x20
[   74.786200] 
[   74.786386] Freed by task 145:
[   74.786721]  kasan_set_track+0x4c/0x80
[   74.787379]  kasan_save_free_info+0x3c/0x60
[   74.787869]  ____kasan_slab_free+0xe8/0x140
[   74.788372]  __kasan_slab_free+0x18/0x28
[   74.788847]  __kmem_cache_free+0xdc/0x27c
[   74.789283]  kfree+0x60/0x74
[   74.789684]  kmalloc_uaf2+0x90/0x1e8
[   74.790094]  kunit_try_run_case+0x80/0x184
[   74.790551]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.791147]  kthread+0x16c/0x21c
[   74.791576]  ret_from_fork+0x10/0x20
[   74.792545] 
[   74.792761] The buggy address belongs to the object at ffff0000c5a14200
[   74.792761]  which belongs to the cache kmalloc-128 of size 128
[   74.793703] The buggy address is located 40 bytes inside of
[   74.793703]  128-byte region [ffff0000c5a14200, ffff0000c5a14280)
[   74.794595] 
[   74.794826] The buggy address belongs to the physical page:
[   74.795268] page:000000002a39f223 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14
[   74.796067] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.796768] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.797472] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.798114] page dumped because: kasan: bad access detected
[   74.798586] 
[   74.798788] Memory state around the buggy address:
[   74.799285]  ffff0000c5a14100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.800503]  ffff0000c5a14180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.801165] >ffff0000c5a14200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.801780]                                   ^
[   74.802208]  ffff0000c5a14280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.802832]  ffff0000c5a14300: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   74.803302] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_memset
[   74.730064] ==================================================================
[   74.730927] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xac/0x14c
[   74.731565] Write of size 33 at addr ffff0000c5a14100 by task kunit_try_catch/144
[   74.732799] 
[   74.733266] CPU: 0 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.733928] Hardware name: linux,dummy-virt (DT)
[   74.734275] Call trace:
[   74.734509]  dump_backtrace+0xf4/0x114
[   74.735167]  show_stack+0x18/0x24
[   74.735631]  __dump_stack+0x28/0x38
[   74.736076]  dump_stack_lvl+0x50/0x68
[   74.736528]  print_address_description+0x7c/0x1ec
[   74.737067]  print_report+0x50/0x68
[   74.737507]  kasan_report+0xac/0xfc
[   74.737963]  kasan_check_range+0x258/0x290
[   74.738437]  memset+0x40/0x70
[   74.738847]  kmalloc_uaf_memset+0xac/0x14c
[   74.739301]  kunit_try_run_case+0x80/0x184
[   74.739771]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.740323]  kthread+0x16c/0x21c
[   74.740731]  ret_from_fork+0x10/0x20
[   74.741179] 
[   74.741390] Allocated by task 144:
[   74.741716]  kasan_set_track+0x4c/0x80
[   74.742172]  kasan_save_alloc_info+0x28/0x34
[   74.742607]  __kasan_kmalloc+0x88/0xa0
[   74.743111]  kmalloc_trace+0x54/0x68
[   74.743533]  kmalloc_uaf_memset+0x48/0x14c
[   74.744033]  kunit_try_run_case+0x80/0x184
[   74.744492]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.745103]  kthread+0x16c/0x21c
[   74.745551]  ret_from_fork+0x10/0x20
[   74.746009] 
[   74.746196] Freed by task 144:
[   74.746533]  kasan_set_track+0x4c/0x80
[   74.747071]  kasan_save_free_info+0x3c/0x60
[   74.747506]  ____kasan_slab_free+0xe8/0x140
[   74.748041]  __kasan_slab_free+0x18/0x28
[   74.748497]  __kmem_cache_free+0xdc/0x27c
[   74.748983]  kfree+0x60/0x74
[   74.749383]  kmalloc_uaf_memset+0x90/0x14c
[   74.749888]  kunit_try_run_case+0x80/0x184
[   74.750344]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.750941]  kthread+0x16c/0x21c
[   74.751355]  ret_from_fork+0x10/0x20
[   74.751801] 
[   74.752000] The buggy address belongs to the object at ffff0000c5a14100
[   74.752000]  which belongs to the cache kmalloc-128 of size 128
[   74.752958] The buggy address is located 0 bytes inside of
[   74.752958]  128-byte region [ffff0000c5a14100, ffff0000c5a14180)
[   74.753843] 
[   74.754066] The buggy address belongs to the physical page:
[   74.754544] page:000000002a39f223 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14
[   74.755338] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.756029] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.756721] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.757354] page dumped because: kasan: bad access detected
[   74.757832] 
[   74.758025] Memory state around the buggy address:
[   74.758456]  ffff0000c5a14000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.759096]  ffff0000c5a14080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.759720] >ffff0000c5a14100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.760338]                    ^
[   74.760682]  ffff0000c5a14180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.761339]  ffff0000c5a14200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.761985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf
[   74.682106] ==================================================================
[   74.683766] BUG: KASAN: use-after-free in kmalloc_uaf+0xa4/0x148
[   74.684987] Read of size 1 at addr ffff0000c5a14008 by task kunit_try_catch/143
[   74.685506] 
[   74.685707] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.687262] Hardware name: linux,dummy-virt (DT)
[   74.688076] Call trace:
[   74.688721]  dump_backtrace+0xf4/0x114
[   74.689594]  show_stack+0x18/0x24
[   74.690246]  __dump_stack+0x28/0x38
[   74.690864]  dump_stack_lvl+0x50/0x68
[   74.691484]  print_address_description+0x7c/0x1ec
[   74.692262]  print_report+0x50/0x68
[   74.692871]  kasan_report+0xac/0xfc
[   74.693281]  __asan_load1+0x6c/0x70
[   74.693696]  kmalloc_uaf+0xa4/0x148
[   74.694328]  kunit_try_run_case+0x80/0x184
[   74.695020]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.695926]  kthread+0x16c/0x21c
[   74.696533]  ret_from_fork+0x10/0x20
[   74.697269] 
[   74.697639] Allocated by task 143:
[   74.698160]  kasan_set_track+0x4c/0x80
[   74.698829]  kasan_save_alloc_info+0x28/0x34
[   74.699499]  __kasan_kmalloc+0x88/0xa0
[   74.700160]  kmalloc_trace+0x54/0x68
[   74.700785]  kmalloc_uaf+0x48/0x148
[   74.701381]  kunit_try_run_case+0x80/0x184
[   74.702066]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.702887]  kthread+0x16c/0x21c
[   74.703274]  ret_from_fork+0x10/0x20
[   74.703646] 
[   74.703969] Freed by task 143:
[   74.704470]  kasan_set_track+0x4c/0x80
[   74.705177]  kasan_save_free_info+0x3c/0x60
[   74.705934]  ____kasan_slab_free+0xe8/0x140
[   74.706649]  __kasan_slab_free+0x18/0x28
[   74.707337]  __kmem_cache_free+0xdc/0x27c
[   74.708001]  kfree+0x60/0x74
[   74.708533]  kmalloc_uaf+0x90/0x148
[   74.709132]  kunit_try_run_case+0x80/0x184
[   74.709820]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.710650]  kthread+0x16c/0x21c
[   74.711250]  ret_from_fork+0x10/0x20
[   74.711927] 
[   74.712158] The buggy address belongs to the object at ffff0000c5a14000
[   74.712158]  which belongs to the cache kmalloc-128 of size 128
[   74.713861] The buggy address is located 8 bytes inside of
[   74.713861]  128-byte region [ffff0000c5a14000, ffff0000c5a14080)
[   74.714666] 
[   74.715015] The buggy address belongs to the physical page:
[   74.715746] page:000000002a39f223 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a14
[   74.716937] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.717921] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.718898] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.719381] page dumped because: kasan: bad access detected
[   74.719959] 
[   74.720240] Memory state around the buggy address:
[   74.720996]  ffff0000c5a13f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.722053]  ffff0000c5a13f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.723075] >ffff0000c5a14000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.723979]                       ^
[   74.724514]  ffff0000c5a14080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.725454]  ffff0000c5a14100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.726337] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   74.643094] ==================================================================
[   74.644249] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xb8/0x160
[   74.645201] Read of size 64 at addr ffff0000c5a09f04 by task kunit_try_catch/142
[   74.645882] 
[   74.646148] CPU: 0 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.646919] Hardware name: linux,dummy-virt (DT)
[   74.647356] Call trace:
[   74.647653]  dump_backtrace+0xf4/0x114
[   74.648289]  show_stack+0x18/0x24
[   74.649189]  __dump_stack+0x28/0x38
[   74.649676]  dump_stack_lvl+0x50/0x68
[   74.650125]  print_address_description+0x7c/0x1ec
[   74.650685]  print_report+0x50/0x68
[   74.651151]  kasan_report+0xac/0xfc
[   74.651613]  kasan_check_range+0x258/0x290
[   74.652125]  memmove+0x48/0x90
[   74.652530]  kmalloc_memmove_invalid_size+0xb8/0x160
[   74.653060]  kunit_try_run_case+0x80/0x184
[   74.653595]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.654188]  kthread+0x16c/0x21c
[   74.654623]  ret_from_fork+0x10/0x20
[   74.655063] 
[   74.655255] Allocated by task 142:
[   74.655612]  kasan_set_track+0x4c/0x80
[   74.656106]  kasan_save_alloc_info+0x28/0x34
[   74.656592]  __kasan_kmalloc+0x88/0xa0
[   74.657057]  kmalloc_trace+0x54/0x68
[   74.657484]  kmalloc_memmove_invalid_size+0x48/0x160
[   74.658506]  kunit_try_run_case+0x80/0x184
[   74.659045]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.659629]  kthread+0x16c/0x21c
[   74.660090]  ret_from_fork+0x10/0x20
[   74.660546] 
[   74.660748] The buggy address belongs to the object at ffff0000c5a09f00
[   74.660748]  which belongs to the cache kmalloc-128 of size 128
[   74.661690] The buggy address is located 4 bytes inside of
[   74.661690]  128-byte region [ffff0000c5a09f00, ffff0000c5a09f80)
[   74.662638] 
[   74.662884] The buggy address belongs to the physical page:
[   74.663326] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09
[   74.664768] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.665478] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.666147] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.666784] page dumped because: kasan: bad access detected
[   74.667268] 
[   74.667467] Memory state around the buggy address:
[   74.667913]  ffff0000c5a09e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.668553]  ffff0000c5a09e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.669194] >ffff0000c5a09f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   74.669933]                                            ^
[   74.670609]  ffff0000c5a09f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.671493]  ffff0000c5a0a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.673423] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   74.598943] ==================================================================
[   74.599692] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xb4/0x164
[   74.601381] Read of size 18446744073709551614 at addr ffff0000c5a09e04 by task kunit_try_catch/141
[   74.602954] 
[   74.603415] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.604690] Hardware name: linux,dummy-virt (DT)
[   74.605058] Call trace:
[   74.605294]  dump_backtrace+0xf4/0x114
[   74.605728]  show_stack+0x18/0x24
[   74.606700]  __dump_stack+0x28/0x38
[   74.607531]  dump_stack_lvl+0x50/0x68
[   74.608465]  print_address_description+0x7c/0x1ec
[   74.609575]  print_report+0x50/0x68
[   74.610333]  kasan_report+0xac/0xfc
[   74.611164]  kasan_check_range+0x258/0x290
[   74.612130]  memmove+0x48/0x90
[   74.613012]  kmalloc_memmove_negative_size+0xb4/0x164
[   74.613925]  kunit_try_run_case+0x80/0x184
[   74.614849]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.616170]  kthread+0x16c/0x21c
[   74.616939]  ret_from_fork+0x10/0x20
[   74.617906] 
[   74.618393] Allocated by task 141:
[   74.618825]  kasan_set_track+0x4c/0x80
[   74.619254]  kasan_save_alloc_info+0x28/0x34
[   74.619871]  __kasan_kmalloc+0x88/0xa0
[   74.620706]  kmalloc_trace+0x54/0x68
[   74.621610]  kmalloc_memmove_negative_size+0x48/0x164
[   74.622704]  kunit_try_run_case+0x80/0x184
[   74.623609]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.624776]  kthread+0x16c/0x21c
[   74.625587]  ret_from_fork+0x10/0x20
[   74.626456] 
[   74.626893] The buggy address belongs to the object at ffff0000c5a09e00
[   74.626893]  which belongs to the cache kmalloc-128 of size 128
[   74.628829] The buggy address is located 4 bytes inside of
[   74.628829]  128-byte region [ffff0000c5a09e00, ffff0000c5a09e80)
[   74.630092] 
[   74.630288] The buggy address belongs to the physical page:
[   74.630658] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09
[   74.631886] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.633198] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.634207] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.635136] page dumped because: kasan: bad access detected
[   74.635899] 
[   74.636205] Memory state around the buggy address:
[   74.636990]  ffff0000c5a09d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.637569]  ffff0000c5a09d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.638078] >ffff0000c5a09e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   74.638545]                    ^
[   74.638862]  ffff0000c5a09e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.639504]  ffff0000c5a09f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.640092] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   74.558770] ==================================================================
[   74.559523] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xac/0x154
[   74.560403] Write of size 16 at addr ffff0000c5a09d69 by task kunit_try_catch/140
[   74.560946] 
[   74.561146] CPU: 0 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.561761] Hardware name: linux,dummy-virt (DT)
[   74.562978] Call trace:
[   74.563571]  dump_backtrace+0xf4/0x114
[   74.564430]  show_stack+0x18/0x24
[   74.565201]  __dump_stack+0x28/0x38
[   74.565944]  dump_stack_lvl+0x50/0x68
[   74.566594]  print_address_description+0x7c/0x1ec
[   74.567391]  print_report+0x50/0x68
[   74.568158]  kasan_report+0xac/0xfc
[   74.568937]  kasan_check_range+0x258/0x290
[   74.569658]  memset+0x40/0x70
[   74.570217]  kmalloc_oob_memset_16+0xac/0x154
[   74.570946]  kunit_try_run_case+0x80/0x184
[   74.571649]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.572624]  kthread+0x16c/0x21c
[   74.573254]  ret_from_fork+0x10/0x20
[   74.573902] 
[   74.574217] Allocated by task 140:
[   74.574756]  kasan_set_track+0x4c/0x80
[   74.575439]  kasan_save_alloc_info+0x28/0x34
[   74.576191]  __kasan_kmalloc+0x88/0xa0
[   74.576921]  kmalloc_trace+0x54/0x68
[   74.577505]  kmalloc_oob_memset_16+0x48/0x154
[   74.577945]  kunit_try_run_case+0x80/0x184
[   74.578364]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.579049]  kthread+0x16c/0x21c
[   74.579661]  ret_from_fork+0x10/0x20
[   74.580338] 
[   74.580628] The buggy address belongs to the object at ffff0000c5a09d00
[   74.580628]  which belongs to the cache kmalloc-128 of size 128
[   74.582073] The buggy address is located 105 bytes inside of
[   74.582073]  128-byte region [ffff0000c5a09d00, ffff0000c5a09d80)
[   74.583470] 
[   74.583827] The buggy address belongs to the physical page:
[   74.584578] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09
[   74.585744] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.586706] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.587686] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.588713] page dumped because: kasan: bad access detected
[   74.589437] 
[   74.589731] Memory state around the buggy address:
[   74.590265]  ffff0000c5a09c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.590777]  ffff0000c5a09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.591674] >ffff0000c5a09d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   74.592694]                                                                 ^
[   74.593820]  ffff0000c5a09d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.594719]  ffff0000c5a09e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.595599] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   74.524566] ==================================================================
[   74.525467] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xac/0x154
[   74.526121] Write of size 8 at addr ffff0000c5a09c71 by task kunit_try_catch/139
[   74.526747] 
[   74.526961] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.527708] Hardware name: linux,dummy-virt (DT)
[   74.528480] Call trace:
[   74.528879]  dump_backtrace+0xf4/0x114
[   74.529460]  show_stack+0x18/0x24
[   74.530006]  __dump_stack+0x28/0x38
[   74.530530]  dump_stack_lvl+0x50/0x68
[   74.531067]  print_address_description+0x7c/0x1ec
[   74.531877]  print_report+0x50/0x68
[   74.532468]  kasan_report+0xac/0xfc
[   74.532896]  kasan_check_range+0x258/0x290
[   74.533574]  memset+0x40/0x70
[   74.534043]  kmalloc_oob_memset_8+0xac/0x154
[   74.534590]  kunit_try_run_case+0x80/0x184
[   74.535110]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.535729]  kthread+0x16c/0x21c
[   74.536341]  ret_from_fork+0x10/0x20
[   74.536838] 
[   74.537056] Allocated by task 139:
[   74.537430]  kasan_set_track+0x4c/0x80
[   74.537973]  kasan_save_alloc_info+0x28/0x34
[   74.538462]  __kasan_kmalloc+0x88/0xa0
[   74.538944]  kmalloc_trace+0x54/0x68
[   74.539350]  kmalloc_oob_memset_8+0x48/0x154
[   74.539850]  kunit_try_run_case+0x80/0x184
[   74.540556]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.541170]  kthread+0x16c/0x21c
[   74.541578]  ret_from_fork+0x10/0x20
[   74.542004] 
[   74.542203] The buggy address belongs to the object at ffff0000c5a09c00
[   74.542203]  which belongs to the cache kmalloc-128 of size 128
[   74.543092] The buggy address is located 113 bytes inside of
[   74.543092]  128-byte region [ffff0000c5a09c00, ffff0000c5a09c80)
[   74.544098] 
[   74.544291] The buggy address belongs to the physical page:
[   74.544817] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09
[   74.545575] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.546388] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.547075] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.547858] page dumped because: kasan: bad access detected
[   74.548308] 
[   74.548526] Memory state around the buggy address:
[   74.548952]  ffff0000c5a09b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.549591]  ffff0000c5a09b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.550411] >ffff0000c5a09c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   74.551008]                                                                 ^
[   74.551586]  ffff0000c5a09c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.552685]  ffff0000c5a09d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.553304] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   74.482558] ==================================================================
[   74.483303] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xac/0x154
[   74.484685] Write of size 4 at addr ffff0000c5919d75 by task kunit_try_catch/138
[   74.485829] 
[   74.486299] CPU: 1 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.487528] Hardware name: linux,dummy-virt (DT)
[   74.488397] Call trace:
[   74.488959]  dump_backtrace+0xf4/0x114
[   74.489761]  show_stack+0x18/0x24
[   74.490503]  __dump_stack+0x28/0x38
[   74.491264]  dump_stack_lvl+0x50/0x68
[   74.492102]  print_address_description+0x7c/0x1ec
[   74.493006]  print_report+0x50/0x68
[   74.493433]  kasan_report+0xac/0xfc
[   74.494134]  kasan_check_range+0x258/0x290
[   74.494986]  memset+0x40/0x70
[   74.495609]  kmalloc_oob_memset_4+0xac/0x154
[   74.496460]  kunit_try_run_case+0x80/0x184
[   74.497244]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.498092]  kthread+0x16c/0x21c
[   74.498687]  ret_from_fork+0x10/0x20
[   74.499307] 
[   74.499604] Allocated by task 138:
[   74.500345]  kasan_set_track+0x4c/0x80
[   74.501023]  kasan_save_alloc_info+0x28/0x34
[   74.501706]  __kasan_kmalloc+0x88/0xa0
[   74.502239]  kmalloc_trace+0x54/0x68
[   74.502617]  kmalloc_oob_memset_4+0x48/0x154
[   74.503321]  kunit_try_run_case+0x80/0x184
[   74.504098]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.504958]  kthread+0x16c/0x21c
[   74.505554]  ret_from_fork+0x10/0x20
[   74.506164] 
[   74.506460] The buggy address belongs to the object at ffff0000c5919d00
[   74.506460]  which belongs to the cache kmalloc-128 of size 128
[   74.507981] The buggy address is located 117 bytes inside of
[   74.507981]  128-byte region [ffff0000c5919d00, ffff0000c5919d80)
[   74.508983] 
[   74.509171] The buggy address belongs to the physical page:
[   74.509539] page:0000000087a007df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   74.510677] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.511641] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.512777] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.513692] page dumped because: kasan: bad access detected
[   74.514377] 
[   74.514656] Memory state around the buggy address:
[   74.515286]  ffff0000c5919c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.516259]  ffff0000c5919c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.517170] >ffff0000c5919d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   74.518030]                                                                 ^
[   74.518609]  ffff0000c5919d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.519494]  ffff0000c5919e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.520513] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   74.446923] ==================================================================
[   74.447671] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xac/0x154
[   74.448661] Write of size 2 at addr ffff0000c5a09877 by task kunit_try_catch/137
[   74.449601] 
[   74.449876] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.451047] Hardware name: linux,dummy-virt (DT)
[   74.451588] Call trace:
[   74.451916]  dump_backtrace+0xf4/0x114
[   74.452580]  show_stack+0x18/0x24
[   74.453172]  __dump_stack+0x28/0x38
[   74.453783]  dump_stack_lvl+0x50/0x68
[   74.454361]  print_address_description+0x7c/0x1ec
[   74.455060]  print_report+0x50/0x68
[   74.455827]  kasan_report+0xac/0xfc
[   74.456522]  kasan_check_range+0x258/0x290
[   74.457000]  memset+0x40/0x70
[   74.457353]  kmalloc_oob_memset_2+0xac/0x154
[   74.457786]  kunit_try_run_case+0x80/0x184
[   74.458208]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.458714]  kthread+0x16c/0x21c
[   74.459253]  ret_from_fork+0x10/0x20
[   74.459671] 
[   74.459928] Allocated by task 137:
[   74.460338]  kasan_set_track+0x4c/0x80
[   74.461143]  kasan_save_alloc_info+0x28/0x34
[   74.461704]  __kasan_kmalloc+0x88/0xa0
[   74.462278]  kmalloc_trace+0x54/0x68
[   74.462685]  kmalloc_oob_memset_2+0x48/0x154
[   74.463210]  kunit_try_run_case+0x80/0x184
[   74.463939]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.464520]  kthread+0x16c/0x21c
[   74.465083]  ret_from_fork+0x10/0x20
[   74.465668] 
[   74.465962] The buggy address belongs to the object at ffff0000c5a09800
[   74.465962]  which belongs to the cache kmalloc-128 of size 128
[   74.466828] The buggy address is located 119 bytes inside of
[   74.466828]  128-byte region [ffff0000c5a09800, ffff0000c5a09880)
[   74.467539] 
[   74.468035] The buggy address belongs to the physical page:
[   74.468717] page:000000009f2754ee refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a09
[   74.469850] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.470794] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.472059] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.472978] page dumped because: kasan: bad access detected
[   74.473656] 
[   74.473941] Memory state around the buggy address:
[   74.474565]  ffff0000c5a09700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.475449]  ffff0000c5a09780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.476613] >ffff0000c5a09800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   74.477230]                                                                 ^
[   74.477707]  ffff0000c5a09880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.478304]  ffff0000c5a09900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.478946] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   74.410404] ==================================================================
[   74.411356] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xa8/0x150
[   74.412340] Write of size 128 at addr ffff0000c5919900 by task kunit_try_catch/136
[   74.413849] 
[   74.414156] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.415140] Hardware name: linux,dummy-virt (DT)
[   74.416523] Call trace:
[   74.417475]  dump_backtrace+0xf4/0x114
[   74.417951]  show_stack+0x18/0x24
[   74.418352]  __dump_stack+0x28/0x38
[   74.418772]  dump_stack_lvl+0x50/0x68
[   74.419166]  print_address_description+0x7c/0x1ec
[   74.419643]  print_report+0x50/0x68
[   74.421615]  kasan_report+0xac/0xfc
[   74.422124]  kasan_check_range+0x258/0x290
[   74.422772]  memset+0x40/0x70
[   74.423284]  kmalloc_oob_in_memset+0xa8/0x150
[   74.424062]  kunit_try_run_case+0x80/0x184
[   74.424651]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.425356]  kthread+0x16c/0x21c
[   74.425912]  ret_from_fork+0x10/0x20
[   74.426446] 
[   74.426769] Allocated by task 136:
[   74.427089]  kasan_set_track+0x4c/0x80
[   74.427713]  kasan_save_alloc_info+0x28/0x34
[   74.428296]  __kasan_kmalloc+0x88/0xa0
[   74.428979]  kmalloc_trace+0x54/0x68
[   74.429479]  kmalloc_oob_in_memset+0x48/0x150
[   74.430039]  kunit_try_run_case+0x80/0x184
[   74.430517]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.431134]  kthread+0x16c/0x21c
[   74.431552]  ret_from_fork+0x10/0x20
[   74.432134] 
[   74.432346] The buggy address belongs to the object at ffff0000c5919900
[   74.432346]  which belongs to the cache kmalloc-128 of size 128
[   74.433287] The buggy address is located 0 bytes inside of
[   74.433287]  128-byte region [ffff0000c5919900, ffff0000c5919980)
[   74.434206] 
[   74.434424] The buggy address belongs to the physical page:
[   74.434905] page:0000000087a007df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   74.435697] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.436406] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.437108] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.437718] page dumped because: kasan: bad access detected
[   74.438330] 
[   74.438526] Memory state around the buggy address:
[   74.438973]  ffff0000c5919800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.439606]  ffff0000c5919880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.440360] >ffff0000c5919900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   74.440966]                                                                 ^
[   74.441599]  ffff0000c5919980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.442243]  ffff0000c5919a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.442847] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_16
[   74.360677] ==================================================================
[   74.361479] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x1ac
[   74.362050] Read of size 16 at addr ffff0000c5919800 by task kunit_try_catch/135
[   74.363382] 
[   74.363897] CPU: 1 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.364662] Hardware name: linux,dummy-virt (DT)
[   74.365026] Call trace:
[   74.365260]  dump_backtrace+0xf4/0x114
[   74.365697]  show_stack+0x18/0x24
[   74.366686]  __dump_stack+0x28/0x38
[   74.367440]  dump_stack_lvl+0x50/0x68
[   74.368260]  print_address_description+0x7c/0x1ec
[   74.369129]  print_report+0x50/0x68
[   74.369908]  kasan_report+0xac/0xfc
[   74.370628]  kasan_check_range+0x258/0x290
[   74.371426]  memcpy+0x48/0x90
[   74.372109]  kmalloc_uaf_16+0x104/0x1ac
[   74.372841]  kunit_try_run_case+0x80/0x184
[   74.373614]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.374530]  kthread+0x16c/0x21c
[   74.375224]  ret_from_fork+0x10/0x20
[   74.375901] 
[   74.376247] Allocated by task 135:
[   74.376786]  kasan_set_track+0x4c/0x80
[   74.377467]  kasan_save_alloc_info+0x28/0x34
[   74.378166]  __kasan_kmalloc+0x88/0xa0
[   74.378853]  kmalloc_trace+0x54/0x68
[   74.379483]  kmalloc_uaf_16+0xa0/0x1ac
[   74.380198]  kunit_try_run_case+0x80/0x184
[   74.380866]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.381378]  kthread+0x16c/0x21c
[   74.381769]  ret_from_fork+0x10/0x20
[   74.382467] 
[   74.382818] Freed by task 135:
[   74.383139]  kasan_set_track+0x4c/0x80
[   74.383934]  kasan_save_free_info+0x3c/0x60
[   74.384449]  ____kasan_slab_free+0xe8/0x140
[   74.384915]  __kasan_slab_free+0x18/0x28
[   74.385456]  __kmem_cache_free+0xdc/0x27c
[   74.386003]  kfree+0x60/0x74
[   74.386440]  kmalloc_uaf_16+0xe8/0x1ac
[   74.386947]  kunit_try_run_case+0x80/0x184
[   74.387410]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.388187]  kthread+0x16c/0x21c
[   74.388599]  ret_from_fork+0x10/0x20
[   74.389079] 
[   74.389278] The buggy address belongs to the object at ffff0000c5919800
[   74.389278]  which belongs to the cache kmalloc-128 of size 128
[   74.390244] The buggy address is located 0 bytes inside of
[   74.390244]  128-byte region [ffff0000c5919800, ffff0000c5919880)
[   74.391077] 
[   74.391264] The buggy address belongs to the physical page:
[   74.391634] page:0000000087a007df refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105919
[   74.393204] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.394455] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.395718] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.397018] page dumped because: kasan: bad access detected
[   74.397941] 
[   74.398359] Memory state around the buggy address:
[   74.399229]  ffff0000c5919700: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.400530]  ffff0000c5919780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.401208] >ffff0000c5919800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.401684]                    ^
[   74.401998]  ffff0000c5919880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.402491]  ffff0000c5919900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.403474] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   74.324555] ==================================================================
[   74.325410] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xfc/0x1ac
[   74.326046] Write of size 16 at addr ffff0000c5a07e00 by task kunit_try_catch/134
[   74.326593] 
[   74.326852] CPU: 0 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.327580] Hardware name: linux,dummy-virt (DT)
[   74.328365] Call trace:
[   74.328638]  dump_backtrace+0xf4/0x114
[   74.329168]  show_stack+0x18/0x24
[   74.329615]  __dump_stack+0x28/0x38
[   74.330059]  dump_stack_lvl+0x50/0x68
[   74.330507]  print_address_description+0x7c/0x1ec
[   74.331059]  print_report+0x50/0x68
[   74.331493]  kasan_report+0xac/0xfc
[   74.331978]  kasan_check_range+0x258/0x290
[   74.332456]  memcpy+0x60/0x90
[   74.332846]  kmalloc_oob_16+0xfc/0x1ac
[   74.333269]  kunit_try_run_case+0x80/0x184
[   74.334009]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.334596]  kthread+0x16c/0x21c
[   74.335027]  ret_from_fork+0x10/0x20
[   74.335473] 
[   74.335668] Allocated by task 134:
[   74.336264]  kasan_set_track+0x4c/0x80
[   74.336711]  kasan_save_alloc_info+0x28/0x34
[   74.337208]  __kasan_kmalloc+0x88/0xa0
[   74.337656]  kmalloc_trace+0x54/0x68
[   74.338090]  kmalloc_oob_16+0x48/0x1ac
[   74.338532]  kunit_try_run_case+0x80/0x184
[   74.339006]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.339563]  kthread+0x16c/0x21c
[   74.340257]  ret_from_fork+0x10/0x20
[   74.340701] 
[   74.340945] The buggy address belongs to the object at ffff0000c5a07e00
[   74.340945]  which belongs to the cache kmalloc-128 of size 128
[   74.341925] The buggy address is located 0 bytes inside of
[   74.341925]  128-byte region [ffff0000c5a07e00, ffff0000c5a07e80)
[   74.342850] 
[   74.343075] The buggy address belongs to the physical page:
[   74.343539] page:0000000022d5f3f2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a07
[   74.344630] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.345345] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.346013] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.346595] page dumped because: kasan: bad access detected
[   74.347075] 
[   74.347275] Memory state around the buggy address:
[   74.347710]  ffff0000c5a07d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.348330]  ffff0000c5a07d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.349217] >ffff0000c5a07e00: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.349848]                       ^
[   74.350223]  ffff0000c5a07e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.350872]  ffff0000c5a07f00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.351458] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-krealloc_uaf
[   74.282637] ==================================================================
[   74.283184] BUG: KASAN: use-after-free in krealloc_uaf+0xd0/0x21c
[   74.283865] Read of size 1 at addr ffff0000c4b2bc00 by task kunit_try_catch/133
[   74.284517] 
[   74.284723] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.285450] Hardware name: linux,dummy-virt (DT)
[   74.286402] Call trace:
[   74.286688]  dump_backtrace+0xf4/0x114
[   74.287227]  show_stack+0x18/0x24
[   74.287655]  __dump_stack+0x28/0x38
[   74.288071]  dump_stack_lvl+0x50/0x68
[   74.288518]  print_address_description+0x7c/0x1ec
[   74.289054]  print_report+0x50/0x68
[   74.289537]  kasan_report+0xac/0xfc
[   74.289984]  __asan_load1+0x6c/0x70
[   74.290417]  krealloc_uaf+0xd0/0x21c
[   74.290863]  kunit_try_run_case+0x80/0x184
[   74.291360]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.292483]  kthread+0x16c/0x21c
[   74.292924]  ret_from_fork+0x10/0x20
[   74.293380] 
[   74.293575] Allocated by task 133:
[   74.293953]  kasan_set_track+0x4c/0x80
[   74.294472]  kasan_save_alloc_info+0x28/0x34
[   74.294946]  __kasan_kmalloc+0x88/0xa0
[   74.295399]  kmalloc_trace+0x54/0x68
[   74.295851]  krealloc_uaf+0x48/0x21c
[   74.296298]  kunit_try_run_case+0x80/0x184
[   74.296813]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.297393]  kthread+0x16c/0x21c
[   74.297830]  ret_from_fork+0x10/0x20
[   74.298267] 
[   74.298469] Freed by task 133:
[   74.298782]  kasan_set_track+0x4c/0x80
[   74.299273]  kasan_save_free_info+0x3c/0x60
[   74.300283]  ____kasan_slab_free+0xe8/0x140
[   74.300803]  __kasan_slab_free+0x18/0x28
[   74.301273]  __kmem_cache_free+0xdc/0x27c
[   74.301725]  kfree+0x60/0x74
[   74.302129]  krealloc_uaf+0x90/0x21c
[   74.302565]  kunit_try_run_case+0x80/0x184
[   74.303049]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.303603]  kthread+0x16c/0x21c
[   74.304063]  ret_from_fork+0x10/0x20
[   74.304535] 
[   74.304718] The buggy address belongs to the object at ffff0000c4b2bc00
[   74.304718]  which belongs to the cache kmalloc-256 of size 256
[   74.305673] The buggy address is located 0 bytes inside of
[   74.305673]  256-byte region [ffff0000c4b2bc00, ffff0000c4b2bd00)
[   74.306566] 
[   74.306783] The buggy address belongs to the physical page:
[   74.307230] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.308564] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.309223] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.309928] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.310585] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.311206] page dumped because: kasan: bad access detected
[   74.311673] 
[   74.311908] Memory state around the buggy address:
[   74.312369]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.312998]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.313604] >ffff0000c4b2bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.314186]                    ^
[   74.314542]  ffff0000c4b2bc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.315150]  ffff0000c4b2bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.316297] ==================================================================
[   74.247602] ==================================================================
[   74.248472] BUG: KASAN: use-after-free in krealloc_uaf+0xac/0x21c
[   74.249022] Read of size 1 at addr ffff0000c4b2bc00 by task kunit_try_catch/133
[   74.249698] 
[   74.250066] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.250838] Hardware name: linux,dummy-virt (DT)
[   74.251295] Call trace:
[   74.251531]  dump_backtrace+0xf4/0x114
[   74.251986]  show_stack+0x18/0x24
[   74.252506]  __dump_stack+0x28/0x38
[   74.253003]  dump_stack_lvl+0x50/0x68
[   74.253556]  print_address_description+0x7c/0x1ec
[   74.254122]  print_report+0x50/0x68
[   74.254586]  kasan_report+0xac/0xfc
[   74.255146]  __kasan_check_byte+0x3c/0x54
[   74.255635]  krealloc+0x54/0x26c
[   74.256146]  krealloc_uaf+0xac/0x21c
[   74.256630]  kunit_try_run_case+0x80/0x184
[   74.257123]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.257704]  kthread+0x16c/0x21c
[   74.258240]  ret_from_fork+0x10/0x20
[   74.258682] 
[   74.258918] Allocated by task 133:
[   74.259302]  kasan_set_track+0x4c/0x80
[   74.260103]  kasan_save_alloc_info+0x28/0x34
[   74.260553]  __kasan_kmalloc+0x88/0xa0
[   74.261014]  kmalloc_trace+0x54/0x68
[   74.261460]  krealloc_uaf+0x48/0x21c
[   74.261886]  kunit_try_run_case+0x80/0x184
[   74.262341]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.262942]  kthread+0x16c/0x21c
[   74.263377]  ret_from_fork+0x10/0x20
[   74.263965] 
[   74.264168] Freed by task 133:
[   74.264508]  kasan_set_track+0x4c/0x80
[   74.264963]  kasan_save_free_info+0x3c/0x60
[   74.265443]  ____kasan_slab_free+0xe8/0x140
[   74.265952]  __kasan_slab_free+0x18/0x28
[   74.266420]  __kmem_cache_free+0xdc/0x27c
[   74.266889]  kfree+0x60/0x74
[   74.267252]  krealloc_uaf+0x90/0x21c
[   74.268327]  kunit_try_run_case+0x80/0x184
[   74.268826]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.269395]  kthread+0x16c/0x21c
[   74.269809]  ret_from_fork+0x10/0x20
[   74.270245] 
[   74.270449] The buggy address belongs to the object at ffff0000c4b2bc00
[   74.270449]  which belongs to the cache kmalloc-256 of size 256
[   74.271373] The buggy address is located 0 bytes inside of
[   74.271373]  256-byte region [ffff0000c4b2bc00, ffff0000c4b2bd00)
[   74.272294] 
[   74.272508] The buggy address belongs to the physical page:
[   74.272972] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.273778] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.274400] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.275138] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.276407] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.277034] page dumped because: kasan: bad access detected
[   74.277504] 
[   74.277697] Memory state around the buggy address:
[   74.278152]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.278803]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.279419] >ffff0000c4b2bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.280023]                    ^
[   74.280375]  ffff0000c4b2bc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.281013]  ffff0000c4b2bd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.281628] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   73.915408] ==================================================================
[   73.916609] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[   73.917359] Write of size 1 at addr ffff0000c4b2bac9 by task kunit_try_catch/130
[   73.918007] 
[   73.918268] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.919023] Hardware name: linux,dummy-virt (DT)
[   73.919501] Call trace:
[   73.919950]  dump_backtrace+0xf4/0x114
[   73.920428]  show_stack+0x18/0x24
[   73.921078]  __dump_stack+0x28/0x38
[   73.921525]  dump_stack_lvl+0x50/0x68
[   73.921982]  print_address_description+0x7c/0x1ec
[   73.922549]  print_report+0x50/0x68
[   73.923015]  kasan_report+0xac/0xfc
[   73.923480]  __asan_store1+0x6c/0x70
[   73.924225]  krealloc_less_oob_helper+0x104/0x4b8
[   73.924770]  krealloc_less_oob+0x18/0x24
[   73.925227]  kunit_try_run_case+0x80/0x184
[   73.925722]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.926315]  kthread+0x16c/0x21c
[   73.926756]  ret_from_fork+0x10/0x20
[   73.927182] 
[   73.927386] Allocated by task 130:
[   73.927912]  kasan_set_track+0x4c/0x80
[   73.928376]  kasan_save_alloc_info+0x28/0x34
[   73.929044]  __kasan_krealloc+0xcc/0xf8
[   73.929533]  krealloc+0x14c/0x26c
[   73.930015]  krealloc_less_oob_helper+0x9c/0x4b8
[   73.930526]  krealloc_less_oob+0x18/0x24
[   73.930990]  kunit_try_run_case+0x80/0x184
[   73.931474]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.932331]  kthread+0x16c/0x21c
[   73.932786]  ret_from_fork+0x10/0x20
[   73.933211] 
[   73.933423] The buggy address belongs to the object at ffff0000c4b2ba00
[   73.933423]  which belongs to the cache kmalloc-256 of size 256
[   73.934422] The buggy address is located 201 bytes inside of
[   73.934422]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   73.935395] 
[   73.935643] The buggy address belongs to the physical page:
[   73.936383] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   73.937175] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   73.937824] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.938663] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   73.939334] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.939978] page dumped because: kasan: bad access detected
[   73.940515] 
[   73.940989] Memory state around the buggy address:
[   73.941428]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.942064]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.942725] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   73.943300]                                               ^
[   73.943841]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.944690]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.945304] ==================================================================
[   74.222734] ==================================================================
[   74.223267] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[   74.224053] Write of size 1 at addr ffff0000c58ca0eb by task kunit_try_catch/132
[   74.224702] 
[   74.224919] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.225643] Hardware name: linux,dummy-virt (DT)
[   74.226581] Call trace:
[   74.226883]  dump_backtrace+0xf4/0x114
[   74.227356]  show_stack+0x18/0x24
[   74.227784]  __dump_stack+0x28/0x38
[   74.228194]  dump_stack_lvl+0x50/0x68
[   74.228607]  print_address_description+0x7c/0x1ec
[   74.229165]  print_report+0x50/0x68
[   74.229605]  kasan_report+0xac/0xfc
[   74.230067]  __asan_store1+0x6c/0x70
[   74.230519]  krealloc_less_oob_helper+0x260/0x4b8
[   74.231025]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.231571]  kunit_try_run_case+0x80/0x184
[   74.232620]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.233216]  kthread+0x16c/0x21c
[   74.233655]  ret_from_fork+0x10/0x20
[   74.234114] 
[   74.234300] The buggy address belongs to the physical page:
[   74.234799] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.235622] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.236253] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.236942] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.237607] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.238249] page dumped because: kasan: bad access detected
[   74.238746] 
[   74.238936] Memory state around the buggy address:
[   74.239401]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.240312]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.240927] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.241527]                                                           ^
[   74.242099]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.242718]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.243761] ==================================================================
[   74.052025] ==================================================================
[   74.052611] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[   74.053416] Write of size 1 at addr ffff0000c4b2baeb by task kunit_try_catch/130
[   74.054032] 
[   74.054249] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.055017] Hardware name: linux,dummy-virt (DT)
[   74.055427] Call trace:
[   74.055709]  dump_backtrace+0xf4/0x114
[   74.056735]  show_stack+0x18/0x24
[   74.057182]  __dump_stack+0x28/0x38
[   74.057596]  dump_stack_lvl+0x50/0x68
[   74.058039]  print_address_description+0x7c/0x1ec
[   74.058579]  print_report+0x50/0x68
[   74.059065]  kasan_report+0xac/0xfc
[   74.059512]  __asan_store1+0x6c/0x70
[   74.060358]  krealloc_less_oob_helper+0x260/0x4b8
[   74.060903]  krealloc_less_oob+0x18/0x24
[   74.061337]  kunit_try_run_case+0x80/0x184
[   74.061818]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.062397]  kthread+0x16c/0x21c
[   74.062851]  ret_from_fork+0x10/0x20
[   74.063287] 
[   74.063473] Allocated by task 130:
[   74.064349]  kasan_set_track+0x4c/0x80
[   74.064843]  kasan_save_alloc_info+0x28/0x34
[   74.065312]  __kasan_krealloc+0xcc/0xf8
[   74.065841]  krealloc+0x14c/0x26c
[   74.066246]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.066752]  krealloc_less_oob+0x18/0x24
[   74.067228]  kunit_try_run_case+0x80/0x184
[   74.067954]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.068551]  kthread+0x16c/0x21c
[   74.068974]  ret_from_fork+0x10/0x20
[   74.069420] 
[   74.069617] The buggy address belongs to the object at ffff0000c4b2ba00
[   74.069617]  which belongs to the cache kmalloc-256 of size 256
[   74.070577] The buggy address is located 235 bytes inside of
[   74.070577]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   74.071473] 
[   74.072178] The buggy address belongs to the physical page:
[   74.072634] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.073403] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.074085] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.074812] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.075478] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.076396] page dumped because: kasan: bad access detected
[   74.076916] 
[   74.077111] Memory state around the buggy address:
[   74.077604]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.078246]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.078890] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.079479]                                                           ^
[   74.080604]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.081233]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.081883] ==================================================================
[   73.984169] ==================================================================
[   73.985072] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[   73.986090] Write of size 1 at addr ffff0000c4b2bada by task kunit_try_catch/130
[   73.987014] 
[   73.987304] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.988444] Hardware name: linux,dummy-virt (DT)
[   73.989006] Call trace:
[   73.989254]  dump_backtrace+0xf4/0x114
[   73.989695]  show_stack+0x18/0x24
[   73.990151]  __dump_stack+0x28/0x38
[   73.990626]  dump_stack_lvl+0x50/0x68
[   73.991115]  print_address_description+0x7c/0x1ec
[   73.991661]  print_report+0x50/0x68
[   73.992138]  kasan_report+0xac/0xfc
[   73.992562]  __asan_store1+0x6c/0x70
[   73.993104]  krealloc_less_oob_helper+0x1c4/0x4b8
[   73.993703]  krealloc_less_oob+0x18/0x24
[   73.994195]  kunit_try_run_case+0x80/0x184
[   73.994754]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.995560]  kthread+0x16c/0x21c
[   73.996368]  ret_from_fork+0x10/0x20
[   73.996774] 
[   73.996958] Allocated by task 130:
[   73.997250]  kasan_set_track+0x4c/0x80
[   73.997671]  kasan_save_alloc_info+0x28/0x34
[   73.998336]  __kasan_krealloc+0xcc/0xf8
[   73.998987]  krealloc+0x14c/0x26c
[   73.999544]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.000763]  krealloc_less_oob+0x18/0x24
[   74.001400]  kunit_try_run_case+0x80/0x184
[   74.002062]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.002870]  kthread+0x16c/0x21c
[   74.003437]  ret_from_fork+0x10/0x20
[   74.004322] 
[   74.004605] The buggy address belongs to the object at ffff0000c4b2ba00
[   74.004605]  which belongs to the cache kmalloc-256 of size 256
[   74.006015] The buggy address is located 218 bytes inside of
[   74.006015]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   74.007371] 
[   74.007647] The buggy address belongs to the physical page:
[   74.008864] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.009691] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.010198] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.010792] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.011479] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.012138] page dumped because: kasan: bad access detected
[   74.013478] 
[   74.013725] Memory state around the buggy address:
[   74.014213]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.014836]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.015474] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.016613]                                                     ^
[   74.017211]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.017840]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.018449] ==================================================================
[   74.201152] ==================================================================
[   74.202125] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[   74.202933] Write of size 1 at addr ffff0000c58ca0ea by task kunit_try_catch/132
[   74.203497] 
[   74.203719] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.204489] Hardware name: linux,dummy-virt (DT)
[   74.204897] Call trace:
[   74.205184]  dump_backtrace+0xf4/0x114
[   74.205708]  show_stack+0x18/0x24
[   74.206152]  __dump_stack+0x28/0x38
[   74.206594]  dump_stack_lvl+0x50/0x68
[   74.207026]  print_address_description+0x7c/0x1ec
[   74.207594]  print_report+0x50/0x68
[   74.208037]  kasan_report+0xac/0xfc
[   74.208470]  __asan_store1+0x6c/0x70
[   74.208918]  krealloc_less_oob_helper+0x214/0x4b8
[   74.209421]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.210540]  kunit_try_run_case+0x80/0x184
[   74.211031]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.211607]  kthread+0x16c/0x21c
[   74.212055]  ret_from_fork+0x10/0x20
[   74.212475] 
[   74.212664] The buggy address belongs to the physical page:
[   74.213155] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.213913] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.214530] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.215224] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.216479] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.217126] page dumped because: kasan: bad access detected
[   74.217605] 
[   74.217827] Memory state around the buggy address:
[   74.218266]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.218889]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.219515] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.220119]                                                           ^
[   74.220688]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.221331]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.221926] ==================================================================
[   74.179197] ==================================================================
[   74.179769] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[   74.180489] Write of size 1 at addr ffff0000c58ca0da by task kunit_try_catch/132
[   74.181157] 
[   74.181425] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.182218] Hardware name: linux,dummy-virt (DT)
[   74.182656] Call trace:
[   74.182968]  dump_backtrace+0xf4/0x114
[   74.183444]  show_stack+0x18/0x24
[   74.184506]  __dump_stack+0x28/0x38
[   74.184971]  dump_stack_lvl+0x50/0x68
[   74.185444]  print_address_description+0x7c/0x1ec
[   74.185987]  print_report+0x50/0x68
[   74.186417]  kasan_report+0xac/0xfc
[   74.186854]  __asan_store1+0x6c/0x70
[   74.187293]  krealloc_less_oob_helper+0x1c4/0x4b8
[   74.187817]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.188301]  kunit_try_run_case+0x80/0x184
[   74.188771]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.189360]  kthread+0x16c/0x21c
[   74.189771]  ret_from_fork+0x10/0x20
[   74.190224] 
[   74.190408] The buggy address belongs to the physical page:
[   74.190867] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.191640] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.192300] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.193540] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.194222] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.194847] page dumped because: kasan: bad access detected
[   74.195351] 
[   74.195544] Memory state around the buggy address:
[   74.196010]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.196623]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.197238] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.197855]                                                     ^
[   74.198385]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.199021]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.199593] ==================================================================
[   73.946940] ==================================================================
[   73.947440] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[   73.948713] Write of size 1 at addr ffff0000c4b2bad0 by task kunit_try_catch/130
[   73.949658] 
[   73.949992] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.951036] Hardware name: linux,dummy-virt (DT)
[   73.951389] Call trace:
[   73.951630]  dump_backtrace+0xf4/0x114
[   73.952457]  show_stack+0x18/0x24
[   73.953137]  __dump_stack+0x28/0x38
[   73.953767]  dump_stack_lvl+0x50/0x68
[   73.954406]  print_address_description+0x7c/0x1ec
[   73.955172]  print_report+0x50/0x68
[   73.955869]  kasan_report+0xac/0xfc
[   73.956580]  __asan_store1+0x6c/0x70
[   73.957236]  krealloc_less_oob_helper+0x158/0x4b8
[   73.957991]  krealloc_less_oob+0x18/0x24
[   73.958640]  kunit_try_run_case+0x80/0x184
[   73.959236]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.959950]  kthread+0x16c/0x21c
[   73.960566]  ret_from_fork+0x10/0x20
[   73.961222] 
[   73.961522] Allocated by task 130:
[   73.962032]  kasan_set_track+0x4c/0x80
[   73.962693]  kasan_save_alloc_info+0x28/0x34
[   73.963376]  __kasan_krealloc+0xcc/0xf8
[   73.964172]  krealloc+0x14c/0x26c
[   73.964808]  krealloc_less_oob_helper+0x9c/0x4b8
[   73.965336]  krealloc_less_oob+0x18/0x24
[   73.965748]  kunit_try_run_case+0x80/0x184
[   73.966340]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.966987]  kthread+0x16c/0x21c
[   73.967587]  ret_from_fork+0x10/0x20
[   73.968289] 
[   73.968568] The buggy address belongs to the object at ffff0000c4b2ba00
[   73.968568]  which belongs to the cache kmalloc-256 of size 256
[   73.970070] The buggy address is located 208 bytes inside of
[   73.970070]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   73.970994] 
[   73.971180] The buggy address belongs to the physical page:
[   73.971546] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   73.972183] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   73.972678] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.973769] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   73.974796] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.975753] page dumped because: kasan: bad access detected
[   73.976529] 
[   73.976829] Memory state around the buggy address:
[   73.977485]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.978390]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.979298] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   73.980308]                                                  ^
[   73.981153]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.982088]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.982973] ==================================================================
[   74.154369] ==================================================================
[   74.154889] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[   74.156821] Write of size 1 at addr ffff0000c58ca0d0 by task kunit_try_catch/132
[   74.157375] 
[   74.157575] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.158179] Hardware name: linux,dummy-virt (DT)
[   74.158522] Call trace:
[   74.159915]  dump_backtrace+0xf4/0x114
[   74.161076]  show_stack+0x18/0x24
[   74.162501]  __dump_stack+0x28/0x38
[   74.163247]  dump_stack_lvl+0x50/0x68
[   74.163712]  print_address_description+0x7c/0x1ec
[   74.164283]  print_report+0x50/0x68
[   74.164751]  kasan_report+0xac/0xfc
[   74.165214]  __asan_store1+0x6c/0x70
[   74.165684]  krealloc_less_oob_helper+0x158/0x4b8
[   74.166217]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.166728]  kunit_try_run_case+0x80/0x184
[   74.167220]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.167817]  kthread+0x16c/0x21c
[   74.168284]  ret_from_fork+0x10/0x20
[   74.168780] 
[   74.168997] The buggy address belongs to the physical page:
[   74.169526] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.170301] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.170969] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.171678] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.172342] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.172974] page dumped because: kasan: bad access detected
[   74.173466] 
[   74.173673] Memory state around the buggy address:
[   74.174147]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.174797]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.175446] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.176054]                                                  ^
[   74.176617]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.177269]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.177879] ==================================================================
[   74.019627] ==================================================================
[   74.020472] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[   74.021220] Write of size 1 at addr ffff0000c4b2baea by task kunit_try_catch/130
[   74.021984] 
[   74.022226] CPU: 1 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.023138] Hardware name: linux,dummy-virt (DT)
[   74.023648] Call trace:
[   74.023998]  dump_backtrace+0xf4/0x114
[   74.025002]  show_stack+0x18/0x24
[   74.025507]  __dump_stack+0x28/0x38
[   74.026061]  dump_stack_lvl+0x50/0x68
[   74.026604]  print_address_description+0x7c/0x1ec
[   74.027258]  print_report+0x50/0x68
[   74.028124]  kasan_report+0xac/0xfc
[   74.028706]  __asan_store1+0x6c/0x70
[   74.029282]  krealloc_less_oob_helper+0x214/0x4b8
[   74.029921]  krealloc_less_oob+0x18/0x24
[   74.030396]  kunit_try_run_case+0x80/0x184
[   74.030896]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.031452]  kthread+0x16c/0x21c
[   74.031995]  ret_from_fork+0x10/0x20
[   74.032471] 
[   74.032664] Allocated by task 130:
[   74.033024]  kasan_set_track+0x4c/0x80
[   74.033540]  kasan_save_alloc_info+0x28/0x34
[   74.034441]  __kasan_krealloc+0xcc/0xf8
[   74.034964]  krealloc+0x14c/0x26c
[   74.035406]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.036209]  krealloc_less_oob+0x18/0x24
[   74.036695]  kunit_try_run_case+0x80/0x184
[   74.037174]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.037752]  kthread+0x16c/0x21c
[   74.038162]  ret_from_fork+0x10/0x20
[   74.038576] 
[   74.038798] The buggy address belongs to the object at ffff0000c4b2ba00
[   74.038798]  which belongs to the cache kmalloc-256 of size 256
[   74.039702] The buggy address is located 234 bytes inside of
[   74.039702]  256-byte region [ffff0000c4b2ba00, ffff0000c4b2bb00)
[   74.040622] 
[   74.040857] The buggy address belongs to the physical page:
[   74.041331] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   74.042569] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   74.043255] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.044273] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.044978] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.045576] page dumped because: kasan: bad access detected
[   74.046108] 
[   74.046311] Memory state around the buggy address:
[   74.046756]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.047403]  ffff0000c4b2ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.048599] >ffff0000c4b2ba80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.049216]                                                           ^
[   74.049805]  ffff0000c4b2bb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.050440]  ffff0000c4b2bb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.051060] ==================================================================
[   74.133654] ==================================================================
[   74.134527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[   74.135243] Write of size 1 at addr ffff0000c58ca0c9 by task kunit_try_catch/132
[   74.135819] 
[   74.136060] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.136816] Hardware name: linux,dummy-virt (DT)
[   74.137237] Call trace:
[   74.137539]  dump_backtrace+0xf4/0x114
[   74.138033]  show_stack+0x18/0x24
[   74.138460]  __dump_stack+0x28/0x38
[   74.138897]  dump_stack_lvl+0x50/0x68
[   74.139345]  print_address_description+0x7c/0x1ec
[   74.139901]  print_report+0x50/0x68
[   74.140402]  kasan_report+0xac/0xfc
[   74.140861]  __asan_store1+0x6c/0x70
[   74.141303]  krealloc_less_oob_helper+0x104/0x4b8
[   74.141820]  krealloc_pagealloc_less_oob+0x18/0x24
[   74.142346]  kunit_try_run_case+0x80/0x184
[   74.142831]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.143394]  kthread+0x16c/0x21c
[   74.143820]  ret_from_fork+0x10/0x20
[   74.144255] 
[   74.144444] The buggy address belongs to the physical page:
[   74.144926] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.145712] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.146352] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.147050] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.147701] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.148343] page dumped because: kasan: bad access detected
[   74.148816] 
[   74.149002] Memory state around the buggy address:
[   74.149462]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.150079]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.150686] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   74.151316]                                               ^
[   74.151834]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.152439]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.153031] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   73.879183] ==================================================================
[   73.880287] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[   73.881008] Write of size 1 at addr ffff0000c4b2b8f0 by task kunit_try_catch/129
[   73.881599] 
[   73.881834] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.882613] Hardware name: linux,dummy-virt (DT)
[   73.883032] Call trace:
[   73.883329]  dump_backtrace+0xf4/0x114
[   73.884160]  show_stack+0x18/0x24
[   73.884601]  __dump_stack+0x28/0x38
[   73.885021]  dump_stack_lvl+0x50/0x68
[   73.885451]  print_address_description+0x7c/0x1ec
[   73.886006]  print_report+0x50/0x68
[   73.886446]  kasan_report+0xac/0xfc
[   73.886890]  __asan_store1+0x6c/0x70
[   73.887332]  krealloc_more_oob_helper+0x17c/0x2a4
[   73.888336]  krealloc_more_oob+0x18/0x24
[   73.888841]  kunit_try_run_case+0x80/0x184
[   73.889376]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.889966]  kthread+0x16c/0x21c
[   73.890383]  ret_from_fork+0x10/0x20
[   73.890835] 
[   73.891068] Allocated by task 129:
[   73.891432]  kasan_set_track+0x4c/0x80
[   73.891863]  kasan_save_alloc_info+0x28/0x34
[   73.892420]  __kasan_krealloc+0xcc/0xf8
[   73.892906]  krealloc+0x14c/0x26c
[   73.893328]  krealloc_more_oob_helper+0x9c/0x2a4
[   73.894065]  krealloc_more_oob+0x18/0x24
[   73.894475]  kunit_try_run_case+0x80/0x184
[   73.894990]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.895613]  kthread+0x16c/0x21c
[   73.897729]  ret_from_fork+0x10/0x20
[   73.898313] 
[   73.898501] The buggy address belongs to the object at ffff0000c4b2b800
[   73.898501]  which belongs to the cache kmalloc-256 of size 256
[   73.899713] The buggy address is located 240 bytes inside of
[   73.899713]  256-byte region [ffff0000c4b2b800, ffff0000c4b2b900)
[   73.901310] 
[   73.901558] The buggy address belongs to the physical page:
[   73.902041] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   73.903198] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   73.904089] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.905290] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   73.905969] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.906533] page dumped because: kasan: bad access detected
[   73.907035] 
[   73.907238] Memory state around the buggy address:
[   73.907655]  ffff0000c4b2b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.908306]  ffff0000c4b2b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.909224] >ffff0000c4b2b880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   73.909865]                                                              ^
[   73.910450]  ffff0000c4b2b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.911059]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.911664] ==================================================================
[   73.849006] ==================================================================
[   73.849892] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[   73.850594] Write of size 1 at addr ffff0000c4b2b8eb by task kunit_try_catch/129
[   73.851194] 
[   73.851419] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.852321] Hardware name: linux,dummy-virt (DT)
[   73.852843] Call trace:
[   73.853089]  dump_backtrace+0xf4/0x114
[   73.853653]  show_stack+0x18/0x24
[   73.854155]  __dump_stack+0x28/0x38
[   73.854607]  dump_stack_lvl+0x50/0x68
[   73.855057]  print_address_description+0x7c/0x1ec
[   73.855636]  print_report+0x50/0x68
[   73.856196]  kasan_report+0xac/0xfc
[   73.856665]  __asan_store1+0x6c/0x70
[   73.857142]  krealloc_more_oob_helper+0x12c/0x2a4
[   73.857664]  krealloc_more_oob+0x18/0x24
[   73.858153]  kunit_try_run_case+0x80/0x184
[   73.858627]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.859226]  kthread+0x16c/0x21c
[   73.859659]  ret_from_fork+0x10/0x20
[   73.860329] 
[   73.860530] Allocated by task 129:
[   73.860884]  kasan_set_track+0x4c/0x80
[   73.861352]  kasan_save_alloc_info+0x28/0x34
[   73.861809]  __kasan_krealloc+0xcc/0xf8
[   73.862300]  krealloc+0x14c/0x26c
[   73.862691]  krealloc_more_oob_helper+0x9c/0x2a4
[   73.863233]  krealloc_more_oob+0x18/0x24
[   73.863846]  kunit_try_run_case+0x80/0x184
[   73.864319]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.864890]  kthread+0x16c/0x21c
[   73.865301]  ret_from_fork+0x10/0x20
[   73.866100] 
[   73.866320] The buggy address belongs to the object at ffff0000c4b2b800
[   73.866320]  which belongs to the cache kmalloc-256 of size 256
[   73.867278] The buggy address is located 235 bytes inside of
[   73.867278]  256-byte region [ffff0000c4b2b800, ffff0000c4b2b900)
[   73.868438] 
[   73.868675] The buggy address belongs to the physical page:
[   73.869147] page:00000000c9970dfc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104b2a
[   73.869966] head:00000000c9970dfc order:1 compound_mapcount:0 compound_pincount:0
[   73.870590] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.871315] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   73.872550] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.873182] page dumped because: kasan: bad access detected
[   73.873669] 
[   73.873870] Memory state around the buggy address:
[   73.874331]  ffff0000c4b2b780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.874996]  ffff0000c4b2b800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.875608] >ffff0000c4b2b880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   73.876203]                                                           ^
[   73.877051]  ffff0000c4b2b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.877653]  ffff0000c4b2b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.878249] ==================================================================
[   74.109619] ==================================================================
[   74.110188] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[   74.110899] Write of size 1 at addr ffff0000c58ca0f0 by task kunit_try_catch/131
[   74.111506] 
[   74.111765] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.112502] Hardware name: linux,dummy-virt (DT)
[   74.112965] Call trace:
[   74.113244]  dump_backtrace+0xf4/0x114
[   74.113746]  show_stack+0x18/0x24
[   74.114175]  __dump_stack+0x28/0x38
[   74.114595]  dump_stack_lvl+0x50/0x68
[   74.115058]  print_address_description+0x7c/0x1ec
[   74.115578]  print_report+0x50/0x68
[   74.116188]  kasan_report+0xac/0xfc
[   74.116630]  __asan_store1+0x6c/0x70
[   74.117081]  krealloc_more_oob_helper+0x17c/0x2a4
[   74.117588]  krealloc_pagealloc_more_oob+0x18/0x24
[   74.118456]  kunit_try_run_case+0x80/0x184
[   74.118984]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.119553]  kthread+0x16c/0x21c
[   74.119984]  ret_from_fork+0x10/0x20
[   74.120405] 
[   74.120592] The buggy address belongs to the physical page:
[   74.121096] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.121888] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.122514] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.123227] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.124442] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.125096] page dumped because: kasan: bad access detected
[   74.125609] 
[   74.125833] Memory state around the buggy address:
[   74.126312]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.126942]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.127580] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   74.128173]                                                              ^
[   74.128770]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.129452]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.130070] ==================================================================
[   74.086636] ==================================================================
[   74.087508] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[   74.088638] Write of size 1 at addr ffff0000c58ca0eb by task kunit_try_catch/131
[   74.089260] 
[   74.089517] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.090278] Hardware name: linux,dummy-virt (DT)
[   74.090680] Call trace:
[   74.090973]  dump_backtrace+0xf4/0x114
[   74.091437]  show_stack+0x18/0x24
[   74.092425]  __dump_stack+0x28/0x38
[   74.093007]  dump_stack_lvl+0x50/0x68
[   74.093448]  print_address_description+0x7c/0x1ec
[   74.093948]  print_report+0x50/0x68
[   74.094445]  kasan_report+0xac/0xfc
[   74.094974]  __asan_store1+0x6c/0x70
[   74.095443]  krealloc_more_oob_helper+0x12c/0x2a4
[   74.095959]  krealloc_pagealloc_more_oob+0x18/0x24
[   74.096498]  kunit_try_run_case+0x80/0x184
[   74.096965]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.097527]  kthread+0x16c/0x21c
[   74.097959]  ret_from_fork+0x10/0x20
[   74.098368] 
[   74.098556] The buggy address belongs to the physical page:
[   74.099032] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.099794] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   74.100414] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.101155] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.101848] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.102464] page dumped because: kasan: bad access detected
[   74.103489] 
[   74.103713] Memory state around the buggy address:
[   74.104159]  ffff0000c58c9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.104819]  ffff0000c58ca000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.105460] >ffff0000c58ca080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   74.106065]                                                           ^
[   74.106624]  ffff0000c58ca100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.107248]  ffff0000c58ca180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.108370] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   73.806788] ==================================================================
[   73.808479] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xa0/0x14c
[   73.809964] Write of size 1 at addr ffff0000c59f1f00 by task kunit_try_catch/128
[   73.811476] 
[   73.811875] CPU: 0 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.813204] Hardware name: linux,dummy-virt (DT)
[   73.813992] Call trace:
[   73.814508]  dump_backtrace+0xf4/0x114
[   73.815321]  show_stack+0x18/0x24
[   73.816043]  __dump_stack+0x28/0x38
[   73.816902]  dump_stack_lvl+0x50/0x68
[   73.817795]  print_address_description+0x7c/0x1ec
[   73.818843]  print_report+0x50/0x68
[   73.819611]  kasan_report+0xac/0xfc
[   73.820051]  __asan_store1+0x6c/0x70
[   73.820473]  kmalloc_large_oob_right+0xa0/0x14c
[   73.821147]  kunit_try_run_case+0x80/0x184
[   73.821848]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.822672]  kthread+0x16c/0x21c
[   73.823278]  ret_from_fork+0x10/0x20
[   73.823935] 
[   73.824252] Allocated by task 128:
[   73.824776]  kasan_set_track+0x4c/0x80
[   73.825442]  kasan_save_alloc_info+0x28/0x34
[   73.826119]  __kasan_kmalloc+0x88/0xa0
[   73.826778]  kmalloc_trace+0x54/0x68
[   73.827389]  kmalloc_large_oob_right+0x48/0x14c
[   73.828197]  kunit_try_run_case+0x80/0x184
[   73.828934]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.829791]  kthread+0x16c/0x21c
[   73.830379]  ret_from_fork+0x10/0x20
[   73.830770] 
[   73.831121] The buggy address belongs to the object at ffff0000c59f0000
[   73.831121]  which belongs to the cache kmalloc-8k of size 8192
[   73.832780] The buggy address is located 7936 bytes inside of
[   73.832780]  8192-byte region [ffff0000c59f0000, ffff0000c59f2000)
[   73.834073] 
[   73.834259] The buggy address belongs to the physical page:
[   73.834620] page:000000007696d2f2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f0
[   73.835900] head:000000007696d2f2 order:3 compound_mapcount:0 compound_pincount:0
[   73.837070] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.838099] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[   73.839097] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   73.840124] page dumped because: kasan: bad access detected
[   73.840829] 
[   73.841014] Memory state around the buggy address:
[   73.841380]  ffff0000c59f1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.841878]  ffff0000c59f1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.842367] >ffff0000c59f1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.842911]                    ^
[   73.843422]  ffff0000c59f1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.844458]  ffff0000c59f2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.845351] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-pagealloc_uaf
[   73.770390] ==================================================================
[   73.771629] BUG: KASAN: use-after-free in pagealloc_uaf+0x90/0x134
[   73.773529] Read of size 1 at addr ffff0000c5a20000 by task kunit_try_catch/127
[   73.774954] 
[   73.775471] CPU: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.776891] Hardware name: linux,dummy-virt (DT)
[   73.777253] Call trace:
[   73.777493]  dump_backtrace+0xf4/0x114
[   73.778422]  show_stack+0x18/0x24
[   73.779255]  __dump_stack+0x28/0x38
[   73.780317]  dump_stack_lvl+0x50/0x68
[   73.781056]  print_address_description+0x7c/0x1ec
[   73.782038]  print_report+0x50/0x68
[   73.782878]  kasan_report+0xac/0xfc
[   73.783717]  __asan_load1+0x6c/0x70
[   73.784584]  pagealloc_uaf+0x90/0x134
[   73.785433]  kunit_try_run_case+0x80/0x184
[   73.786348]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.787384]  kthread+0x16c/0x21c
[   73.788254]  ret_from_fork+0x10/0x20
[   73.788937] 
[   73.789132] The buggy address belongs to the physical page:
[   73.789515] page:00000000ef861166 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a20
[   73.791106] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   73.792559] raw: 0bfffc0000000000 ffff0000ff7f4a08 ffff0000ff7f4a08 0000000000000000
[   73.793706] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000
[   73.794921] page dumped because: kasan: bad access detected
[   73.795885] 
[   73.796445] Memory state around the buggy address:
[   73.797163]  ffff0000c5a1ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.797671]  ffff0000c5a1ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.798952] >ffff0000c5a20000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.800231]                    ^
[   73.800974]  ffff0000c5a20080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.802164]  ffff0000c5a20100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.803006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   73.735527] ==================================================================
[   73.737412] BUG: KASAN: invalid-free in kfree+0x70/0x74
[   73.738250] Free of addr ffff0000c58c8001 by task kunit_try_catch/125
[   73.739118] 
[   73.739443] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.740832] Hardware name: linux,dummy-virt (DT)
[   73.741475] Call trace:
[   73.741881]  dump_backtrace+0xf4/0x114
[   73.742550]  show_stack+0x18/0x24
[   73.743170]  __dump_stack+0x28/0x38
[   73.743956]  dump_stack_lvl+0x50/0x68
[   73.744653]  print_address_description+0x7c/0x1ec
[   73.745475]  print_report+0x50/0x68
[   73.746100]  kasan_report_invalid_free+0x9c/0xe4
[   73.746572]  __kasan_kfree_large+0x68/0x78
[   73.747105]  free_large_kmalloc+0x60/0xe4
[   73.747588]  kfree+0x70/0x74
[   73.747993]  kmalloc_pagealloc_invalid_free+0x80/0x120
[   73.748538]  kunit_try_run_case+0x80/0x184
[   73.749104]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.749701]  kthread+0x16c/0x21c
[   73.750161]  ret_from_fork+0x10/0x20
[   73.750574] 
[   73.750790] The buggy address belongs to the physical page:
[   73.751245] page:000000000dfb6053 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   73.752122] head:000000000dfb6053 order:2 compound_mapcount:0 compound_pincount:0
[   73.752760] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   73.753448] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   73.754579] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   73.755185] page dumped because: kasan: bad access detected
[   73.755633] 
[   73.756107] Memory state around the buggy address:
[   73.756545]  ffff0000c58c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.757192]  ffff0000c58c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.757834] >ffff0000c58c8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.758422]                    ^
[   73.758795]  ffff0000c58c8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.759441]  ffff0000c58c8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.760563] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_pagealloc_uaf
[   73.702692] ==================================================================
[   73.703603] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x88/0x12c
[   73.705547] Read of size 1 at addr ffff0000c58c8000 by task kunit_try_catch/124
[   73.707400] 
[   73.708179] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.709421] Hardware name: linux,dummy-virt (DT)
[   73.710162] Call trace:
[   73.710940]  dump_backtrace+0xf4/0x114
[   73.711952]  show_stack+0x18/0x24
[   73.712644]  __dump_stack+0x28/0x38
[   73.713499]  dump_stack_lvl+0x50/0x68
[   73.714311]  print_address_description+0x7c/0x1ec
[   73.715174]  print_report+0x50/0x68
[   73.716039]  kasan_report+0xac/0xfc
[   73.716847]  __asan_load1+0x6c/0x70
[   73.717277]  kmalloc_pagealloc_uaf+0x88/0x12c
[   73.717703]  kunit_try_run_case+0x80/0x184
[   73.718503]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.719294]  kthread+0x16c/0x21c
[   73.720021]  ret_from_fork+0x10/0x20
[   73.720569] 
[   73.720774] The buggy address belongs to the physical page:
[   73.721419] page:000000000dfb6053 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   73.722124] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   73.722677] raw: 0bfffc0000000000 ffff0000daf64fb8 ffff0000daf64fb8 0000000000000000
[   73.723696] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   73.724728] page dumped because: kasan: bad access detected
[   73.725461] 
[   73.725768] Memory state around the buggy address:
[   73.726413]  ffff0000c58c7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.727320]  ffff0000c58c7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.728351] >ffff0000c58c8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.729171]                    ^
[   73.729575]  ffff0000c58c8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.730072]  ffff0000c58c8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   73.730525] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_pagealloc_oob_right
[   73.677896] ==================================================================
[   73.678825] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x84/0x130
[   73.679561] Write of size 1 at addr ffff0000c59d600a by task kunit_try_catch/123
[   73.680450] 
[   73.680732] CPU: 0 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.681551] Hardware name: linux,dummy-virt (DT)
[   73.682016] Call trace:
[   73.682322]  dump_backtrace+0xf4/0x114
[   73.682827]  show_stack+0x18/0x24
[   73.683272]  __dump_stack+0x28/0x38
[   73.683756]  dump_stack_lvl+0x50/0x68
[   73.684383]  print_address_description+0x7c/0x1ec
[   73.684972]  print_report+0x50/0x68
[   73.685445]  kasan_report+0xac/0xfc
[   73.685913]  __asan_store1+0x6c/0x70
[   73.686380]  kmalloc_pagealloc_oob_right+0x84/0x130
[   73.686921]  kunit_try_run_case+0x80/0x184
[   73.687402]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.688194]  kthread+0x16c/0x21c
[   73.688638]  ret_from_fork+0x10/0x20
[   73.689121] 
[   73.689344] The buggy address belongs to the physical page:
[   73.689931] page:000000008cac2150 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d4
[   73.690703] head:000000008cac2150 order:2 compound_mapcount:0 compound_pincount:0
[   73.691368] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   73.692296] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   73.692986] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   73.693651] page dumped because: kasan: bad access detected
[   73.694170] 
[   73.694386] Memory state around the buggy address:
[   73.694866]  ffff0000c59d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.695564]  ffff0000c59d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.696370] >ffff0000c59d6000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   73.697011]                       ^
[   73.697415]  ffff0000c59d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   73.698078]  ffff0000c59d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   73.698692] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   73.638861] ==================================================================
[   73.641959] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xa4/0x15c
[   73.642854] Read of size 1 at addr ffff0000c593f000 by task kunit_try_catch/122
[   73.643526] 
[   73.643776] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.644598] Hardware name: linux,dummy-virt (DT)
[   73.645269] Call trace:
[   73.645588]  dump_backtrace+0xf4/0x114
[   73.646148]  show_stack+0x18/0x24
[   73.646945]  __dump_stack+0x28/0x38
[   73.647400]  dump_stack_lvl+0x50/0x68
[   73.647885]  print_address_description+0x7c/0x1ec
[   73.648727]  print_report+0x50/0x68
[   73.649214]  kasan_report+0xac/0xfc
[   73.649722]  __asan_load1+0x6c/0x70
[   73.650199]  kmalloc_node_oob_right+0xa4/0x15c
[   73.650720]  kunit_try_run_case+0x80/0x184
[   73.651220]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.651876]  kthread+0x16c/0x21c
[   73.652833]  ret_from_fork+0x10/0x20
[   73.653284] 
[   73.653504] Allocated by task 122:
[   73.653897]  kasan_set_track+0x4c/0x80
[   73.654379]  kasan_save_alloc_info+0x28/0x34
[   73.654873]  __kasan_kmalloc+0x88/0xa0
[   73.655353]  kmalloc_node_trace+0x4c/0x60
[   73.655884]  kmalloc_node_oob_right+0x4c/0x15c
[   73.656673]  kunit_try_run_case+0x80/0x184
[   73.657205]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.657801]  kthread+0x16c/0x21c
[   73.658234]  ret_from_fork+0x10/0x20
[   73.658706] 
[   73.658930] The buggy address belongs to the object at ffff0000c593e000
[   73.658930]  which belongs to the cache kmalloc-4k of size 4096
[   73.660389] The buggy address is located 0 bytes to the right of
[   73.660389]  4096-byte region [ffff0000c593e000, ffff0000c593f000)
[   73.661397] 
[   73.661658] The buggy address belongs to the physical page:
[   73.662259] page:00000000949663e6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105938
[   73.663108] head:00000000949663e6 order:3 compound_mapcount:0 compound_pincount:0
[   73.664073] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   73.664875] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[   73.665608] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   73.666257] page dumped because: kasan: bad access detected
[   73.666757] 
[   73.666979] Memory state around the buggy address:
[   73.667460]  ffff0000c593ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.668583]  ffff0000c593ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   73.669307] >ffff0000c593f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.669941]                    ^
[   73.670283]  ffff0000c593f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.670922]  ffff0000c593f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.671545] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   73.584537] ==================================================================
[   73.585273] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x9c/0x154
[   73.586507] Read of size 1 at addr ffff0000c54ff4ff by task kunit_try_catch/121
[   73.588266] 
[   73.588688] CPU: 1 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.590154] Hardware name: linux,dummy-virt (DT)
[   73.591228] Call trace:
[   73.591889]  dump_backtrace+0xf4/0x114
[   73.593065]  show_stack+0x18/0x24
[   73.593935]  __dump_stack+0x28/0x38
[   73.594901]  dump_stack_lvl+0x50/0x68
[   73.596079]  print_address_description+0x7c/0x1ec
[   73.597179]  print_report+0x50/0x68
[   73.597962]  kasan_report+0xac/0xfc
[   73.598394]  __asan_load1+0x6c/0x70
[   73.599003]  kmalloc_oob_left+0x9c/0x154
[   73.599929]  kunit_try_run_case+0x80/0x184
[   73.600792]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.601653]  kthread+0x16c/0x21c
[   73.602282]  ret_from_fork+0x10/0x20
[   73.602922] 
[   73.603225] Allocated by task 1:
[   73.603760]  kasan_set_track+0x4c/0x80
[   73.604451]  kasan_save_alloc_info+0x28/0x34
[   73.605139]  __kasan_kmalloc+0x88/0xa0
[   73.605834]  kmalloc_trace+0x54/0x68
[   73.606468]  __kthread_create_on_node+0x90/0x28c
[   73.607219]  kthread_create_on_node+0x8c/0xbc
[   73.608048]  kunit_try_catch_run+0xac/0x30c
[   73.608490]  kunit_run_tests+0x2f8/0xa3c
[   73.608907]  __kunit_test_suites_init+0x74/0xa8
[   73.609351]  kunit_exec_run_tests+0x64/0x74
[   73.609854]  kunit_run_all_tests+0x88/0x1e0
[   73.610380]  kernel_init_freeable+0x174/0x1e4
[   73.610832]  kernel_init+0x20/0x138
[   73.611372]  ret_from_fork+0x10/0x20
[   73.612018] 
[   73.612255] Freed by task 1:
[   73.612591]  kasan_set_track+0x4c/0x80
[   73.613094]  kasan_save_free_info+0x3c/0x60
[   73.613622]  ____kasan_slab_free+0xe8/0x140
[   73.614134]  __kasan_slab_free+0x18/0x28
[   73.614636]  __kmem_cache_free+0xdc/0x27c
[   73.615119]  kfree+0x60/0x74
[   73.615533]  __kthread_create_on_node+0x204/0x28c
[   73.616307]  kthread_create_on_node+0x8c/0xbc
[   73.616802]  kunit_try_catch_run+0xac/0x30c
[   73.617316]  kunit_run_tests+0x2f8/0xa3c
[   73.617776]  __kunit_test_suites_init+0x74/0xa8
[   73.618291]  kunit_exec_run_tests+0x64/0x74
[   73.618769]  kunit_run_all_tests+0x88/0x1e0
[   73.619271]  kernel_init_freeable+0x174/0x1e4
[   73.619769]  kernel_init+0x20/0x138
[   73.620219]  ret_from_fork+0x10/0x20
[   73.620647] 
[   73.620897] The buggy address belongs to the object at ffff0000c54ff400
[   73.620897]  which belongs to the cache kmalloc-128 of size 128
[   73.621812] The buggy address is located 127 bytes to the right of
[   73.621812]  128-byte region [ffff0000c54ff400, ffff0000c54ff480)
[   73.622734] 
[   73.622963] The buggy address belongs to the physical page:
[   73.623415] page:00000000a33f1f12 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054ff
[   73.624401] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.625127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.625884] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.626497] page dumped because: kasan: bad access detected
[   73.626989] 
[   73.627178] Memory state around the buggy address:
[   73.627638]  ffff0000c54ff380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.628504]  ffff0000c54ff400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.629148] >ffff0000c54ff480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.629757]                                                                 ^
[   73.630336]  ffff0000c54ff500: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.630931]  ffff0000c54ff580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.631530] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   73.526441] ==================================================================
[   73.527022] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe8/0x264
[   73.528556] Write of size 1 at addr ffff0000c5926278 by task kunit_try_catch/120
[   73.529124] 
[   73.529347] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.530417] Hardware name: linux,dummy-virt (DT)
[   73.530780] Call trace:
[   73.531018]  dump_backtrace+0xf4/0x114
[   73.531565]  show_stack+0x18/0x24
[   73.532278]  __dump_stack+0x28/0x38
[   73.532821]  dump_stack_lvl+0x50/0x68
[   73.533280]  print_address_description+0x7c/0x1ec
[   73.533829]  print_report+0x50/0x68
[   73.534298]  kasan_report+0xac/0xfc
[   73.534755]  __asan_store1+0x6c/0x70
[   73.535196]  kmalloc_oob_right+0xe8/0x264
[   73.535634]  kunit_try_run_case+0x80/0x184
[   73.536129]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.536752]  kthread+0x16c/0x21c
[   73.537157]  ret_from_fork+0x10/0x20
[   73.537595] 
[   73.537791] Allocated by task 120:
[   73.538143]  kasan_set_track+0x4c/0x80
[   73.538607]  kasan_save_alloc_info+0x28/0x34
[   73.539107]  __kasan_kmalloc+0x88/0xa0
[   73.539548]  kmalloc_trace+0x54/0x68
[   73.539971]  kmalloc_oob_right+0x48/0x264
[   73.540485]  kunit_try_run_case+0x80/0x184
[   73.540993]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.541580]  kthread+0x16c/0x21c
[   73.542023]  ret_from_fork+0x10/0x20
[   73.542416] 
[   73.542629] The buggy address belongs to the object at ffff0000c5926200
[   73.542629]  which belongs to the cache kmalloc-128 of size 128
[   73.543495] The buggy address is located 120 bytes inside of
[   73.543495]  128-byte region [ffff0000c5926200, ffff0000c5926280)
[   73.544629] 
[   73.544919] The buggy address belongs to the physical page:
[   73.545400] page:000000009e191ffb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   73.546088] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.546829] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.547481] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.548229] page dumped because: kasan: bad access detected
[   73.548723] 
[   73.548978] Memory state around the buggy address:
[   73.549384]  ffff0000c5926100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.550088]  ffff0000c5926180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.550683] >ffff0000c5926200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   73.551306]                                                                 ^
[   73.551966]  ffff0000c5926280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.552644]  ffff0000c5926300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.553403] ==================================================================
[   73.487546] ==================================================================
[   73.488859] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x9c/0x264
[   73.490373] Write of size 1 at addr ffff0000c5926273 by task kunit_try_catch/120
[   73.491229] 
[   73.491652] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G                 N 6.1.146-rc1 #1
[   73.493002] Hardware name: linux,dummy-virt (DT)
[   73.493833] Call trace:
[   73.494268]  dump_backtrace+0xf4/0x114
[   73.494978]  show_stack+0x18/0x24
[   73.495564]  __dump_stack+0x28/0x38
[   73.496206]  dump_stack_lvl+0x50/0x68
[   73.496816]  print_address_description+0x7c/0x1ec
[   73.497563]  print_report+0x50/0x68
[   73.498178]  kasan_report+0xac/0xfc
[   73.498681]  __asan_store1+0x6c/0x70
[   73.499362]  kmalloc_oob_right+0x9c/0x264
[   73.500123]  kunit_try_run_case+0x80/0x184
[   73.500714]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.501236]  kthread+0x16c/0x21c
[   73.501632]  ret_from_fork+0x10/0x20
[   73.502324] 
[   73.502650] Allocated by task 120:
[   73.503224]  kasan_set_track+0x4c/0x80
[   73.504082]  kasan_save_alloc_info+0x28/0x34
[   73.504772]  __kasan_kmalloc+0x88/0xa0
[   73.505408]  kmalloc_trace+0x54/0x68
[   73.506003]  kmalloc_oob_right+0x48/0x264
[   73.506627]  kunit_try_run_case+0x80/0x184
[   73.507284]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.508193]  kthread+0x16c/0x21c
[   73.508829]  ret_from_fork+0x10/0x20
[   73.509455] 
[   73.509798] The buggy address belongs to the object at ffff0000c5926200
[   73.509798]  which belongs to the cache kmalloc-128 of size 128
[   73.511256] The buggy address is located 115 bytes inside of
[   73.511256]  128-byte region [ffff0000c5926200, ffff0000c5926280)
[   73.512698] 
[   73.513158] The buggy address belongs to the physical page:
[   73.514036] page:000000009e191ffb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   73.515033] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.516223] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.517252] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.518225] page dumped because: kasan: bad access detected
[   73.518949] 
[   73.519260] Memory state around the buggy address:
[   73.520112]  ffff0000c5926100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   73.521060]  ffff0000c5926180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.521995] >ffff0000c5926200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   73.522885]                                                              ^
[   73.523848]  ffff0000c5926280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.524693]  ffff0000c5926300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.525216] ==================================================================
[   73.554437] ==================================================================
[   73.554988] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x264
[   73.555647] Read of size 1 at addr ffff0000c5926280 by task kunit_try_catch/120
[   73.556425] 
[   73.556647] CPU: 0 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   73.557399] Hardware name: linux,dummy-virt (DT)
[   73.557956] Call trace:
[   73.558237]  dump_backtrace+0xf4/0x114
[   73.558749]  show_stack+0x18/0x24
[   73.559170]  __dump_stack+0x28/0x38
[   73.559603]  dump_stack_lvl+0x50/0x68
[   73.560191]  print_address_description+0x7c/0x1ec
[   73.560723]  print_report+0x50/0x68
[   73.561173]  kasan_report+0xac/0xfc
[   73.561662]  __asan_load1+0x6c/0x70
[   73.562123]  kmalloc_oob_right+0x134/0x264
[   73.562567]  kunit_try_run_case+0x80/0x184
[   73.563031]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.563595]  kthread+0x16c/0x21c
[   73.564191]  ret_from_fork+0x10/0x20
[   73.564598] 
[   73.564813] Allocated by task 120:
[   73.565179]  kasan_set_track+0x4c/0x80
[   73.565682]  kasan_save_alloc_info+0x28/0x34
[   73.566180]  __kasan_kmalloc+0x88/0xa0
[   73.566681]  kmalloc_trace+0x54/0x68
[   73.567106]  kmalloc_oob_right+0x48/0x264
[   73.567544]  kunit_try_run_case+0x80/0x184
[   73.568176]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   73.568751]  kthread+0x16c/0x21c
[   73.569243]  ret_from_fork+0x10/0x20
[   73.569658] 
[   73.569887] The buggy address belongs to the object at ffff0000c5926200
[   73.569887]  which belongs to the cache kmalloc-128 of size 128
[   73.570793] The buggy address is located 0 bytes to the right of
[   73.570793]  128-byte region [ffff0000c5926200, ffff0000c5926280)
[   73.571902] 
[   73.572134] The buggy address belongs to the physical page:
[   73.572599] page:000000009e191ffb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105926
[   73.573382] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   73.574072] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   73.574750] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   73.575338] page dumped because: kasan: bad access detected
[   73.576342] 
[   73.576568] Memory state around the buggy address:
[   73.577020]  ffff0000c5926180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.577688]  ffff0000c5926200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   73.578334] >ffff0000c5926280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.578934]                    ^
[   73.579283]  ffff0000c5926300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.580083]  ffff0000c5926380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.580703] ==================================================================