Hay
Date
July 15, 2025, 2:10 p.m.
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[   77.683739] ==================================================================
[   77.684315] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0xe4/0x25c
[   77.685192] Read of size 1 at addr ffff8000080fb7f8 by task kunit_try_catch/169
[   77.686015] 
[   77.686316] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.687795] Hardware name: linux,dummy-virt (DT)
[   77.688235] Call trace:
[   77.688513]  dump_backtrace+0xf8/0x118
[   77.689037]  show_stack+0x18/0x24
[   77.689640]  __dump_stack+0x28/0x38
[   77.690094]  dump_stack_lvl+0x54/0x6c
[   77.690519]  print_address_description+0x7c/0x1ec
[   77.691064]  print_report+0x50/0x68
[   77.691507]  kasan_report+0xac/0x100
[   77.691962]  __asan_load1+0x6c/0x70
[   77.692416]  vmalloc_oob+0xe4/0x25c
[   77.692946]  kunit_try_run_case+0x80/0x184
[   77.693456]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.694038]  kthread+0x16c/0x21c
[   77.694467]  ret_from_fork+0x10/0x20
[   77.694929] 
[   77.695133] The buggy address ffff8000080fb7f8 belongs to a vmalloc virtual mapping
[   77.695771] The buggy address belongs to the physical page:
[   77.696240] page:00000000471b2048 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ace
[   77.697173] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   77.697926] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   77.698596] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   77.699196] page dumped because: kasan: bad access detected
[   77.699695] 
[   77.699912] Memory state around the buggy address:
[   77.700355]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   77.701130]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   77.701895] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   77.702581]                                                                 ^
[   77.703196]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   77.703868]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   77.704440] ==================================================================
[   77.662520] ==================================================================
[   77.663655] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x9c/0x25c
[   77.664476] Read of size 1 at addr ffff8000080fb7f3 by task kunit_try_catch/169
[   77.665444] 
[   77.665684] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.666426] Hardware name: linux,dummy-virt (DT)
[   77.666890] Call trace:
[   77.667158]  dump_backtrace+0xf8/0x118
[   77.667615]  show_stack+0x18/0x24
[   77.668047]  __dump_stack+0x28/0x38
[   77.668501]  dump_stack_lvl+0x54/0x6c
[   77.668971]  print_address_description+0x7c/0x1ec
[   77.669554]  print_report+0x50/0x68
[   77.670000]  kasan_report+0xac/0x100
[   77.670461]  __asan_load1+0x6c/0x70
[   77.670921]  vmalloc_oob+0x9c/0x25c
[   77.671341]  kunit_try_run_case+0x80/0x184
[   77.671851]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.672430]  kthread+0x16c/0x21c
[   77.672950]  ret_from_fork+0x10/0x20
[   77.673418] 
[   77.673652] The buggy address ffff8000080fb7f3 belongs to a vmalloc virtual mapping
[   77.674294] The buggy address belongs to the physical page:
[   77.674787] page:00000000471b2048 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ace
[   77.675533] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   77.676201] raw: 0bfffc0000000000 0000000000000000 dead000000000122 0000000000000000
[   77.676954] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   77.677597] page dumped because: kasan: bad access detected
[   77.678113] 
[   77.678310] Memory state around the buggy address:
[   77.678748]  ffff8000080fb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   77.679409]  ffff8000080fb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   77.680040] >ffff8000080fb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8
[   77.680637]                                                              ^
[   77.681382]  ffff8000080fb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   77.682211]  ffff8000080fb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
[   77.682846] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[   77.621130] ==================================================================
[   77.621718] BUG: KASAN: double-free in kfree_sensitive+0x88/0xa4
[   77.622341] Free of addr ffff0000c5ad0000 by task kunit_try_catch/167
[   77.622908] 
[   77.623137] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.623914] Hardware name: linux,dummy-virt (DT)
[   77.624359] Call trace:
[   77.624829]  dump_backtrace+0xf8/0x118
[   77.625308]  show_stack+0x18/0x24
[   77.625778]  __dump_stack+0x28/0x38
[   77.626225]  dump_stack_lvl+0x54/0x6c
[   77.626651]  print_address_description+0x7c/0x1ec
[   77.627462]  print_report+0x50/0x68
[   77.627919]  kasan_report_invalid_free+0x9c/0xe8
[   77.628452]  ____kasan_slab_free+0x108/0x140
[   77.629430]  __kasan_slab_free+0x18/0x28
[   77.629925]  __kmem_cache_free+0xdc/0x284
[   77.630373]  kfree_sensitive+0x88/0xa4
[   77.630849]  kmalloc_double_kzfree+0xa4/0x144
[   77.631340]  kunit_try_run_case+0x80/0x184
[   77.631825]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.632422]  kthread+0x16c/0x21c
[   77.633266]  ret_from_fork+0x10/0x20
[   77.633729] 
[   77.633964] Allocated by task 167:
[   77.634305]  kasan_set_track+0x4c/0x80
[   77.634764]  kasan_save_alloc_info+0x28/0x34
[   77.635209]  __kasan_kmalloc+0x88/0xa0
[   77.635663]  kmalloc_trace+0x54/0x68
[   77.636092]  kmalloc_double_kzfree+0x48/0x144
[   77.636584]  kunit_try_run_case+0x80/0x184
[   77.637237]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.637856]  kthread+0x16c/0x21c
[   77.638302]  ret_from_fork+0x10/0x20
[   77.638722] 
[   77.638931] Freed by task 167:
[   77.639238]  kasan_set_track+0x4c/0x80
[   77.639686]  kasan_save_free_info+0x3c/0x60
[   77.640180]  ____kasan_slab_free+0xe8/0x140
[   77.641190]  __kasan_slab_free+0x18/0x28
[   77.641685]  __kmem_cache_free+0xdc/0x284
[   77.642154]  kfree_sensitive+0x88/0xa4
[   77.642617]  kmalloc_double_kzfree+0x90/0x144
[   77.643117]  kunit_try_run_case+0x80/0x184
[   77.643587]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.644172]  kthread+0x16c/0x21c
[   77.644748]  ret_from_fork+0x10/0x20
[   77.645221] 
[   77.645423] The buggy address belongs to the object at ffff0000c5ad0000
[   77.645423]  which belongs to the cache kmalloc-128 of size 128
[   77.646377] The buggy address is located 0 bytes inside of
[   77.646377]  128-byte region [ffff0000c5ad0000, ffff0000c5ad0080)
[   77.647338] 
[   77.647569] The buggy address belongs to the physical page:
[   77.648054] page:000000001efa35a5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ad0
[   77.649055] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.649790] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.650504] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.651108] page dumped because: kasan: bad access detected
[   77.651584] 
[   77.651784] Memory state around the buggy address:
[   77.652252]  ffff0000c5acff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.653122]  ffff0000c5acff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.653768] >ffff0000c5ad0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.654387]                    ^
[   77.654729]  ffff0000c5ad0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.655362]  ffff0000c5ad0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.655953] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kfree_sensitive
[   77.586541] ==================================================================
[   77.587632] BUG: KASAN: use-after-free in kfree_sensitive+0x1c/0xa4
[   77.588282] Read of size 1 at addr ffff0000c5ad0000 by task kunit_try_catch/167
[   77.588908] 
[   77.589125] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.589900] Hardware name: linux,dummy-virt (DT)
[   77.590347] Call trace:
[   77.590624]  dump_backtrace+0xf8/0x118
[   77.591164]  show_stack+0x18/0x24
[   77.591626]  __dump_stack+0x28/0x38
[   77.592095]  dump_stack_lvl+0x54/0x6c
[   77.592543]  print_address_description+0x7c/0x1ec
[   77.593194]  print_report+0x50/0x68
[   77.593664]  kasan_report+0xac/0x100
[   77.594156]  __kasan_check_byte+0x3c/0x54
[   77.594646]  ksize+0x34/0x13c
[   77.595055]  kfree_sensitive+0x1c/0xa4
[   77.595506]  kmalloc_double_kzfree+0xa4/0x144
[   77.596013]  kunit_try_run_case+0x80/0x184
[   77.596523]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.597236]  kthread+0x16c/0x21c
[   77.597653]  ret_from_fork+0x10/0x20
[   77.598113] 
[   77.598303] Allocated by task 167:
[   77.598638]  kasan_set_track+0x4c/0x80
[   77.599129]  kasan_save_alloc_info+0x28/0x34
[   77.599627]  __kasan_kmalloc+0x88/0xa0
[   77.600129]  kmalloc_trace+0x54/0x68
[   77.600555]  kmalloc_double_kzfree+0x48/0x144
[   77.601063]  kunit_try_run_case+0x80/0x184
[   77.601677]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.602280]  kthread+0x16c/0x21c
[   77.602695]  ret_from_fork+0x10/0x20
[   77.603139] 
[   77.603339] Freed by task 167:
[   77.603659]  kasan_set_track+0x4c/0x80
[   77.604198]  kasan_save_free_info+0x3c/0x60
[   77.604678]  ____kasan_slab_free+0xe8/0x140
[   77.605262]  __kasan_slab_free+0x18/0x28
[   77.605771]  __kmem_cache_free+0xdc/0x284
[   77.606250]  kfree_sensitive+0x88/0xa4
[   77.606697]  kmalloc_double_kzfree+0x90/0x144
[   77.607225]  kunit_try_run_case+0x80/0x184
[   77.607726]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.608294]  kthread+0x16c/0x21c
[   77.608826]  ret_from_fork+0x10/0x20
[   77.609272] 
[   77.609489] The buggy address belongs to the object at ffff0000c5ad0000
[   77.609489]  which belongs to the cache kmalloc-128 of size 128
[   77.610422] The buggy address is located 0 bytes inside of
[   77.610422]  128-byte region [ffff0000c5ad0000, ffff0000c5ad0080)
[   77.611346] 
[   77.611561] The buggy address belongs to the physical page:
[   77.612048] page:000000001efa35a5 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ad0
[   77.612923] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.613794] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.614500] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.615153] page dumped because: kasan: bad access detected
[   77.615633] 
[   77.615836] Memory state around the buggy address:
[   77.616314]  ffff0000c5acff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.617058]  ffff0000c5acff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   77.617719] >ffff0000c5ad0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.618361]                    ^
[   77.618726]  ffff0000c5ad0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.619367]  ffff0000c5ad0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.619969] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_generic
[   77.133585] ==================================================================
[   77.134168] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x1f0/0xb8c
[   77.134906] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.135524] 
[   77.135750] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.136545] Hardware name: linux,dummy-virt (DT)
[   77.137223] Call trace:
[   77.137495]  dump_backtrace+0xf8/0x118
[   77.138001]  show_stack+0x18/0x24
[   77.138493]  __dump_stack+0x28/0x38
[   77.138923]  dump_stack_lvl+0x54/0x6c
[   77.139375]  print_address_description+0x7c/0x1ec
[   77.139925]  print_report+0x50/0x68
[   77.140368]  kasan_report+0xac/0x100
[   77.140868]  kasan_check_range+0x260/0x2a0
[   77.141357]  __kasan_check_write+0x2c/0x3c
[   77.141807]  kasan_bitops_generic+0x1f0/0xb8c
[   77.142271]  kunit_try_run_case+0x80/0x184
[   77.142725]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.143458]  kthread+0x16c/0x21c
[   77.143876]  ret_from_fork+0x10/0x20
[   77.144331] 
[   77.144522] Allocated by task 165:
[   77.144913]  kasan_set_track+0x4c/0x80
[   77.145535]  kasan_save_alloc_info+0x28/0x34
[   77.146028]  __kasan_kmalloc+0x88/0xa0
[   77.146469]  kmalloc_trace+0x54/0x68
[   77.146933]  kasan_bitops_generic+0x4c/0xb8c
[   77.147394]  kunit_try_run_case+0x80/0x184
[   77.147873]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.148447]  kthread+0x16c/0x21c
[   77.149014]  ret_from_fork+0x10/0x20
[   77.149468] 
[   77.149659] The buggy address belongs to the object at ffff0000c5a87c00
[   77.149659]  which belongs to the cache kmalloc-128 of size 128
[   77.150611] The buggy address is located 8 bytes inside of
[   77.150611]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.151503] 
[   77.151724] The buggy address belongs to the physical page:
[   77.152187] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.153137] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.153844] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.154527] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.155155] page dumped because: kasan: bad access detected
[   77.155635] 
[   77.155851] Memory state around the buggy address:
[   77.156319]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.157615]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.158233] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.158846]                       ^
[   77.159199]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.159838]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.160431] ==================================================================
[   77.328315] ==================================================================
[   77.329131] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3a0/0xb8c
[   77.329836] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.330428] 
[   77.330674] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.331422] Hardware name: linux,dummy-virt (DT)
[   77.331877] Call trace:
[   77.332156]  dump_backtrace+0xf8/0x118
[   77.332629]  show_stack+0x18/0x24
[   77.333098]  __dump_stack+0x28/0x38
[   77.333531]  dump_stack_lvl+0x54/0x6c
[   77.333966]  print_address_description+0x7c/0x1ec
[   77.334506]  print_report+0x50/0x68
[   77.335149]  kasan_report+0xac/0x100
[   77.335606]  __asan_load8+0xa8/0xac
[   77.336017]  kasan_bitops_generic+0x3a0/0xb8c
[   77.336534]  kunit_try_run_case+0x80/0x184
[   77.337175]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.337747]  kthread+0x16c/0x21c
[   77.338175]  ret_from_fork+0x10/0x20
[   77.338628] 
[   77.338882] Allocated by task 165:
[   77.339236]  kasan_set_track+0x4c/0x80
[   77.339735]  kasan_save_alloc_info+0x28/0x34
[   77.340203]  __kasan_kmalloc+0x88/0xa0
[   77.340843]  kmalloc_trace+0x54/0x68
[   77.341267]  kasan_bitops_generic+0x4c/0xb8c
[   77.341733]  kunit_try_run_case+0x80/0x184
[   77.342195]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.342781]  kthread+0x16c/0x21c
[   77.343186]  ret_from_fork+0x10/0x20
[   77.343615] 
[   77.343828] The buggy address belongs to the object at ffff0000c5a87c00
[   77.343828]  which belongs to the cache kmalloc-128 of size 128
[   77.344732] The buggy address is located 8 bytes inside of
[   77.344732]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.345640] 
[   77.345866] The buggy address belongs to the physical page:
[   77.346321] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.347257] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.347963] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.349185] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.349810] page dumped because: kasan: bad access detected
[   77.350289] 
[   77.350481] Memory state around the buggy address:
[   77.350955]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.351567]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.352243] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.353030]                       ^
[   77.353406]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.354034]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.354634] ==================================================================
[   77.529113] ==================================================================
[   77.529847] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x59c/0xb8c
[   77.530531] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.531160] 
[   77.531378] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.532147] Hardware name: linux,dummy-virt (DT)
[   77.532561] Call trace:
[   77.532877]  dump_backtrace+0xf8/0x118
[   77.533357]  show_stack+0x18/0x24
[   77.533801]  __dump_stack+0x28/0x38
[   77.534213]  dump_stack_lvl+0x54/0x6c
[   77.534691]  print_address_description+0x7c/0x1ec
[   77.535247]  print_report+0x50/0x68
[   77.535705]  kasan_report+0xac/0x100
[   77.536159]  __asan_load8+0xa8/0xac
[   77.536558]  kasan_bitops_generic+0x59c/0xb8c
[   77.537065]  kunit_try_run_case+0x80/0x184
[   77.537536]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.538108]  kthread+0x16c/0x21c
[   77.538542]  ret_from_fork+0x10/0x20
[   77.538971] 
[   77.539166] Allocated by task 165:
[   77.539514]  kasan_set_track+0x4c/0x80
[   77.539987]  kasan_save_alloc_info+0x28/0x34
[   77.540450]  __kasan_kmalloc+0x88/0xa0
[   77.540931]  kmalloc_trace+0x54/0x68
[   77.541342]  kasan_bitops_generic+0x4c/0xb8c
[   77.541804]  kunit_try_run_case+0x80/0x184
[   77.542288]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.542861]  kthread+0x16c/0x21c
[   77.543273]  ret_from_fork+0x10/0x20
[   77.543713] 
[   77.543945] The buggy address belongs to the object at ffff0000c5a87c00
[   77.543945]  which belongs to the cache kmalloc-128 of size 128
[   77.544858] The buggy address is located 8 bytes inside of
[   77.544858]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.545802] 
[   77.546026] The buggy address belongs to the physical page:
[   77.546491] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.547281] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.547993] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.548683] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.549333] page dumped because: kasan: bad access detected
[   77.549814] 
[   77.550033] Memory state around the buggy address:
[   77.550475]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.551117]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.551749] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.552319]                       ^
[   77.552697]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.553324]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.553946] ==================================================================
[   77.355424] ==================================================================
[   77.355968] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3f4/0xb8c
[   77.356965] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.357607] 
[   77.357876] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.358631] Hardware name: linux,dummy-virt (DT)
[   77.359060] Call trace:
[   77.359355]  dump_backtrace+0xf8/0x118
[   77.359851]  show_stack+0x18/0x24
[   77.360276]  __dump_stack+0x28/0x38
[   77.360878]  dump_stack_lvl+0x54/0x6c
[   77.361331]  print_address_description+0x7c/0x1ec
[   77.361975]  print_report+0x50/0x68
[   77.362408]  kasan_report+0xac/0x100
[   77.362877]  kasan_check_range+0x260/0x2a0
[   77.363436]  __kasan_check_write+0x2c/0x3c
[   77.363929]  kasan_bitops_generic+0x3f4/0xb8c
[   77.364404]  kunit_try_run_case+0x80/0x184
[   77.364884]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.365531]  kthread+0x16c/0x21c
[   77.365959]  ret_from_fork+0x10/0x20
[   77.366405] 
[   77.366635] Allocated by task 165:
[   77.367228]  kasan_set_track+0x4c/0x80
[   77.367685]  kasan_save_alloc_info+0x28/0x34
[   77.368143]  __kasan_kmalloc+0x88/0xa0
[   77.368728]  kmalloc_trace+0x54/0x68
[   77.369155]  kasan_bitops_generic+0x4c/0xb8c
[   77.369706]  kunit_try_run_case+0x80/0x184
[   77.370220]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.371822]  kthread+0x16c/0x21c
[   77.372471]  ret_from_fork+0x10/0x20
[   77.372878] 
[   77.373061] The buggy address belongs to the object at ffff0000c5a87c00
[   77.373061]  which belongs to the cache kmalloc-128 of size 128
[   77.374474] The buggy address is located 8 bytes inside of
[   77.374474]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.376540] 
[   77.377274] The buggy address belongs to the physical page:
[   77.378459] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.379463] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.380389] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.381700] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.382342] page dumped because: kasan: bad access detected
[   77.382875] 
[   77.383076] Memory state around the buggy address:
[   77.383472]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.384115]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.384830] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.385385]                       ^
[   77.385725]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.386388]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.387009] ==================================================================
[   77.554786] ==================================================================
[   77.555326] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x5f4/0xb8c
[   77.556054] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.556734] 
[   77.556981] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.557727] Hardware name: linux,dummy-virt (DT)
[   77.558168] Call trace:
[   77.558473]  dump_backtrace+0xf8/0x118
[   77.558963]  show_stack+0x18/0x24
[   77.559432]  __dump_stack+0x28/0x38
[   77.559882]  dump_stack_lvl+0x54/0x6c
[   77.560315]  print_address_description+0x7c/0x1ec
[   77.560867]  print_report+0x50/0x68
[   77.561328]  kasan_report+0xac/0x100
[   77.561783]  kasan_check_range+0x260/0x2a0
[   77.562288]  __kasan_check_write+0x2c/0x3c
[   77.562730]  kasan_bitops_generic+0x5f4/0xb8c
[   77.563226]  kunit_try_run_case+0x80/0x184
[   77.563693]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.564303]  kthread+0x16c/0x21c
[   77.564713]  ret_from_fork+0x10/0x20
[   77.565166] 
[   77.565354] Allocated by task 165:
[   77.565701]  kasan_set_track+0x4c/0x80
[   77.566164]  kasan_save_alloc_info+0x28/0x34
[   77.566647]  __kasan_kmalloc+0x88/0xa0
[   77.567153]  kmalloc_trace+0x54/0x68
[   77.567578]  kasan_bitops_generic+0x4c/0xb8c
[   77.568060]  kunit_try_run_case+0x80/0x184
[   77.568568]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.569143]  kthread+0x16c/0x21c
[   77.569546]  ret_from_fork+0x10/0x20
[   77.569997] 
[   77.570190] The buggy address belongs to the object at ffff0000c5a87c00
[   77.570190]  which belongs to the cache kmalloc-128 of size 128
[   77.571146] The buggy address is located 8 bytes inside of
[   77.571146]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.572032] 
[   77.572265] The buggy address belongs to the physical page:
[   77.572727] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.573536] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.574229] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.574913] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.575543] page dumped because: kasan: bad access detected
[   77.576015] 
[   77.576229] Memory state around the buggy address:
[   77.576640]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.577297]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.577915] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.578522]                       ^
[   77.578899]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.579539]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.580091] ==================================================================
[   77.051122] ==================================================================
[   77.051648] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xf8/0xb8c
[   77.052343] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.053031] 
[   77.053273] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.054021] Hardware name: linux,dummy-virt (DT)
[   77.054472] Call trace:
[   77.054751]  dump_backtrace+0xf8/0x118
[   77.055713]  show_stack+0x18/0x24
[   77.056159]  __dump_stack+0x28/0x38
[   77.056743]  dump_stack_lvl+0x54/0x6c
[   77.057199]  print_address_description+0x7c/0x1ec
[   77.057791]  print_report+0x50/0x68
[   77.058261]  kasan_report+0xac/0x100
[   77.058705]  __asan_load8+0xa8/0xac
[   77.059144]  kasan_bitops_generic+0xf8/0xb8c
[   77.059609]  kunit_try_run_case+0x80/0x184
[   77.060089]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.060837]  kthread+0x16c/0x21c
[   77.061265]  ret_from_fork+0x10/0x20
[   77.061712] 
[   77.061911] Allocated by task 165:
[   77.062288]  kasan_set_track+0x4c/0x80
[   77.062754]  kasan_save_alloc_info+0x28/0x34
[   77.063257]  __kasan_kmalloc+0x88/0xa0
[   77.063787]  kmalloc_trace+0x54/0x68
[   77.064210]  kasan_bitops_generic+0x4c/0xb8c
[   77.064872]  kunit_try_run_case+0x80/0x184
[   77.065357]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.065949]  kthread+0x16c/0x21c
[   77.066363]  ret_from_fork+0x10/0x20
[   77.066804] 
[   77.067001] The buggy address belongs to the object at ffff0000c5a87c00
[   77.067001]  which belongs to the cache kmalloc-128 of size 128
[   77.067945] The buggy address is located 8 bytes inside of
[   77.067945]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.069039] 
[   77.069271] The buggy address belongs to the physical page:
[   77.069733] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.070524] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.071210] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.071910] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.072516] page dumped because: kasan: bad access detected
[   77.073000] 
[   77.073207] Memory state around the buggy address:
[   77.073655]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.074273]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.075401] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.076020]                       ^
[   77.076398]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.077160]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.077768] ==================================================================
[   77.299899] ==================================================================
[   77.300401] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x350/0xb8c
[   77.300999] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.301503] 
[   77.301697] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.303215] Hardware name: linux,dummy-virt (DT)
[   77.303622] Call trace:
[   77.303896]  dump_backtrace+0xf8/0x118
[   77.304374]  show_stack+0x18/0x24
[   77.304971]  __dump_stack+0x28/0x38
[   77.305397]  dump_stack_lvl+0x54/0x6c
[   77.305855]  print_address_description+0x7c/0x1ec
[   77.306376]  print_report+0x50/0x68
[   77.307140]  kasan_report+0xac/0x100
[   77.307636]  kasan_check_range+0x260/0x2a0
[   77.308126]  __kasan_check_write+0x2c/0x3c
[   77.308589]  kasan_bitops_generic+0x350/0xb8c
[   77.309249]  kunit_try_run_case+0x80/0x184
[   77.309767]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.310362]  kthread+0x16c/0x21c
[   77.310814]  ret_from_fork+0x10/0x20
[   77.311260] 
[   77.311447] Allocated by task 165:
[   77.311828]  kasan_set_track+0x4c/0x80
[   77.312294]  kasan_save_alloc_info+0x28/0x34
[   77.312980]  __kasan_kmalloc+0x88/0xa0
[   77.313493]  kmalloc_trace+0x54/0x68
[   77.313946]  kasan_bitops_generic+0x4c/0xb8c
[   77.314427]  kunit_try_run_case+0x80/0x184
[   77.314911]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.315496]  kthread+0x16c/0x21c
[   77.315936]  ret_from_fork+0x10/0x20
[   77.316378] 
[   77.316577] The buggy address belongs to the object at ffff0000c5a87c00
[   77.316577]  which belongs to the cache kmalloc-128 of size 128
[   77.317614] The buggy address is located 8 bytes inside of
[   77.317614]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.318537] 
[   77.318764] The buggy address belongs to the physical page:
[   77.319218] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.319993] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.321222] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.321892] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.322488] page dumped because: kasan: bad access detected
[   77.322973] 
[   77.323166] Memory state around the buggy address:
[   77.323586]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.324249]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.325061] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.325674]                       ^
[   77.326057]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.326690]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.327305] ==================================================================
[   77.447241] ==================================================================
[   77.447881] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4a8/0xb8c
[   77.448571] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.449317] 
[   77.449568] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.450305] Hardware name: linux,dummy-virt (DT)
[   77.450742] Call trace:
[   77.451315]  dump_backtrace+0xf8/0x118
[   77.451802]  show_stack+0x18/0x24
[   77.452230]  __dump_stack+0x28/0x38
[   77.452658]  dump_stack_lvl+0x54/0x6c
[   77.453131]  print_address_description+0x7c/0x1ec
[   77.453666]  print_report+0x50/0x68
[   77.454355]  kasan_report+0xac/0x100
[   77.454852]  __asan_load8+0xa8/0xac
[   77.455249]  kasan_bitops_generic+0x4a8/0xb8c
[   77.455741]  kunit_try_run_case+0x80/0x184
[   77.456259]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.456848]  kthread+0x16c/0x21c
[   77.457300]  ret_from_fork+0x10/0x20
[   77.457717] 
[   77.457921] Allocated by task 165:
[   77.458285]  kasan_set_track+0x4c/0x80
[   77.458767]  kasan_save_alloc_info+0x28/0x34
[   77.459226]  __kasan_kmalloc+0x88/0xa0
[   77.459734]  kmalloc_trace+0x54/0x68
[   77.460154]  kasan_bitops_generic+0x4c/0xb8c
[   77.460646]  kunit_try_run_case+0x80/0x184
[   77.461118]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.461710]  kthread+0x16c/0x21c
[   77.462133]  ret_from_fork+0x10/0x20
[   77.462585] 
[   77.462810] The buggy address belongs to the object at ffff0000c5a87c00
[   77.462810]  which belongs to the cache kmalloc-128 of size 128
[   77.463748] The buggy address is located 8 bytes inside of
[   77.463748]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.464643] 
[   77.464878] The buggy address belongs to the physical page:
[   77.465364] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.466188] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.466862] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.467518] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.468150] page dumped because: kasan: bad access detected
[   77.468666] 
[   77.468889] Memory state around the buggy address:
[   77.469337]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.469983]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.470632] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.471235]                       ^
[   77.471630]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.472284]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.472885] ==================================================================
[   77.502968] ==================================================================
[   77.503478] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x54c/0xb8c
[   77.504260] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.504870] 
[   77.505135] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.505896] Hardware name: linux,dummy-virt (DT)
[   77.506336] Call trace:
[   77.506608]  dump_backtrace+0xf8/0x118
[   77.507105]  show_stack+0x18/0x24
[   77.507533]  __dump_stack+0x28/0x38
[   77.507954]  dump_stack_lvl+0x54/0x6c
[   77.508416]  print_address_description+0x7c/0x1ec
[   77.508962]  print_report+0x50/0x68
[   77.509441]  kasan_report+0xac/0x100
[   77.509903]  __asan_load8+0xa8/0xac
[   77.510323]  kasan_bitops_generic+0x54c/0xb8c
[   77.510812]  kunit_try_run_case+0x80/0x184
[   77.511324]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.511901]  kthread+0x16c/0x21c
[   77.512321]  ret_from_fork+0x10/0x20
[   77.512785] 
[   77.512992] Allocated by task 165:
[   77.513336]  kasan_set_track+0x4c/0x80
[   77.513810]  kasan_save_alloc_info+0x28/0x34
[   77.514293]  __kasan_kmalloc+0x88/0xa0
[   77.514791]  kmalloc_trace+0x54/0x68
[   77.515239]  kasan_bitops_generic+0x4c/0xb8c
[   77.515706]  kunit_try_run_case+0x80/0x184
[   77.516190]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.516768]  kthread+0x16c/0x21c
[   77.517215]  ret_from_fork+0x10/0x20
[   77.517659] 
[   77.517877] The buggy address belongs to the object at ffff0000c5a87c00
[   77.517877]  which belongs to the cache kmalloc-128 of size 128
[   77.518811] The buggy address is located 8 bytes inside of
[   77.518811]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.519688] 
[   77.519923] The buggy address belongs to the physical page:
[   77.520390] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.521217] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.521896] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.522553] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.523147] page dumped because: kasan: bad access detected
[   77.523625] 
[   77.523857] Memory state around the buggy address:
[   77.524315]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.524942]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.525579] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.526178]                       ^
[   77.526554]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.527206]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.527818] ==================================================================
[   77.022844] ==================================================================
[   77.023726] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0xa8/0xb8c
[   77.024415] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.025160] 
[   77.025657] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.026431] Hardware name: linux,dummy-virt (DT)
[   77.026850] Call trace:
[   77.027114]  dump_backtrace+0xf8/0x118
[   77.027651]  show_stack+0x18/0x24
[   77.028125]  __dump_stack+0x28/0x38
[   77.028601]  dump_stack_lvl+0x54/0x6c
[   77.029074]  print_address_description+0x7c/0x1ec
[   77.029642]  print_report+0x50/0x68
[   77.030141]  kasan_report+0xac/0x100
[   77.030584]  kasan_check_range+0x260/0x2a0
[   77.031068]  __kasan_check_write+0x2c/0x3c
[   77.031542]  kasan_bitops_generic+0xa8/0xb8c
[   77.032025]  kunit_try_run_case+0x80/0x184
[   77.032497]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.033071]  kthread+0x16c/0x21c
[   77.033483]  ret_from_fork+0x10/0x20
[   77.033938] 
[   77.034121] Allocated by task 165:
[   77.034467]  kasan_set_track+0x4c/0x80
[   77.035154]  kasan_save_alloc_info+0x28/0x34
[   77.035629]  __kasan_kmalloc+0x88/0xa0
[   77.036096]  kmalloc_trace+0x54/0x68
[   77.036519]  kasan_bitops_generic+0x4c/0xb8c
[   77.037145]  kunit_try_run_case+0x80/0x184
[   77.037613]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.038193]  kthread+0x16c/0x21c
[   77.038599]  ret_from_fork+0x10/0x20
[   77.039051] 
[   77.039243] The buggy address belongs to the object at ffff0000c5a87c00
[   77.039243]  which belongs to the cache kmalloc-128 of size 128
[   77.040214] The buggy address is located 8 bytes inside of
[   77.040214]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.041690] 
[   77.041934] The buggy address belongs to the physical page:
[   77.042387] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.043173] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.043846] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.044508] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.045265] page dumped because: kasan: bad access detected
[   77.045738] 
[   77.045950] Memory state around the buggy address:
[   77.046420]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.047061]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.047682] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.048338]                       ^
[   77.048888]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.049497]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.050103] ==================================================================
[   77.078629] ==================================================================
[   77.079206] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x14c/0xb8c
[   77.079947] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.080559] 
[   77.081080] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.081812] Hardware name: linux,dummy-virt (DT)
[   77.082244] Call trace:
[   77.082515]  dump_backtrace+0xf8/0x118
[   77.082987]  show_stack+0x18/0x24
[   77.083408]  __dump_stack+0x28/0x38
[   77.083845]  dump_stack_lvl+0x54/0x6c
[   77.084272]  print_address_description+0x7c/0x1ec
[   77.084971]  print_report+0x50/0x68
[   77.085418]  kasan_report+0xac/0x100
[   77.085875]  kasan_check_range+0x260/0x2a0
[   77.086351]  __kasan_check_write+0x2c/0x3c
[   77.086807]  kasan_bitops_generic+0x14c/0xb8c
[   77.087278]  kunit_try_run_case+0x80/0x184
[   77.087729]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.088316]  kthread+0x16c/0x21c
[   77.088827]  ret_from_fork+0x10/0x20
[   77.089277] 
[   77.089472] Allocated by task 165:
[   77.089848]  kasan_set_track+0x4c/0x80
[   77.090335]  kasan_save_alloc_info+0x28/0x34
[   77.090944]  __kasan_kmalloc+0x88/0xa0
[   77.091411]  kmalloc_trace+0x54/0x68
[   77.091834]  kasan_bitops_generic+0x4c/0xb8c
[   77.092317]  kunit_try_run_case+0x80/0x184
[   77.092944]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.093518]  kthread+0x16c/0x21c
[   77.093941]  ret_from_fork+0x10/0x20
[   77.094384] 
[   77.094572] The buggy address belongs to the object at ffff0000c5a87c00
[   77.094572]  which belongs to the cache kmalloc-128 of size 128
[   77.095493] The buggy address is located 8 bytes inside of
[   77.095493]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.096403] 
[   77.096624] The buggy address belongs to the physical page:
[   77.097088] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.097867] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.098554] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.099425] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.100043] page dumped because: kasan: bad access detected
[   77.100529] 
[   77.101252] Memory state around the buggy address:
[   77.101695]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.102367]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.102987] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.103561]                       ^
[   77.103931]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.104563]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.105286] ==================================================================
[   77.473981] ==================================================================
[   77.474512] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x4fc/0xb8c
[   77.475252] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.475868] 
[   77.476100] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.476964] Hardware name: linux,dummy-virt (DT)
[   77.477410] Call trace:
[   77.477670]  dump_backtrace+0xf8/0x118
[   77.478134]  show_stack+0x18/0x24
[   77.478572]  __dump_stack+0x28/0x38
[   77.479038]  dump_stack_lvl+0x54/0x6c
[   77.479514]  print_address_description+0x7c/0x1ec
[   77.480065]  print_report+0x50/0x68
[   77.480522]  kasan_report+0xac/0x100
[   77.481018]  kasan_check_range+0x260/0x2a0
[   77.481495]  __kasan_check_write+0x2c/0x3c
[   77.481942]  kasan_bitops_generic+0x4fc/0xb8c
[   77.482448]  kunit_try_run_case+0x80/0x184
[   77.482947]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.483507]  kthread+0x16c/0x21c
[   77.483937]  ret_from_fork+0x10/0x20
[   77.484354] 
[   77.484554] Allocated by task 165:
[   77.484942]  kasan_set_track+0x4c/0x80
[   77.485432]  kasan_save_alloc_info+0x28/0x34
[   77.485902]  __kasan_kmalloc+0x88/0xa0
[   77.486356]  kmalloc_trace+0x54/0x68
[   77.486818]  kasan_bitops_generic+0x4c/0xb8c
[   77.487288]  kunit_try_run_case+0x80/0x184
[   77.487740]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.488321]  kthread+0x16c/0x21c
[   77.488737]  ret_from_fork+0x10/0x20
[   77.489173] 
[   77.489393] The buggy address belongs to the object at ffff0000c5a87c00
[   77.489393]  which belongs to the cache kmalloc-128 of size 128
[   77.490314] The buggy address is located 8 bytes inside of
[   77.490314]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.491219] 
[   77.491414] The buggy address belongs to the physical page:
[   77.491884] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.492659] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.493349] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.494006] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.494603] page dumped because: kasan: bad access detected
[   77.495084] 
[   77.495278] Memory state around the buggy address:
[   77.495699]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.496343]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.497030] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.497600]                       ^
[   77.497967]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.498587]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.499194] ==================================================================
[   77.216777] ==================================================================
[   77.217329] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x260/0xb8c
[   77.218332] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.218998] 
[   77.219243] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.219990] Hardware name: linux,dummy-virt (DT)
[   77.220431] Call trace:
[   77.220876]  dump_backtrace+0xf8/0x118
[   77.221344]  show_stack+0x18/0x24
[   77.221783]  __dump_stack+0x28/0x38
[   77.222203]  dump_stack_lvl+0x54/0x6c
[   77.222633]  print_address_description+0x7c/0x1ec
[   77.223173]  print_report+0x50/0x68
[   77.223609]  kasan_report+0xac/0x100
[   77.224070]  kasan_check_range+0x260/0x2a0
[   77.224603]  __kasan_check_write+0x2c/0x3c
[   77.225213]  kasan_bitops_generic+0x260/0xb8c
[   77.225726]  kunit_try_run_case+0x80/0x184
[   77.226195]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.226789]  kthread+0x16c/0x21c
[   77.227237]  ret_from_fork+0x10/0x20
[   77.227645] 
[   77.227848] Allocated by task 165:
[   77.228217]  kasan_set_track+0x4c/0x80
[   77.228906]  kasan_save_alloc_info+0x28/0x34
[   77.229366]  __kasan_kmalloc+0x88/0xa0
[   77.229886]  kmalloc_trace+0x54/0x68
[   77.230292]  kasan_bitops_generic+0x4c/0xb8c
[   77.230797]  kunit_try_run_case+0x80/0x184
[   77.231262]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.231874]  kthread+0x16c/0x21c
[   77.232289]  ret_from_fork+0x10/0x20
[   77.232860] 
[   77.233088] The buggy address belongs to the object at ffff0000c5a87c00
[   77.233088]  which belongs to the cache kmalloc-128 of size 128
[   77.234051] The buggy address is located 8 bytes inside of
[   77.234051]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.234975] 
[   77.235215] The buggy address belongs to the physical page:
[   77.235678] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.236451] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.237657] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.238324] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.238920] page dumped because: kasan: bad access detected
[   77.239396] 
[   77.239597] Memory state around the buggy address:
[   77.240022]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.240798]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.241397] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.241987]                       ^
[   77.242364]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.243008]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.243603] ==================================================================
[   77.244485] ==================================================================
[   77.245384] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2ac/0xb8c
[   77.246116] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.246743] 
[   77.246962] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.247724] Hardware name: linux,dummy-virt (DT)
[   77.248149] Call trace:
[   77.248428]  dump_backtrace+0xf8/0x118
[   77.249050]  show_stack+0x18/0x24
[   77.249502]  __dump_stack+0x28/0x38
[   77.249929]  dump_stack_lvl+0x54/0x6c
[   77.250389]  print_address_description+0x7c/0x1ec
[   77.250939]  print_report+0x50/0x68
[   77.251400]  kasan_report+0xac/0x100
[   77.251851]  kasan_check_range+0x260/0x2a0
[   77.252342]  __kasan_check_write+0x2c/0x3c
[   77.253039]  kasan_bitops_generic+0x2ac/0xb8c
[   77.253573]  kunit_try_run_case+0x80/0x184
[   77.254050]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.254638]  kthread+0x16c/0x21c
[   77.255052]  ret_from_fork+0x10/0x20
[   77.255490] 
[   77.255679] Allocated by task 165:
[   77.256052]  kasan_set_track+0x4c/0x80
[   77.256568]  kasan_save_alloc_info+0x28/0x34
[   77.257094]  __kasan_kmalloc+0x88/0xa0
[   77.257544]  kmalloc_trace+0x54/0x68
[   77.258006]  kasan_bitops_generic+0x4c/0xb8c
[   77.258466]  kunit_try_run_case+0x80/0x184
[   77.258940]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.259501]  kthread+0x16c/0x21c
[   77.259949]  ret_from_fork+0x10/0x20
[   77.260358] 
[   77.260575] The buggy address belongs to the object at ffff0000c5a87c00
[   77.260575]  which belongs to the cache kmalloc-128 of size 128
[   77.261665] The buggy address is located 8 bytes inside of
[   77.261665]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.262542] 
[   77.262765] The buggy address belongs to the physical page:
[   77.263196] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.264044] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.264882] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.265557] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.266200] page dumped because: kasan: bad access detected
[   77.266678] 
[   77.266874] Memory state around the buggy address:
[   77.267340]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.267988]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.268630] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.269239]                       ^
[   77.269605]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.270227]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.271352] ==================================================================
[   77.387870] ==================================================================
[   77.388406] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x3fc/0xb8c
[   77.389226] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.389839] 
[   77.390078] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.390951] Hardware name: linux,dummy-virt (DT)
[   77.391365] Call trace:
[   77.391649]  dump_backtrace+0xf8/0x118
[   77.392141]  show_stack+0x18/0x24
[   77.392567]  __dump_stack+0x28/0x38
[   77.393131]  dump_stack_lvl+0x54/0x6c
[   77.393542]  print_address_description+0x7c/0x1ec
[   77.394091]  print_report+0x50/0x68
[   77.394568]  kasan_report+0xac/0x100
[   77.395010]  __asan_load8+0xa8/0xac
[   77.395431]  kasan_bitops_generic+0x3fc/0xb8c
[   77.395928]  kunit_try_run_case+0x80/0x184
[   77.396388]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.397107]  kthread+0x16c/0x21c
[   77.397549]  ret_from_fork+0x10/0x20
[   77.397978] 
[   77.398184] Allocated by task 165:
[   77.398521]  kasan_set_track+0x4c/0x80
[   77.398969]  kasan_save_alloc_info+0x28/0x34
[   77.399426]  __kasan_kmalloc+0x88/0xa0
[   77.399894]  kmalloc_trace+0x54/0x68
[   77.400338]  kasan_bitops_generic+0x4c/0xb8c
[   77.401035]  kunit_try_run_case+0x80/0x184
[   77.401501]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.402089]  kthread+0x16c/0x21c
[   77.402557]  ret_from_fork+0x10/0x20
[   77.403135] 
[   77.403411] The buggy address belongs to the object at ffff0000c5a87c00
[   77.403411]  which belongs to the cache kmalloc-128 of size 128
[   77.404261] The buggy address is located 8 bytes inside of
[   77.404261]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.405617] 
[   77.405910] The buggy address belongs to the physical page:
[   77.406577] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.407694] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.408634] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.410022] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.410813] page dumped because: kasan: bad access detected
[   77.411183] 
[   77.411366] Memory state around the buggy address:
[   77.411715]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.412321]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.413160] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.413921]                       ^
[   77.414279]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.414924]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.415507] ==================================================================
[   77.189507] ==================================================================
[   77.190106] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x24c/0xb8c
[   77.190879] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.191499] 
[   77.191720] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.192460] Hardware name: linux,dummy-virt (DT)
[   77.193197] Call trace:
[   77.193474]  dump_backtrace+0xf8/0x118
[   77.193962]  show_stack+0x18/0x24
[   77.194392]  __dump_stack+0x28/0x38
[   77.194812]  dump_stack_lvl+0x54/0x6c
[   77.195231]  print_address_description+0x7c/0x1ec
[   77.195772]  print_report+0x50/0x68
[   77.196216]  kasan_report+0xac/0x100
[   77.196832]  __asan_load8+0xa8/0xac
[   77.197237]  kasan_bitops_generic+0x24c/0xb8c
[   77.197707]  kunit_try_run_case+0x80/0x184
[   77.198176]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.198742]  kthread+0x16c/0x21c
[   77.199229]  ret_from_fork+0x10/0x20
[   77.199673] 
[   77.199897] Allocated by task 165:
[   77.200246]  kasan_set_track+0x4c/0x80
[   77.200949]  kasan_save_alloc_info+0x28/0x34
[   77.201451]  __kasan_kmalloc+0x88/0xa0
[   77.201908]  kmalloc_trace+0x54/0x68
[   77.202321]  kasan_bitops_generic+0x4c/0xb8c
[   77.202813]  kunit_try_run_case+0x80/0x184
[   77.203290]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.203884]  kthread+0x16c/0x21c
[   77.204294]  ret_from_fork+0x10/0x20
[   77.204875] 
[   77.205073] The buggy address belongs to the object at ffff0000c5a87c00
[   77.205073]  which belongs to the cache kmalloc-128 of size 128
[   77.206023] The buggy address is located 8 bytes inside of
[   77.206023]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.206922] 
[   77.207154] The buggy address belongs to the physical page:
[   77.207614] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.208414] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.209376] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.210063] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.210686] page dumped because: kasan: bad access detected
[   77.211163] 
[   77.211358] Memory state around the buggy address:
[   77.211828]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.212477]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.213774] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.214352]                       ^
[   77.214728]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.215376]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.216007] ==================================================================
[   77.416309] ==================================================================
[   77.417005] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x458/0xb8c
[   77.417713] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.418321] 
[   77.418558] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.419467] Hardware name: linux,dummy-virt (DT)
[   77.419895] Call trace:
[   77.420159]  dump_backtrace+0xf8/0x118
[   77.420831]  show_stack+0x18/0x24
[   77.421302]  __dump_stack+0x28/0x38
[   77.421739]  dump_stack_lvl+0x54/0x6c
[   77.422180]  print_address_description+0x7c/0x1ec
[   77.422714]  print_report+0x50/0x68
[   77.423156]  kasan_report+0xac/0x100
[   77.423627]  kasan_check_range+0x260/0x2a0
[   77.424107]  __kasan_check_write+0x2c/0x3c
[   77.424554]  kasan_bitops_generic+0x458/0xb8c
[   77.425074]  kunit_try_run_case+0x80/0x184
[   77.425527]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.426150]  kthread+0x16c/0x21c
[   77.426565]  ret_from_fork+0x10/0x20
[   77.427022] 
[   77.427215] Allocated by task 165:
[   77.427549]  kasan_set_track+0x4c/0x80
[   77.428152]  kasan_save_alloc_info+0x28/0x34
[   77.428645]  __kasan_kmalloc+0x88/0xa0
[   77.429290]  kmalloc_trace+0x54/0x68
[   77.429726]  kasan_bitops_generic+0x4c/0xb8c
[   77.430220]  kunit_try_run_case+0x80/0x184
[   77.430671]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.431258]  kthread+0x16c/0x21c
[   77.431664]  ret_from_fork+0x10/0x20
[   77.432108] 
[   77.432316] The buggy address belongs to the object at ffff0000c5a87c00
[   77.432316]  which belongs to the cache kmalloc-128 of size 128
[   77.433413] The buggy address is located 8 bytes inside of
[   77.433413]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.434335] 
[   77.434560] The buggy address belongs to the physical page:
[   77.435042] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.435804] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.436481] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.437196] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.437822] page dumped because: kasan: bad access detected
[   77.438291] 
[   77.438486] Memory state around the buggy address:
[   77.439445]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.440092]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.440775] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.441479]                       ^
[   77.441868]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.442494]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.443136] ==================================================================
[   77.161489] ==================================================================
[   77.162034] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x244/0xb8c
[   77.163119] Write of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.163784] 
[   77.163999] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.165137] Hardware name: linux,dummy-virt (DT)
[   77.165544] Call trace:
[   77.165812]  dump_backtrace+0xf8/0x118
[   77.166346]  show_stack+0x18/0x24
[   77.166791]  __dump_stack+0x28/0x38
[   77.167202]  dump_stack_lvl+0x54/0x6c
[   77.167622]  print_address_description+0x7c/0x1ec
[   77.168166]  print_report+0x50/0x68
[   77.168781]  kasan_report+0xac/0x100
[   77.169239]  kasan_check_range+0x260/0x2a0
[   77.169739]  __kasan_check_write+0x2c/0x3c
[   77.170185]  kasan_bitops_generic+0x244/0xb8c
[   77.170666]  kunit_try_run_case+0x80/0x184
[   77.171149]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.171718]  kthread+0x16c/0x21c
[   77.172132]  ret_from_fork+0x10/0x20
[   77.172566] 
[   77.172792] Allocated by task 165:
[   77.173140]  kasan_set_track+0x4c/0x80
[   77.173629]  kasan_save_alloc_info+0x28/0x34
[   77.174168]  __kasan_kmalloc+0x88/0xa0
[   77.174610]  kmalloc_trace+0x54/0x68
[   77.175225]  kasan_bitops_generic+0x4c/0xb8c
[   77.175691]  kunit_try_run_case+0x80/0x184
[   77.176170]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.176934]  kthread+0x16c/0x21c
[   77.177354]  ret_from_fork+0x10/0x20
[   77.177809] 
[   77.178034] The buggy address belongs to the object at ffff0000c5a87c00
[   77.178034]  which belongs to the cache kmalloc-128 of size 128
[   77.179004] The buggy address is located 8 bytes inside of
[   77.179004]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.179877] 
[   77.180111] The buggy address belongs to the physical page:
[   77.180569] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.181367] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.182062] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.182738] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.183497] page dumped because: kasan: bad access detected
[   77.183989] 
[   77.184180] Memory state around the buggy address:
[   77.184615]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.185737]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.186377] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.186980]                       ^
[   77.187353]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.187980]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.188691] ==================================================================
[   77.106406] ==================================================================
[   77.107224] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x19c/0xb8c
[   77.107916] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.108499] 
[   77.108959] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.109741] Hardware name: linux,dummy-virt (DT)
[   77.110166] Call trace:
[   77.110438]  dump_backtrace+0xf8/0x118
[   77.110917]  show_stack+0x18/0x24
[   77.111342]  __dump_stack+0x28/0x38
[   77.111801]  dump_stack_lvl+0x54/0x6c
[   77.112220]  print_address_description+0x7c/0x1ec
[   77.112942]  print_report+0x50/0x68
[   77.113437]  kasan_report+0xac/0x100
[   77.113933]  __asan_load8+0xa8/0xac
[   77.114358]  kasan_bitops_generic+0x19c/0xb8c
[   77.114836]  kunit_try_run_case+0x80/0x184
[   77.115306]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.115881]  kthread+0x16c/0x21c
[   77.116307]  ret_from_fork+0x10/0x20
[   77.116931] 
[   77.117138] Allocated by task 165:
[   77.117463]  kasan_set_track+0x4c/0x80
[   77.117930]  kasan_save_alloc_info+0x28/0x34
[   77.118374]  __kasan_kmalloc+0x88/0xa0
[   77.118887]  kmalloc_trace+0x54/0x68
[   77.119304]  kasan_bitops_generic+0x4c/0xb8c
[   77.119767]  kunit_try_run_case+0x80/0x184
[   77.120238]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.120952]  kthread+0x16c/0x21c
[   77.121374]  ret_from_fork+0x10/0x20
[   77.121824] 
[   77.122060] The buggy address belongs to the object at ffff0000c5a87c00
[   77.122060]  which belongs to the cache kmalloc-128 of size 128
[   77.122988] The buggy address is located 8 bytes inside of
[   77.122988]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.123915] 
[   77.124135] The buggy address belongs to the physical page:
[   77.124597] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.125376] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.126054] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.126725] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.127494] page dumped because: kasan: bad access detected
[   77.127989] 
[   77.128203] Memory state around the buggy address:
[   77.128638]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.129785]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.130419] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.131034]                       ^
[   77.131409]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.132034]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.132802] ==================================================================
[   77.272130] ==================================================================
[   77.272675] BUG: KASAN: slab-out-of-bounds in kasan_bitops_generic+0x2fc/0xb8c
[   77.273589] Read of size 8 at addr ffff0000c5a87c08 by task kunit_try_catch/165
[   77.274213] 
[   77.274438] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   77.275174] Hardware name: linux,dummy-virt (DT)
[   77.275608] Call trace:
[   77.275898]  dump_backtrace+0xf8/0x118
[   77.276394]  show_stack+0x18/0x24
[   77.276980]  __dump_stack+0x28/0x38
[   77.277407]  dump_stack_lvl+0x54/0x6c
[   77.277841]  print_address_description+0x7c/0x1ec
[   77.278375]  print_report+0x50/0x68
[   77.278818]  kasan_report+0xac/0x100
[   77.279256]  __asan_load8+0xa8/0xac
[   77.279676]  kasan_bitops_generic+0x2fc/0xb8c
[   77.280159]  kunit_try_run_case+0x80/0x184
[   77.280779]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.281381]  kthread+0x16c/0x21c
[   77.281795]  ret_from_fork+0x10/0x20
[   77.282234] 
[   77.282430] Allocated by task 165:
[   77.282796]  kasan_set_track+0x4c/0x80
[   77.283286]  kasan_save_alloc_info+0x28/0x34
[   77.283731]  __kasan_kmalloc+0x88/0xa0
[   77.284229]  kmalloc_trace+0x54/0x68
[   77.284825]  kasan_bitops_generic+0x4c/0xb8c
[   77.285302]  kunit_try_run_case+0x80/0x184
[   77.285773]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.286343]  kthread+0x16c/0x21c
[   77.286753]  ret_from_fork+0x10/0x20
[   77.287203] 
[   77.287407] The buggy address belongs to the object at ffff0000c5a87c00
[   77.287407]  which belongs to the cache kmalloc-128 of size 128
[   77.288379] The buggy address is located 8 bytes inside of
[   77.288379]  128-byte region [ffff0000c5a87c00, ffff0000c5a87c80)
[   77.289952] 
[   77.290191] The buggy address belongs to the physical page:
[   77.290630] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   77.291460] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.292127] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.293050] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.293644] page dumped because: kasan: bad access detected
[   77.294097] 
[   77.294291] Memory state around the buggy address:
[   77.294717]  ffff0000c5a87b00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.295368]  ffff0000c5a87b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.296003] >ffff0000c5a87c00: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.296601]                       ^
[   77.296955]  ffff0000c5a87c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.297588]  ffff0000c5a87d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.298203] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strnlen
[   76.985504] ==================================================================
[   76.986007] BUG: KASAN: use-after-free in strnlen+0x3c/0x74
[   76.986632] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.987233] 
[   76.987475] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.988262] Hardware name: linux,dummy-virt (DT)
[   76.988674] Call trace:
[   76.989439]  dump_backtrace+0xf8/0x118
[   76.989922]  show_stack+0x18/0x24
[   76.990369]  __dump_stack+0x28/0x38
[   76.990819]  dump_stack_lvl+0x54/0x6c
[   76.991268]  print_address_description+0x7c/0x1ec
[   76.991802]  print_report+0x50/0x68
[   76.992244]  kasan_report+0xac/0x100
[   76.992979]  __asan_load1+0x6c/0x70
[   76.993443]  strnlen+0x3c/0x74
[   76.993869]  kasan_strings+0x234/0x404
[   76.994306]  kunit_try_run_case+0x80/0x184
[   76.994818]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.995402]  kthread+0x16c/0x21c
[   76.995856]  ret_from_fork+0x10/0x20
[   76.996274] 
[   76.996480] Allocated by task 164:
[   76.997354]  kasan_set_track+0x4c/0x80
[   76.997840]  kasan_save_alloc_info+0x28/0x34
[   76.998335]  __kasan_kmalloc+0x88/0xa0
[   76.998831]  kmalloc_trace+0x54/0x68
[   76.999287]  kasan_strings+0x48/0x404
[   76.999716]  kunit_try_run_case+0x80/0x184
[   77.000180]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.000959]  kthread+0x16c/0x21c
[   77.001380]  ret_from_fork+0x10/0x20
[   77.001833] 
[   77.002015] Freed by task 164:
[   77.002366]  kasan_set_track+0x4c/0x80
[   77.002978]  kasan_save_free_info+0x3c/0x60
[   77.003433]  ____kasan_slab_free+0xe8/0x140
[   77.003919]  __kasan_slab_free+0x18/0x28
[   77.004391]  __kmem_cache_free+0xdc/0x284
[   77.005281]  kfree+0x60/0x74
[   77.005679]  kasan_strings+0x90/0x404
[   77.006113]  kunit_try_run_case+0x80/0x184
[   77.006561]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   77.007128]  kthread+0x16c/0x21c
[   77.007527]  ret_from_fork+0x10/0x20
[   77.007992] 
[   77.008176] The buggy address belongs to the object at ffff0000c5abca00
[   77.008176]  which belongs to the cache kmalloc-128 of size 128
[   77.009355] The buggy address is located 16 bytes inside of
[   77.009355]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   77.010237] 
[   77.010461] The buggy address belongs to the physical page:
[   77.010918] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   77.011702] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   77.012524] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   77.013654] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   77.014305] page dumped because: kasan: bad access detected
[   77.014785] 
[   77.014970] Memory state around the buggy address:
[   77.015424]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.016066]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.016984] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   77.017552]                          ^
[   77.017952]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.018585]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.019181] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strlen
[   76.947148] ==================================================================
[   76.947685] BUG: KASAN: use-after-free in strlen+0x28/0x50
[   76.948285] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.949009] 
[   76.949210] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.950482] Hardware name: linux,dummy-virt (DT)
[   76.950935] Call trace:
[   76.951200]  dump_backtrace+0xf8/0x118
[   76.951695]  show_stack+0x18/0x24
[   76.952133]  __dump_stack+0x28/0x38
[   76.952567]  dump_stack_lvl+0x54/0x6c
[   76.953043]  print_address_description+0x7c/0x1ec
[   76.953564]  print_report+0x50/0x68
[   76.954004]  kasan_report+0xac/0x100
[   76.954441]  __asan_load1+0x6c/0x70
[   76.955909]  strlen+0x28/0x50
[   76.956270]  kasan_strings+0x1e8/0x404
[   76.956677]  kunit_try_run_case+0x80/0x184
[   76.957153]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.958319]  kthread+0x16c/0x21c
[   76.958715]  ret_from_fork+0x10/0x20
[   76.959491] 
[   76.959895] Allocated by task 164:
[   76.960190]  kasan_set_track+0x4c/0x80
[   76.960632]  kasan_save_alloc_info+0x28/0x34
[   76.961670]  __kasan_kmalloc+0x88/0xa0
[   76.962382]  kmalloc_trace+0x54/0x68
[   76.963010]  kasan_strings+0x48/0x404
[   76.963642]  kunit_try_run_case+0x80/0x184
[   76.964335]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.965954]  kthread+0x16c/0x21c
[   76.966563]  ret_from_fork+0x10/0x20
[   76.967178] 
[   76.967482] Freed by task 164:
[   76.967909]  kasan_set_track+0x4c/0x80
[   76.968341]  kasan_save_free_info+0x3c/0x60
[   76.968784]  ____kasan_slab_free+0xe8/0x140
[   76.969345]  __kasan_slab_free+0x18/0x28
[   76.969863]  __kmem_cache_free+0xdc/0x284
[   76.970333]  kfree+0x60/0x74
[   76.970744]  kasan_strings+0x90/0x404
[   76.971201]  kunit_try_run_case+0x80/0x184
[   76.971746]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.972369]  kthread+0x16c/0x21c
[   76.972785]  ret_from_fork+0x10/0x20
[   76.973267] 
[   76.973475] The buggy address belongs to the object at ffff0000c5abca00
[   76.973475]  which belongs to the cache kmalloc-128 of size 128
[   76.974848] The buggy address is located 16 bytes inside of
[   76.974848]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   76.975738] 
[   76.975972] The buggy address belongs to the physical page:
[   76.976447] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   76.977439] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.978166] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.978824] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.979431] page dumped because: kasan: bad access detected
[   76.979888] 
[   76.980095] Memory state around the buggy address:
[   76.980510]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.981305]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.982274] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.982890]                          ^
[   76.983271]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.983872]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.984494] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strncmp
[   76.912309] ==================================================================
[   76.913153] BUG: KASAN: use-after-free in strncmp+0x3c/0xa0
[   76.913747] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.914334] 
[   76.914567] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.915298] Hardware name: linux,dummy-virt (DT)
[   76.915698] Call trace:
[   76.916001]  dump_backtrace+0xf8/0x118
[   76.916462]  show_stack+0x18/0x24
[   76.916908]  __dump_stack+0x28/0x38
[   76.917324]  dump_stack_lvl+0x54/0x6c
[   76.917744]  print_address_description+0x7c/0x1ec
[   76.918286]  print_report+0x50/0x68
[   76.918724]  kasan_report+0xac/0x100
[   76.919680]  __asan_load1+0x6c/0x70
[   76.920137]  strncmp+0x3c/0xa0
[   76.920535]  kasan_strings+0x1a0/0x404
[   76.921218]  kunit_try_run_case+0x80/0x184
[   76.921720]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.922317]  kthread+0x16c/0x21c
[   76.922749]  ret_from_fork+0x10/0x20
[   76.923167] 
[   76.923372] Allocated by task 164:
[   76.923693]  kasan_set_track+0x4c/0x80
[   76.924144]  kasan_save_alloc_info+0x28/0x34
[   76.925091]  __kasan_kmalloc+0x88/0xa0
[   76.925561]  kmalloc_trace+0x54/0x68
[   76.926018]  kasan_strings+0x48/0x404
[   76.926447]  kunit_try_run_case+0x80/0x184
[   76.926947]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.927510]  kthread+0x16c/0x21c
[   76.927924]  ret_from_fork+0x10/0x20
[   76.928368] 
[   76.928551] Freed by task 164:
[   76.928926]  kasan_set_track+0x4c/0x80
[   76.929416]  kasan_save_free_info+0x3c/0x60
[   76.929860]  ____kasan_slab_free+0xe8/0x140
[   76.930329]  __kasan_slab_free+0x18/0x28
[   76.931052]  __kmem_cache_free+0xdc/0x284
[   76.931515]  kfree+0x60/0x74
[   76.931894]  kasan_strings+0x90/0x404
[   76.932364]  kunit_try_run_case+0x80/0x184
[   76.933293]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.933941]  kthread+0x16c/0x21c
[   76.934388]  ret_from_fork+0x10/0x20
[   76.934840] 
[   76.935058] The buggy address belongs to the object at ffff0000c5abca00
[   76.935058]  which belongs to the cache kmalloc-128 of size 128
[   76.936045] The buggy address is located 16 bytes inside of
[   76.936045]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   76.937262] 
[   76.937483] The buggy address belongs to the physical page:
[   76.937946] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   76.938720] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.939421] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.940109] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.941278] page dumped because: kasan: bad access detected
[   76.941720] 
[   76.941952] Memory state around the buggy address:
[   76.942360]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.943025]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.943645] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.944259]                          ^
[   76.944876]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.945492]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.946128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strcmp
[   76.877662] ==================================================================
[   76.878250] BUG: KASAN: use-after-free in strcmp+0x30/0x84
[   76.878793] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.879388] 
[   76.879614] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.880360] Hardware name: linux,dummy-virt (DT)
[   76.881042] Call trace:
[   76.881320]  dump_backtrace+0xf8/0x118
[   76.881790]  show_stack+0x18/0x24
[   76.882248]  __dump_stack+0x28/0x38
[   76.882657]  dump_stack_lvl+0x54/0x6c
[   76.883129]  print_address_description+0x7c/0x1ec
[   76.883697]  print_report+0x50/0x68
[   76.884178]  kasan_report+0xac/0x100
[   76.884634]  __asan_load1+0x6c/0x70
[   76.885161]  strcmp+0x30/0x84
[   76.885551]  kasan_strings+0x148/0x404
[   76.885992]  kunit_try_run_case+0x80/0x184
[   76.886460]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.887537]  kthread+0x16c/0x21c
[   76.887982]  ret_from_fork+0x10/0x20
[   76.888446] 
[   76.888636] Allocated by task 164:
[   76.889221]  kasan_set_track+0x4c/0x80
[   76.889718]  kasan_save_alloc_info+0x28/0x34
[   76.890181]  __kasan_kmalloc+0x88/0xa0
[   76.890683]  kmalloc_trace+0x54/0x68
[   76.891110]  kasan_strings+0x48/0x404
[   76.891571]  kunit_try_run_case+0x80/0x184
[   76.892047]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.893088]  kthread+0x16c/0x21c
[   76.893522]  ret_from_fork+0x10/0x20
[   76.893995] 
[   76.894181] Freed by task 164:
[   76.894516]  kasan_set_track+0x4c/0x80
[   76.895013]  kasan_save_free_info+0x3c/0x60
[   76.895457]  ____kasan_slab_free+0xe8/0x140
[   76.895983]  __kasan_slab_free+0x18/0x28
[   76.896455]  __kmem_cache_free+0xdc/0x284
[   76.897077]  kfree+0x60/0x74
[   76.897496]  kasan_strings+0x90/0x404
[   76.897974]  kunit_try_run_case+0x80/0x184
[   76.898453]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.899187]  kthread+0x16c/0x21c
[   76.899603]  ret_from_fork+0x10/0x20
[   76.900057] 
[   76.900248] The buggy address belongs to the object at ffff0000c5abca00
[   76.900248]  which belongs to the cache kmalloc-128 of size 128
[   76.901686] The buggy address is located 16 bytes inside of
[   76.901686]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   76.902588] 
[   76.902819] The buggy address belongs to the physical page:
[   76.903270] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   76.904055] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.905013] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.905705] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.906362] page dumped because: kasan: bad access detected
[   76.906846] 
[   76.907043] Memory state around the buggy address:
[   76.907475]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.908123]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.909241] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.909825]                          ^
[   76.910230]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.910890]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.911512] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strrchr
[   76.842082] ==================================================================
[   76.842651] BUG: KASAN: use-after-free in strrchr+0x34/0x68
[   76.843365] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.843990] 
[   76.844232] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.845009] Hardware name: linux,dummy-virt (DT)
[   76.845601] Call trace:
[   76.845888]  dump_backtrace+0xf8/0x118
[   76.846381]  show_stack+0x18/0x24
[   76.847208]  __dump_stack+0x28/0x38
[   76.847660]  dump_stack_lvl+0x54/0x6c
[   76.848145]  print_address_description+0x7c/0x1ec
[   76.848974]  print_report+0x50/0x68
[   76.849426]  kasan_report+0xac/0x100
[   76.849886]  __asan_load1+0x6c/0x70
[   76.850363]  strrchr+0x34/0x68
[   76.850721]  kasan_strings+0xf8/0x404
[   76.851156]  kunit_try_run_case+0x80/0x184
[   76.851608]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.852193]  kthread+0x16c/0x21c
[   76.853052]  ret_from_fork+0x10/0x20
[   76.853490] 
[   76.853678] Allocated by task 164:
[   76.854061]  kasan_set_track+0x4c/0x80
[   76.854511]  kasan_save_alloc_info+0x28/0x34
[   76.854994]  __kasan_kmalloc+0x88/0xa0
[   76.855441]  kmalloc_trace+0x54/0x68
[   76.855901]  kasan_strings+0x48/0x404
[   76.856368]  kunit_try_run_case+0x80/0x184
[   76.857119]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.857705]  kthread+0x16c/0x21c
[   76.858159]  ret_from_fork+0x10/0x20
[   76.858630] 
[   76.858858] Freed by task 164:
[   76.859201]  kasan_set_track+0x4c/0x80
[   76.859689]  kasan_save_free_info+0x3c/0x60
[   76.860146]  ____kasan_slab_free+0xe8/0x140
[   76.860686]  __kasan_slab_free+0x18/0x28
[   76.861163]  __kmem_cache_free+0xdc/0x284
[   76.861625]  kfree+0x60/0x74
[   76.862000]  kasan_strings+0x90/0x404
[   76.862463]  kunit_try_run_case+0x80/0x184
[   76.863420]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.864060]  kthread+0x16c/0x21c
[   76.864472]  ret_from_fork+0x10/0x20
[   76.865158] 
[   76.865357] The buggy address belongs to the object at ffff0000c5abca00
[   76.865357]  which belongs to the cache kmalloc-128 of size 128
[   76.866348] The buggy address is located 16 bytes inside of
[   76.866348]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   76.867276] 
[   76.867517] The buggy address belongs to the physical page:
[   76.867988] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   76.869332] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.870010] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.870701] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.871346] page dumped because: kasan: bad access detected
[   76.871826] 
[   76.872025] Memory state around the buggy address:
[   76.872471]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.873118]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.873751] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.874590]                          ^
[   76.874967]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.875609]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.876242] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-strchr
[   76.803113] ==================================================================
[   76.803852] BUG: KASAN: use-after-free in strchr+0x20/0x6c
[   76.804333] Read of size 1 at addr ffff0000c5abca10 by task kunit_try_catch/164
[   76.805669] 
[   76.805998] CPU: 0 PID: 164 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.807301] Hardware name: linux,dummy-virt (DT)
[   76.808117] Call trace:
[   76.808561]  dump_backtrace+0xf8/0x118
[   76.809335]  show_stack+0x18/0x24
[   76.809984]  __dump_stack+0x28/0x38
[   76.810609]  dump_stack_lvl+0x54/0x6c
[   76.811256]  print_address_description+0x7c/0x1ec
[   76.812046]  print_report+0x50/0x68
[   76.812753]  kasan_report+0xac/0x100
[   76.813691]  __asan_load1+0x6c/0x70
[   76.814381]  strchr+0x20/0x6c
[   76.814942]  kasan_strings+0xa8/0x404
[   76.815589]  kunit_try_run_case+0x80/0x184
[   76.816308]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.817309]  kthread+0x16c/0x21c
[   76.818101]  ret_from_fork+0x10/0x20
[   76.818501] 
[   76.818688] Allocated by task 164:
[   76.818990]  kasan_set_track+0x4c/0x80
[   76.819408]  kasan_save_alloc_info+0x28/0x34
[   76.819831]  __kasan_kmalloc+0x88/0xa0
[   76.820339]  kmalloc_trace+0x54/0x68
[   76.820880]  kasan_strings+0x48/0x404
[   76.821329]  kunit_try_run_case+0x80/0x184
[   76.822047]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.822643]  kthread+0x16c/0x21c
[   76.823113]  ret_from_fork+0x10/0x20
[   76.823488] 
[   76.823667] Freed by task 164:
[   76.824125]  kasan_set_track+0x4c/0x80
[   76.824629]  kasan_save_free_info+0x3c/0x60
[   76.825129]  ____kasan_slab_free+0xe8/0x140
[   76.825686]  __kasan_slab_free+0x18/0x28
[   76.826203]  __kmem_cache_free+0xdc/0x284
[   76.826682]  kfree+0x60/0x74
[   76.827106]  kasan_strings+0x90/0x404
[   76.827580]  kunit_try_run_case+0x80/0x184
[   76.828041]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.828619]  kthread+0x16c/0x21c
[   76.829066]  ret_from_fork+0x10/0x20
[   76.829500] 
[   76.829698] The buggy address belongs to the object at ffff0000c5abca00
[   76.829698]  which belongs to the cache kmalloc-128 of size 128
[   76.830656] The buggy address is located 16 bytes inside of
[   76.830656]  128-byte region [ffff0000c5abca00, ffff0000c5abca80)
[   76.832021] 
[   76.832232] The buggy address belongs to the physical page:
[   76.832890] page:00000000b0163b2b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105abc
[   76.833649] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.834325] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.835171] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.835818] page dumped because: kasan: bad access detected
[   76.836293] 
[   76.836483] Memory state around the buggy address:
[   76.837456]  ffff0000c5abc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.838118]  ffff0000c5abc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.838778] >ffff0000c5abca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.839411]                          ^
[   76.839812]  ffff0000c5abca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.840442]  ffff0000c5abcb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.841202] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[   76.766266] ==================================================================
[   76.766988] BUG: KASAN: slab-out-of-bounds in memcmp+0x8c/0xd8
[   76.768004] Read of size 1 at addr ffff0000c5a87618 by task kunit_try_catch/163
[   76.768806] 
[   76.769166] CPU: 1 PID: 163 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.770046] Hardware name: linux,dummy-virt (DT)
[   76.770625] Call trace:
[   76.770958]  dump_backtrace+0xf8/0x118
[   76.771482]  show_stack+0x18/0x24
[   76.771984]  __dump_stack+0x28/0x38
[   76.772488]  dump_stack_lvl+0x54/0x6c
[   76.773135]  print_address_description+0x7c/0x1ec
[   76.773953]  print_report+0x50/0x68
[   76.774432]  kasan_report+0xac/0x100
[   76.774914]  __asan_load1+0x6c/0x70
[   76.775346]  memcmp+0x8c/0xd8
[   76.775719]  kasan_memcmp+0xc8/0x178
[   76.776169]  kunit_try_run_case+0x80/0x184
[   76.776654]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.777228]  kthread+0x16c/0x21c
[   76.777631]  ret_from_fork+0x10/0x20
[   76.778109] 
[   76.778378] Allocated by task 163:
[   76.778798]  kasan_set_track+0x4c/0x80
[   76.779225]  kasan_save_alloc_info+0x28/0x34
[   76.779632]  __kasan_kmalloc+0x88/0xa0
[   76.780288]  kmalloc_trace+0x54/0x68
[   76.780924]  kasan_memcmp+0x58/0x178
[   76.781558]  kunit_try_run_case+0x80/0x184
[   76.782471]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.783296]  kthread+0x16c/0x21c
[   76.783875]  ret_from_fork+0x10/0x20
[   76.784458] 
[   76.784734] The buggy address belongs to the object at ffff0000c5a87600
[   76.784734]  which belongs to the cache kmalloc-128 of size 128
[   76.786132] The buggy address is located 24 bytes inside of
[   76.786132]  128-byte region [ffff0000c5a87600, ffff0000c5a87680)
[   76.787464] 
[   76.787737] The buggy address belongs to the physical page:
[   76.788301] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.789885] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.790847] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.791809] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.792302] page dumped because: kasan: bad access detected
[   76.792674] 
[   76.792955] Memory state around the buggy address:
[   76.793566]  ffff0000c5a87500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.794447]  ffff0000c5a87580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.795345] >ffff0000c5a87600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.796206]                             ^
[   76.797360]  ffff0000c5a87680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.798271]  ffff0000c5a87700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.799130] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memchr
[   76.728121] ==================================================================
[   76.728973] BUG: KASAN: slab-out-of-bounds in memchr+0x34/0x64
[   76.730182] Read of size 1 at addr ffff0000c5a87518 by task kunit_try_catch/162
[   76.731070] 
[   76.731276] CPU: 1 PID: 162 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.732056] Hardware name: linux,dummy-virt (DT)
[   76.732753] Call trace:
[   76.733289]  dump_backtrace+0xf8/0x118
[   76.734001]  show_stack+0x18/0x24
[   76.734637]  __dump_stack+0x28/0x38
[   76.735269]  dump_stack_lvl+0x54/0x6c
[   76.735900]  print_address_description+0x7c/0x1ec
[   76.736664]  print_report+0x50/0x68
[   76.737435]  kasan_report+0xac/0x100
[   76.738096]  __asan_load1+0x6c/0x70
[   76.738729]  memchr+0x34/0x64
[   76.739264]  kasan_memchr+0xa8/0x158
[   76.739795]  kunit_try_run_case+0x80/0x184
[   76.740235]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.740736]  kthread+0x16c/0x21c
[   76.741142]  ret_from_fork+0x10/0x20
[   76.741607] 
[   76.741869] Allocated by task 162:
[   76.742268]  kasan_set_track+0x4c/0x80
[   76.742769]  kasan_save_alloc_info+0x28/0x34
[   76.743264]  __kasan_kmalloc+0x88/0xa0
[   76.743753]  kmalloc_trace+0x54/0x68
[   76.744285]  kasan_memchr+0x48/0x158
[   76.745116]  kunit_try_run_case+0x80/0x184
[   76.746321]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.747166]  kthread+0x16c/0x21c
[   76.747779]  ret_from_fork+0x10/0x20
[   76.748378] 
[   76.748669] The buggy address belongs to the object at ffff0000c5a87500
[   76.748669]  which belongs to the cache kmalloc-128 of size 128
[   76.749411] The buggy address is located 24 bytes inside of
[   76.749411]  128-byte region [ffff0000c5a87500, ffff0000c5a87580)
[   76.750289] 
[   76.750529] The buggy address belongs to the physical page:
[   76.751040] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.751947] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.752659] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.753386] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.754018] page dumped because: kasan: bad access detected
[   76.754491] 
[   76.754675] Memory state around the buggy address:
[   76.755636]  ffff0000c5a87400: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.756307]  ffff0000c5a87480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.756950] >ffff0000c5a87500: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.757546]                             ^
[   76.757969]  ffff0000c5a87580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.758589]  ffff0000c5a87600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.759207] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmem_cache_double_destroy
[   76.684091] ==================================================================
[   76.685048] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xa4/0x144
[   76.685797] Read of size 1 at addr ffff0000c546a180 by task kunit_try_catch/161
[   76.686448] 
[   76.686692] CPU: 1 PID: 161 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.687432] Hardware name: linux,dummy-virt (DT)
[   76.687846] Call trace:
[   76.688103]  dump_backtrace+0xf8/0x118
[   76.688806]  show_stack+0x18/0x24
[   76.689261]  __dump_stack+0x28/0x38
[   76.689672]  dump_stack_lvl+0x54/0x6c
[   76.690123]  print_address_description+0x7c/0x1ec
[   76.690660]  print_report+0x50/0x68
[   76.691695]  kasan_report+0xac/0x100
[   76.692163]  __kasan_check_byte+0x3c/0x54
[   76.692664]  kmem_cache_destroy+0x3c/0x14c
[   76.693144]  kmem_cache_double_destroy+0xa4/0x144
[   76.693679]  kunit_try_run_case+0x80/0x184
[   76.694146]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.694710]  kthread+0x16c/0x21c
[   76.695169]  ret_from_fork+0x10/0x20
[   76.695588] 
[   76.695794] Allocated by task 161:
[   76.696176]  kasan_set_track+0x4c/0x80
[   76.697296]  kasan_save_alloc_info+0x28/0x34
[   76.697772]  __kasan_slab_alloc+0x58/0x70
[   76.698242]  slab_post_alloc_hook+0x70/0x2f4
[   76.698716]  kmem_cache_alloc+0x168/0x260
[   76.699201]  kmem_cache_create_usercopy+0x108/0x29c
[   76.699732]  kmem_cache_create+0x1c/0x28
[   76.700178]  kmem_cache_double_destroy+0x48/0x144
[   76.700691]  kunit_try_run_case+0x80/0x184
[   76.701158]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.701715]  kthread+0x16c/0x21c
[   76.702161]  ret_from_fork+0x10/0x20
[   76.702552] 
[   76.702770] Freed by task 161:
[   76.703112]  kasan_set_track+0x4c/0x80
[   76.703588]  kasan_save_free_info+0x3c/0x60
[   76.704054]  ____kasan_slab_free+0xe8/0x140
[   76.704547]  __kasan_slab_free+0x18/0x28
[   76.705623]  kmem_cache_free+0xe0/0x358
[   76.706117]  slab_kmem_cache_release+0x30/0x40
[   76.706616]  kmem_cache_release+0x14/0x20
[   76.707130]  kobject_put+0xd8/0x140
[   76.707573]  sysfs_slab_release+0x28/0x34
[   76.708088]  kmem_cache_destroy+0x148/0x14c
[   76.708550]  kmem_cache_double_destroy+0x90/0x144
[   76.709064]  kunit_try_run_case+0x80/0x184
[   76.709559]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.710152]  kthread+0x16c/0x21c
[   76.710593]  ret_from_fork+0x10/0x20
[   76.711084] 
[   76.711291] The buggy address belongs to the object at ffff0000c546a180
[   76.711291]  which belongs to the cache kmem_cache of size 216
[   76.712220] The buggy address is located 0 bytes inside of
[   76.712220]  216-byte region [ffff0000c546a180, ffff0000c546a258)
[   76.713902] 
[   76.714126] The buggy address belongs to the physical page:
[   76.714593] page:000000005b065639 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10546a
[   76.715397] head:000000005b065639 order:1 compound_mapcount:0 compound_pincount:0
[   76.716117] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   76.716859] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002000
[   76.717542] raw: 0000000000000000 0000000080150015 00000001ffffffff 0000000000000000
[   76.718151] page dumped because: kasan: bad access detected
[   76.718642] 
[   76.718846] Memory state around the buggy address:
[   76.719324]  ffff0000c546a080: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   76.719987]  ffff0000c546a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.720629] >ffff0000c546a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.721743]                    ^
[   76.722099]  ffff0000c546a200: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   76.722743]  ffff0000c546a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.723371] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[   76.640493] ==================================================================
[   76.641589] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xb0/0x1b8
[   76.642267] Free of addr ffff0000c5a99001 by task kunit_try_catch/160
[   76.642814] 
[   76.643052] CPU: 0 PID: 160 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.643744] Hardware name: linux,dummy-virt (DT)
[   76.644213] Call trace:
[   76.644495]  dump_backtrace+0xf8/0x118
[   76.645051]  show_stack+0x18/0x24
[   76.645479]  __dump_stack+0x28/0x38
[   76.645952]  dump_stack_lvl+0x54/0x6c
[   76.646422]  print_address_description+0x7c/0x1ec
[   76.647476]  print_report+0x50/0x68
[   76.647958]  kasan_report_invalid_free+0x9c/0xe8
[   76.648497]  ____kasan_slab_free+0x108/0x140
[   76.649270]  __kasan_slab_free+0x18/0x28
[   76.649767]  kmem_cache_free+0xe0/0x358
[   76.650204]  kmem_cache_invalid_free+0xb0/0x1b8
[   76.650699]  kunit_try_run_case+0x80/0x184
[   76.651177]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.651772]  kthread+0x16c/0x21c
[   76.652196]  ret_from_fork+0x10/0x20
[   76.652605] 
[   76.652813] Allocated by task 160:
[   76.653188]  kasan_set_track+0x4c/0x80
[   76.653684]  kasan_save_alloc_info+0x28/0x34
[   76.654154]  __kasan_slab_alloc+0x58/0x70
[   76.654628]  slab_post_alloc_hook+0x70/0x2f4
[   76.655600]  kmem_cache_alloc+0x168/0x260
[   76.656060]  kmem_cache_invalid_free+0x90/0x1b8
[   76.656558]  kunit_try_run_case+0x80/0x184
[   76.657286]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.657876]  kthread+0x16c/0x21c
[   76.658281]  ret_from_fork+0x10/0x20
[   76.658736] 
[   76.658935] The buggy address belongs to the object at ffff0000c5a99000
[   76.658935]  which belongs to the cache test_cache of size 200
[   76.659902] The buggy address is located 1 bytes inside of
[   76.659902]  200-byte region [ffff0000c5a99000, ffff0000c5a990c8)
[   76.661339] 
[   76.661565] The buggy address belongs to the physical page:
[   76.662035] page:000000003fed45ed refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a99
[   76.662866] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.663557] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1483c80
[   76.664244] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   76.664943] page dumped because: kasan: bad access detected
[   76.665409] 
[   76.665617] Memory state around the buggy address:
[   76.666394]  ffff0000c5a98f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.667063]  ffff0000c5a98f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.667707] >ffff0000c5a99000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.668326]                    ^
[   76.668692]  ffff0000c5a99080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   76.669498]  ffff0000c5a99100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.670450] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[   76.595241] ==================================================================
[   76.596073] BUG: KASAN: double-free in kmem_cache_double_free+0xbc/0x1b8
[   76.597109] Free of addr ffff0000c5a8d000 by task kunit_try_catch/159
[   76.597669] 
[   76.597900] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.598658] Hardware name: linux,dummy-virt (DT)
[   76.599070] Call trace:
[   76.599341]  dump_backtrace+0xf8/0x118
[   76.599851]  show_stack+0x18/0x24
[   76.600289]  __dump_stack+0x28/0x38
[   76.600940]  dump_stack_lvl+0x54/0x6c
[   76.601379]  print_address_description+0x7c/0x1ec
[   76.601924]  print_report+0x50/0x68
[   76.602370]  kasan_report_invalid_free+0x9c/0xe8
[   76.602918]  ____kasan_slab_free+0x108/0x140
[   76.603413]  __kasan_slab_free+0x18/0x28
[   76.603889]  kmem_cache_free+0xe0/0x358
[   76.604335]  kmem_cache_double_free+0xbc/0x1b8
[   76.605069]  kunit_try_run_case+0x80/0x184
[   76.605545]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.606123]  kthread+0x16c/0x21c
[   76.606535]  ret_from_fork+0x10/0x20
[   76.607008] 
[   76.607196] Allocated by task 159:
[   76.607578]  kasan_set_track+0x4c/0x80
[   76.608089]  kasan_save_alloc_info+0x28/0x34
[   76.608558]  __kasan_slab_alloc+0x58/0x70
[   76.609027]  slab_post_alloc_hook+0x70/0x2f4
[   76.609501]  kmem_cache_alloc+0x168/0x260
[   76.609965]  kmem_cache_double_free+0x90/0x1b8
[   76.610469]  kunit_try_run_case+0x80/0x184
[   76.611098]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.611676]  kthread+0x16c/0x21c
[   76.612090]  ret_from_fork+0x10/0x20
[   76.612528] 
[   76.612712] Freed by task 159:
[   76.613532]  kasan_set_track+0x4c/0x80
[   76.614028]  kasan_save_free_info+0x3c/0x60
[   76.614518]  ____kasan_slab_free+0xe8/0x140
[   76.615017]  __kasan_slab_free+0x18/0x28
[   76.615490]  kmem_cache_free+0xe0/0x358
[   76.615951]  kmem_cache_double_free+0xa4/0x1b8
[   76.616455]  kunit_try_run_case+0x80/0x184
[   76.617078]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.617635]  kthread+0x16c/0x21c
[   76.618046]  ret_from_fork+0x10/0x20
[   76.618489] 
[   76.618684] The buggy address belongs to the object at ffff0000c5a8d000
[   76.618684]  which belongs to the cache test_cache of size 200
[   76.619632] The buggy address is located 0 bytes inside of
[   76.619632]  200-byte region [ffff0000c5a8d000, ffff0000c5a8d0c8)
[   76.620544] 
[   76.620942] The buggy address belongs to the physical page:
[   76.621426] page:00000000691911c3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a8d
[   76.622193] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.622887] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c1483b00
[   76.623546] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   76.624177] page dumped because: kasan: bad access detected
[   76.624823] 
[   76.625049] Memory state around the buggy address:
[   76.625491]  ffff0000c5a8cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.626139]  ffff0000c5a8cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.626768] >ffff0000c5a8d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.627387]                    ^
[   76.627752]  ffff0000c5a8d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   76.628384]  ffff0000c5a8d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.629258] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-ksize_uaf
[   76.552483] ==================================================================
[   76.553361] BUG: KASAN: use-after-free in ksize_uaf+0x130/0x24c
[   76.553907] Read of size 1 at addr ffff0000c5a87178 by task kunit_try_catch/158
[   76.554643] 
[   76.554856] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.555589] Hardware name: linux,dummy-virt (DT)
[   76.555998] Call trace:
[   76.556314]  dump_backtrace+0xf8/0x118
[   76.557264]  show_stack+0x18/0x24
[   76.557740]  __dump_stack+0x28/0x38
[   76.558157]  dump_stack_lvl+0x54/0x6c
[   76.558614]  print_address_description+0x7c/0x1ec
[   76.559160]  print_report+0x50/0x68
[   76.559593]  kasan_report+0xac/0x100
[   76.560042]  __asan_load1+0x6c/0x70
[   76.560518]  ksize_uaf+0x130/0x24c
[   76.560967]  kunit_try_run_case+0x80/0x184
[   76.561428]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.562010]  kthread+0x16c/0x21c
[   76.562452]  ret_from_fork+0x10/0x20
[   76.563150] 
[   76.563370] Allocated by task 158:
[   76.563708]  kasan_set_track+0x4c/0x80
[   76.564220]  kasan_save_alloc_info+0x28/0x34
[   76.565161]  __kasan_kmalloc+0x88/0xa0
[   76.565642]  kmalloc_trace+0x54/0x68
[   76.566116]  ksize_uaf+0x48/0x24c
[   76.566513]  kunit_try_run_case+0x80/0x184
[   76.567023]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.567583]  kthread+0x16c/0x21c
[   76.567996]  ret_from_fork+0x10/0x20
[   76.568447] 
[   76.568952] Freed by task 158:
[   76.569266]  kasan_set_track+0x4c/0x80
[   76.569773]  kasan_save_free_info+0x3c/0x60
[   76.570233]  ____kasan_slab_free+0xe8/0x140
[   76.570703]  __kasan_slab_free+0x18/0x28
[   76.571228]  __kmem_cache_free+0xdc/0x284
[   76.571706]  kfree+0x60/0x74
[   76.572110]  ksize_uaf+0x90/0x24c
[   76.572520]  kunit_try_run_case+0x80/0x184
[   76.573020]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.573575]  kthread+0x16c/0x21c
[   76.574022]  ret_from_fork+0x10/0x20
[   76.574419] 
[   76.574630] The buggy address belongs to the object at ffff0000c5a87100
[   76.574630]  which belongs to the cache kmalloc-128 of size 128
[   76.576011] The buggy address is located 120 bytes inside of
[   76.576011]  128-byte region [ffff0000c5a87100, ffff0000c5a87180)
[   76.577135] 
[   76.577366] The buggy address belongs to the physical page:
[   76.577829] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.578614] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.579429] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.580096] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.581175] page dumped because: kasan: bad access detected
[   76.581640] 
[   76.581858] Memory state around the buggy address:
[   76.582273]  ffff0000c5a87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.582931]  ffff0000c5a87080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.583567] >ffff0000c5a87100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.584180]                                                                 ^
[   76.585080]  ffff0000c5a87180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.585680]  ffff0000c5a87200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.586287] ==================================================================
[   76.474519] ==================================================================
[   76.475275] BUG: KASAN: use-after-free in ksize_uaf+0xa4/0x24c
[   76.475789] Read of size 1 at addr ffff0000c5a87100 by task kunit_try_catch/158
[   76.476303] 
[   76.476495] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.478661] Hardware name: linux,dummy-virt (DT)
[   76.479890] Call trace:
[   76.480338]  dump_backtrace+0xf8/0x118
[   76.481358]  show_stack+0x18/0x24
[   76.482338]  __dump_stack+0x28/0x38
[   76.483302]  dump_stack_lvl+0x54/0x6c
[   76.484278]  print_address_description+0x7c/0x1ec
[   76.485449]  print_report+0x50/0x68
[   76.486450]  kasan_report+0xac/0x100
[   76.487452]  __kasan_check_byte+0x3c/0x54
[   76.488505]  ksize+0x34/0x13c
[   76.489210]  ksize_uaf+0xa4/0x24c
[   76.489802]  kunit_try_run_case+0x80/0x184
[   76.490277]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.490927]  kthread+0x16c/0x21c
[   76.491348]  ret_from_fork+0x10/0x20
[   76.491817] 
[   76.492027] Allocated by task 158:
[   76.492371]  kasan_set_track+0x4c/0x80
[   76.492928]  kasan_save_alloc_info+0x28/0x34
[   76.493397]  __kasan_kmalloc+0x88/0xa0
[   76.493867]  kmalloc_trace+0x54/0x68
[   76.494296]  ksize_uaf+0x48/0x24c
[   76.494725]  kunit_try_run_case+0x80/0x184
[   76.495481]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.496100]  kthread+0x16c/0x21c
[   76.496521]  ret_from_fork+0x10/0x20
[   76.497216] 
[   76.497403] Freed by task 158:
[   76.497767]  kasan_set_track+0x4c/0x80
[   76.498259]  kasan_save_free_info+0x3c/0x60
[   76.498752]  ____kasan_slab_free+0xe8/0x140
[   76.499313]  __kasan_slab_free+0x18/0x28
[   76.499787]  __kmem_cache_free+0xdc/0x284
[   76.500299]  kfree+0x60/0x74
[   76.500961]  ksize_uaf+0x90/0x24c
[   76.501418]  kunit_try_run_case+0x80/0x184
[   76.501903]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.502455]  kthread+0x16c/0x21c
[   76.502877]  ret_from_fork+0x10/0x20
[   76.503301] 
[   76.503501] The buggy address belongs to the object at ffff0000c5a87100
[   76.503501]  which belongs to the cache kmalloc-128 of size 128
[   76.504473] The buggy address is located 0 bytes inside of
[   76.504473]  128-byte region [ffff0000c5a87100, ffff0000c5a87180)
[   76.505627] 
[   76.505852] The buggy address belongs to the physical page:
[   76.506342] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.507127] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.507835] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.508538] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.509427] page dumped because: kasan: bad access detected
[   76.509920] 
[   76.510107] Memory state around the buggy address:
[   76.510573]  ffff0000c5a87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.511214]  ffff0000c5a87080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.511857] >ffff0000c5a87100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.512438]                    ^
[   76.513087]  ffff0000c5a87180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.513707]  ffff0000c5a87200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.514329] ==================================================================
[   76.516368] ==================================================================
[   76.517434] BUG: KASAN: use-after-free in ksize_uaf+0xe8/0x24c
[   76.517966] Read of size 1 at addr ffff0000c5a87100 by task kunit_try_catch/158
[   76.518478] 
[   76.518674] CPU: 1 PID: 158 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.519678] Hardware name: linux,dummy-virt (DT)
[   76.520045] Call trace:
[   76.520282]  dump_backtrace+0xf8/0x118
[   76.521816]  show_stack+0x18/0x24
[   76.522268]  __dump_stack+0x28/0x38
[   76.522739]  dump_stack_lvl+0x54/0x6c
[   76.523208]  print_address_description+0x7c/0x1ec
[   76.523787]  print_report+0x50/0x68
[   76.524286]  kasan_report+0xac/0x100
[   76.524961]  __asan_load1+0x6c/0x70
[   76.525593]  ksize_uaf+0xe8/0x24c
[   76.526033]  kunit_try_run_case+0x80/0x184
[   76.526542]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.527176]  kthread+0x16c/0x21c
[   76.527616]  ret_from_fork+0x10/0x20
[   76.528098] 
[   76.528314] Allocated by task 158:
[   76.528925]  kasan_set_track+0x4c/0x80
[   76.529433]  kasan_save_alloc_info+0x28/0x34
[   76.529914]  __kasan_kmalloc+0x88/0xa0
[   76.530386]  kmalloc_trace+0x54/0x68
[   76.530884]  ksize_uaf+0x48/0x24c
[   76.531330]  kunit_try_run_case+0x80/0x184
[   76.531840]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.532425]  kthread+0x16c/0x21c
[   76.532841]  ret_from_fork+0x10/0x20
[   76.533272] 
[   76.533453] Freed by task 158:
[   76.534315]  kasan_set_track+0x4c/0x80
[   76.534824]  kasan_save_free_info+0x3c/0x60
[   76.535291]  ____kasan_slab_free+0xe8/0x140
[   76.535805]  __kasan_slab_free+0x18/0x28
[   76.536303]  __kmem_cache_free+0xdc/0x284
[   76.537054]  kfree+0x60/0x74
[   76.537468]  ksize_uaf+0x90/0x24c
[   76.537941]  kunit_try_run_case+0x80/0x184
[   76.538443]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.539099]  kthread+0x16c/0x21c
[   76.539510]  ret_from_fork+0x10/0x20
[   76.539966] 
[   76.540172] The buggy address belongs to the object at ffff0000c5a87100
[   76.540172]  which belongs to the cache kmalloc-128 of size 128
[   76.541356] The buggy address is located 0 bytes inside of
[   76.541356]  128-byte region [ffff0000c5a87100, ffff0000c5a87180)
[   76.542244] 
[   76.542451] The buggy address belongs to the physical page:
[   76.543307] page:000000005da1e2c0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a87
[   76.544115] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.545099] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.545786] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.546411] page dumped because: kasan: bad access detected
[   76.546923] 
[   76.547123] Memory state around the buggy address:
[   76.547555]  ffff0000c5a87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.548209]  ffff0000c5a87080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.549027] >ffff0000c5a87100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   76.549626]                    ^
[   76.549989]  ffff0000c5a87180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.550611]  ffff0000c5a87200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.551491] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[   76.443052] ==================================================================
[   76.443936] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xb8/0x164
[   76.444885] Read of size 1 at addr ffff0000c5a88280 by task kunit_try_catch/157
[   76.445641] 
[   76.446149] CPU: 0 PID: 157 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.446982] Hardware name: linux,dummy-virt (DT)
[   76.447501] Call trace:
[   76.447792]  dump_backtrace+0xf8/0x118
[   76.448255]  show_stack+0x18/0x24
[   76.448863]  __dump_stack+0x28/0x38
[   76.449297]  dump_stack_lvl+0x54/0x6c
[   76.449742]  print_address_description+0x7c/0x1ec
[   76.450286]  print_report+0x50/0x68
[   76.450732]  kasan_report+0xac/0x100
[   76.451185]  __asan_load1+0x6c/0x70
[   76.451620]  ksize_unpoisons_memory+0xb8/0x164
[   76.452113]  kunit_try_run_case+0x80/0x184
[   76.452586]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.453151]  kthread+0x16c/0x21c
[   76.453558]  ret_from_fork+0x10/0x20
[   76.453986] 
[   76.454178] Allocated by task 157:
[   76.454513]  kasan_set_track+0x4c/0x80
[   76.455163]  kasan_save_alloc_info+0x28/0x34
[   76.455626]  __kasan_kmalloc+0x88/0xa0
[   76.456092]  kmalloc_trace+0x54/0x68
[   76.456558]  ksize_unpoisons_memory+0x48/0x164
[   76.457209]  kunit_try_run_case+0x80/0x184
[   76.457668]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.458270]  kthread+0x16c/0x21c
[   76.458674]  ret_from_fork+0x10/0x20
[   76.459109] 
[   76.459328] The buggy address belongs to the object at ffff0000c5a88200
[   76.459328]  which belongs to the cache kmalloc-128 of size 128
[   76.460273] The buggy address is located 0 bytes to the right of
[   76.460273]  128-byte region [ffff0000c5a88200, ffff0000c5a88280)
[   76.461470] 
[   76.461685] The buggy address belongs to the physical page:
[   76.462158] page:00000000927d1208 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a88
[   76.462976] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   76.463635] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   76.465221] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   76.465841] page dumped because: kasan: bad access detected
[   76.466313] 
[   76.466501] Memory state around the buggy address:
[   76.466964]  ffff0000c5a88180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.467615]  ffff0000c5a88200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.468271] >ffff0000c5a88280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.469297]                    ^
[   76.469637]  ffff0000c5a88300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.470299]  ffff0000c5a88380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.470913] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_left
[   76.408582] ==================================================================
[   76.409530] BUG: KASAN: global-out-of-bounds in kasan_global_oob_left+0x50/0xf4
[   76.410263] Read of size 1 at addr ffffa664876d15bd by task kunit_try_catch/153
[   76.411025] 
[   76.411264] CPU: 0 PID: 153 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.411998] Hardware name: linux,dummy-virt (DT)
[   76.412388] Call trace:
[   76.412838]  dump_backtrace+0xf8/0x118
[   76.413315]  show_stack+0x18/0x24
[   76.413775]  __dump_stack+0x28/0x38
[   76.414189]  dump_stack_lvl+0x54/0x6c
[   76.414627]  print_address_description+0x7c/0x1ec
[   76.415212]  print_report+0x50/0x68
[   76.415646]  kasan_report+0xac/0x100
[   76.416095]  __asan_load1+0x6c/0x70
[   76.416547]  kasan_global_oob_left+0x50/0xf4
[   76.417193]  kunit_try_run_case+0x80/0x184
[   76.417654]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.418228]  kthread+0x16c/0x21c
[   76.418634]  ret_from_fork+0x10/0x20
[   76.419073] 
[   76.419267] The buggy address belongs to the variable:
[   76.419690]  resource+0x5d/0x60
[   76.420165] 
[   76.420360] The buggy address ffffa664876d15bd belongs to a vmalloc virtual mapping
[   76.421277] The buggy address belongs to the physical page:
[   76.421770] page:0000000092fb1506 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd1
[   76.422507] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   76.423255] raw: 03fffc0000001000 fffffc00000f3448 fffffc00000f3448 0000000000000000
[   76.423918] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   76.424547] page dumped because: kasan: bad access detected
[   76.425003] 
[   76.425225] Memory state around the buggy address:
[   76.425667]  ffffa664876d1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9
[   76.426296]  ffffa664876d1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00
[   76.427181] >ffffa664876d1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9
[   76.427796]                                         ^
[   76.428266]  ffffa664876d1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.429062]  ffffa664876d1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.429668] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[   76.382577] ==================================================================
[   76.383528] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x4c/0xf0
[   76.384304] Read of size 1 at addr ffffa664876d15cd by task kunit_try_catch/152
[   76.385199] 
[   76.385513] CPU: 1 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   76.386354] Hardware name: linux,dummy-virt (DT)
[   76.386876] Call trace:
[   76.387147]  dump_backtrace+0xf8/0x118
[   76.387709]  show_stack+0x18/0x24
[   76.388193]  __dump_stack+0x28/0x38
[   76.388743]  dump_stack_lvl+0x54/0x6c
[   76.389199]  print_address_description+0x7c/0x1ec
[   76.389819]  print_report+0x50/0x68
[   76.390324]  kasan_report+0xac/0x100
[   76.390817]  __asan_load1+0x6c/0x70
[   76.391292]  kasan_global_oob_right+0x4c/0xf0
[   76.391770]  kunit_try_run_case+0x80/0x184
[   76.392288]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   76.393360]  kthread+0x16c/0x21c
[   76.393824]  ret_from_fork+0x10/0x20
[   76.394273] 
[   76.394496] The buggy address belongs to the variable:
[   76.394973]  global_array+0xd/0x20
[   76.395386] 
[   76.395612] The buggy address ffffa664876d15cd belongs to a vmalloc virtual mapping
[   76.396247] The buggy address belongs to the physical page:
[   76.396984] page:0000000092fb1506 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43cd1
[   76.397773] flags: 0x3fffc0000001000(reserved|node=0|zone=0|lastcpupid=0xffff)
[   76.398461] raw: 03fffc0000001000 fffffc00000f3448 fffffc00000f3448 0000000000000000
[   76.399150] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   76.399776] page dumped because: kasan: bad access detected
[   76.400231] 
[   76.400437] Memory state around the buggy address:
[   76.400903]  ffffa664876d1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 f9 f9
[   76.401528]  ffffa664876d1500: 04 f9 f9 f9 01 f9 f9 f9 02 f9 f9 f9 00 00 00 00
[   76.402157] >ffffa664876d1580: 00 00 00 f9 f9 f9 f9 f9 00 02 f9 f9 04 f9 f9 f9
[   76.402724]                                               ^
[   76.403716]  ffffa664876d1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.404359]  ffffa664876d1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   76.405265] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[   75.775864] ==================================================================
[   75.776789] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xb0/0x1cc
[   75.777554] Read of size 1 at addr ffff0000c59b50c8 by task kunit_try_catch/149
[   75.778144] 
[   75.778392] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.779145] Hardware name: linux,dummy-virt (DT)
[   75.779554] Call trace:
[   75.779847]  dump_backtrace+0xf8/0x118
[   75.780352]  show_stack+0x18/0x24
[   75.781465]  __dump_stack+0x28/0x38
[   75.781945]  dump_stack_lvl+0x54/0x6c
[   75.782386]  print_address_description+0x7c/0x1ec
[   75.782921]  print_report+0x50/0x68
[   75.783354]  kasan_report+0xac/0x100
[   75.783837]  __asan_load1+0x6c/0x70
[   75.784291]  kmem_cache_oob+0xb0/0x1cc
[   75.784750]  kunit_try_run_case+0x80/0x184
[   75.785222]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.785842]  kthread+0x16c/0x21c
[   75.786284]  ret_from_fork+0x10/0x20
[   75.786696] 
[   75.786911] Allocated by task 149:
[   75.787220]  kasan_set_track+0x4c/0x80
[   75.787767]  kasan_save_alloc_info+0x28/0x34
[   75.788227]  __kasan_slab_alloc+0x58/0x70
[   75.789338]  slab_post_alloc_hook+0x70/0x2f4
[   75.789842]  kmem_cache_alloc+0x168/0x260
[   75.790302]  kmem_cache_oob+0x94/0x1cc
[   75.790728]  kunit_try_run_case+0x80/0x184
[   75.791236]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.791813]  kthread+0x16c/0x21c
[   75.792225]  ret_from_fork+0x10/0x20
[   75.792655] 
[   75.792856] The buggy address belongs to the object at ffff0000c59b5000
[   75.792856]  which belongs to the cache test_cache of size 200
[   75.793774] The buggy address is located 0 bytes to the right of
[   75.793774]  200-byte region [ffff0000c59b5000, ffff0000c59b50c8)
[   75.794704] 
[   75.794951] The buggy address belongs to the physical page:
[   75.795615] page:000000006008d4ec refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b5
[   75.796413] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.797829] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0f61c80
[   75.798508] raw: 0000000000000000 00000000800f000f 00000001ffffffff 0000000000000000
[   75.799126] page dumped because: kasan: bad access detected
[   75.799595] 
[   75.799811] Memory state around the buggy address:
[   75.800249]  ffff0000c59b4f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.800935]  ffff0000c59b5000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.801519] >ffff0000c59b5080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   75.802124]                                               ^
[   75.802625]  ffff0000c59b5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.803268]  ffff0000c59b5180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.803863] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf2
[   75.724399] ==================================================================
[   75.725890] BUG: KASAN: use-after-free in kmalloc_uaf2+0xfc/0x1e8
[   75.726816] Read of size 1 at addr ffff0000c5a46f28 by task kunit_try_catch/145
[   75.727722] 
[   75.728030] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.729070] Hardware name: linux,dummy-virt (DT)
[   75.729783] Call trace:
[   75.730098]  dump_backtrace+0xf8/0x118
[   75.730728]  show_stack+0x18/0x24
[   75.731317]  __dump_stack+0x28/0x38
[   75.731899]  dump_stack_lvl+0x54/0x6c
[   75.732497]  print_address_description+0x7c/0x1ec
[   75.733458]  print_report+0x50/0x68
[   75.733975]  kasan_report+0xac/0x100
[   75.734389]  __asan_load1+0x6c/0x70
[   75.734802]  kmalloc_uaf2+0xfc/0x1e8
[   75.735224]  kunit_try_run_case+0x80/0x184
[   75.735709]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.736331]  kthread+0x16c/0x21c
[   75.736841]  ret_from_fork+0x10/0x20
[   75.737287] 
[   75.737655] Allocated by task 145:
[   75.738064]  kasan_set_track+0x4c/0x80
[   75.738562]  kasan_save_alloc_info+0x28/0x34
[   75.739032]  __kasan_kmalloc+0x88/0xa0
[   75.739480]  kmalloc_trace+0x54/0x68
[   75.739901]  kmalloc_uaf2+0x48/0x1e8
[   75.740339]  kunit_try_run_case+0x80/0x184
[   75.741092]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.741689]  kthread+0x16c/0x21c
[   75.742140]  ret_from_fork+0x10/0x20
[   75.742567] 
[   75.742767] Freed by task 145:
[   75.743108]  kasan_set_track+0x4c/0x80
[   75.743591]  kasan_save_free_info+0x3c/0x60
[   75.744102]  ____kasan_slab_free+0xe8/0x140
[   75.745100]  __kasan_slab_free+0x18/0x28
[   75.745588]  __kmem_cache_free+0xdc/0x284
[   75.746062]  kfree+0x60/0x74
[   75.746433]  kmalloc_uaf2+0x90/0x1e8
[   75.746848]  kunit_try_run_case+0x80/0x184
[   75.747313]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.747926]  kthread+0x16c/0x21c
[   75.748332]  ret_from_fork+0x10/0x20
[   75.748972] 
[   75.749178] The buggy address belongs to the object at ffff0000c5a46f00
[   75.749178]  which belongs to the cache kmalloc-128 of size 128
[   75.750117] The buggy address is located 40 bytes inside of
[   75.750117]  128-byte region [ffff0000c5a46f00, ffff0000c5a46f80)
[   75.750997] 
[   75.751214] The buggy address belongs to the physical page:
[   75.751667] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46
[   75.752480] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.753308] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.754011] raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
[   75.754635] page dumped because: kasan: bad access detected
[   75.755161] 
[   75.755351] Memory state around the buggy address:
[   75.755817]  ffff0000c5a46e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.756464]  ffff0000c5a46e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.757400] >ffff0000c5a46f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.758017]                                   ^
[   75.758437]  ffff0000c5a46f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.759079]  ffff0000c5a47000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.759660] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_memset
[   75.674540] ==================================================================
[   75.676406] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xac/0x14c
[   75.677884] Write of size 33 at addr ffff0000c5a46e00 by task kunit_try_catch/144
[   75.679638] 
[   75.680306] CPU: 1 PID: 144 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.681665] Hardware name: linux,dummy-virt (DT)
[   75.682038] Call trace:
[   75.682274]  dump_backtrace+0xf8/0x118
[   75.682703]  show_stack+0x18/0x24
[   75.683104]  __dump_stack+0x28/0x38
[   75.683479]  dump_stack_lvl+0x54/0x6c
[   75.684113]  print_address_description+0x7c/0x1ec
[   75.685346]  print_report+0x50/0x68
[   75.686145]  kasan_report+0xac/0x100
[   75.686931]  kasan_check_range+0x260/0x2a0
[   75.687773]  memset+0x40/0x70
[   75.688425]  kmalloc_uaf_memset+0xac/0x14c
[   75.689279]  kunit_try_run_case+0x80/0x184
[   75.690085]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.691038]  kthread+0x16c/0x21c
[   75.691661]  ret_from_fork+0x10/0x20
[   75.692289] 
[   75.693143] Allocated by task 144:
[   75.693684]  kasan_set_track+0x4c/0x80
[   75.694383]  kasan_save_alloc_info+0x28/0x34
[   75.695061]  __kasan_kmalloc+0x88/0xa0
[   75.695703]  kmalloc_trace+0x54/0x68
[   75.696311]  kmalloc_uaf_memset+0x48/0x14c
[   75.697029]  kunit_try_run_case+0x80/0x184
[   75.697817]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.698698]  kthread+0x16c/0x21c
[   75.699356]  ret_from_fork+0x10/0x20
[   75.699944] 
[   75.700218] Freed by task 144:
[   75.700671]  kasan_set_track+0x4c/0x80
[   75.701413]  kasan_save_free_info+0x3c/0x60
[   75.702161]  ____kasan_slab_free+0xe8/0x140
[   75.702844]  __kasan_slab_free+0x18/0x28
[   75.703494]  __kmem_cache_free+0xdc/0x284
[   75.703910]  kfree+0x60/0x74
[   75.704263]  kmalloc_uaf_memset+0x90/0x14c
[   75.704698]  kunit_try_run_case+0x80/0x184
[   75.705362]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.706167]  kthread+0x16c/0x21c
[   75.706734]  ret_from_fork+0x10/0x20
[   75.707309] 
[   75.707577] The buggy address belongs to the object at ffff0000c5a46e00
[   75.707577]  which belongs to the cache kmalloc-128 of size 128
[   75.708417] The buggy address is located 0 bytes inside of
[   75.708417]  128-byte region [ffff0000c5a46e00, ffff0000c5a46e80)
[   75.709942] 
[   75.710382] The buggy address belongs to the physical page:
[   75.711060] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46
[   75.712173] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.713189] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.714291] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.714793] page dumped because: kasan: bad access detected
[   75.715163] 
[   75.715340] Memory state around the buggy address:
[   75.715690]  ffff0000c5a46d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.716580]  ffff0000c5a46d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.717547] >ffff0000c5a46e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.718447]                    ^
[   75.718944]  ffff0000c5a46e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.719824]  ffff0000c5a46f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.720700] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf
[   75.629573] ==================================================================
[   75.630348] BUG: KASAN: use-after-free in kmalloc_uaf+0xa4/0x148
[   75.631053] Read of size 1 at addr ffff0000c5a77308 by task kunit_try_catch/143
[   75.632345] 
[   75.632717] CPU: 0 PID: 143 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.633908] Hardware name: linux,dummy-virt (DT)
[   75.634671] Call trace:
[   75.635169]  dump_backtrace+0xf8/0x118
[   75.635923]  show_stack+0x18/0x24
[   75.636680]  __dump_stack+0x28/0x38
[   75.637342]  dump_stack_lvl+0x54/0x6c
[   75.637967]  print_address_description+0x7c/0x1ec
[   75.638744]  print_report+0x50/0x68
[   75.639365]  kasan_report+0xac/0x100
[   75.639988]  __asan_load1+0x6c/0x70
[   75.640618]  kmalloc_uaf+0xa4/0x148
[   75.641252]  kunit_try_run_case+0x80/0x184
[   75.641735]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.642247]  kthread+0x16c/0x21c
[   75.642629]  ret_from_fork+0x10/0x20
[   75.643225] 
[   75.643495] Allocated by task 143:
[   75.643985]  kasan_set_track+0x4c/0x80
[   75.644658]  kasan_save_alloc_info+0x28/0x34
[   75.645355]  __kasan_kmalloc+0x88/0xa0
[   75.645996]  kmalloc_trace+0x54/0x68
[   75.646574]  kmalloc_uaf+0x48/0x148
[   75.647150]  kunit_try_run_case+0x80/0x184
[   75.647799]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.648619]  kthread+0x16c/0x21c
[   75.649206]  ret_from_fork+0x10/0x20
[   75.649835] 
[   75.650103] Freed by task 143:
[   75.650548]  kasan_set_track+0x4c/0x80
[   75.651174]  kasan_save_free_info+0x3c/0x60
[   75.651812]  ____kasan_slab_free+0xe8/0x140
[   75.652483]  __kasan_slab_free+0x18/0x28
[   75.653202]  __kmem_cache_free+0xdc/0x284
[   75.653913]  kfree+0x60/0x74
[   75.654413]  kmalloc_uaf+0x90/0x148
[   75.654991]  kunit_try_run_case+0x80/0x184
[   75.655630]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.656392]  kthread+0x16c/0x21c
[   75.657051]  ret_from_fork+0x10/0x20
[   75.657710] 
[   75.657998] The buggy address belongs to the object at ffff0000c5a77300
[   75.657998]  which belongs to the cache kmalloc-128 of size 128
[   75.659319] The buggy address is located 8 bytes inside of
[   75.659319]  128-byte region [ffff0000c5a77300, ffff0000c5a77380)
[   75.660109] 
[   75.660319] The buggy address belongs to the physical page:
[   75.660818] page:00000000495fea3c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a77
[   75.661582] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.662262] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.663303] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.664219] page dumped because: kasan: bad access detected
[   75.665387] 
[   75.665667] Memory state around the buggy address:
[   75.666301]  ffff0000c5a77200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.667181]  ffff0000c5a77280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.668056] >ffff0000c5a77300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.669159]                       ^
[   75.669717]  ffff0000c5a77380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.670334]  ffff0000c5a77400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.670812] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[   75.595895] ==================================================================
[   75.597068] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xb8/0x160
[   75.597814] Read of size 64 at addr ffff0000c5a46804 by task kunit_try_catch/142
[   75.598397] 
[   75.598604] CPU: 1 PID: 142 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.599366] Hardware name: linux,dummy-virt (DT)
[   75.599804] Call trace:
[   75.600080]  dump_backtrace+0xf8/0x118
[   75.600574]  show_stack+0x18/0x24
[   75.601034]  __dump_stack+0x28/0x38
[   75.601511]  dump_stack_lvl+0x54/0x6c
[   75.601973]  print_address_description+0x7c/0x1ec
[   75.602502]  print_report+0x50/0x68
[   75.603151]  kasan_report+0xac/0x100
[   75.603604]  kasan_check_range+0x260/0x2a0
[   75.604108]  memmove+0x48/0x90
[   75.604499]  kmalloc_memmove_invalid_size+0xb8/0x160
[   75.605170]  kunit_try_run_case+0x80/0x184
[   75.605643]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.606210]  kthread+0x16c/0x21c
[   75.606622]  ret_from_fork+0x10/0x20
[   75.607056] 
[   75.607254] Allocated by task 142:
[   75.607613]  kasan_set_track+0x4c/0x80
[   75.608138]  kasan_save_alloc_info+0x28/0x34
[   75.608587]  __kasan_kmalloc+0x88/0xa0
[   75.609201]  kmalloc_trace+0x54/0x68
[   75.609608]  kmalloc_memmove_invalid_size+0x48/0x160
[   75.610180]  kunit_try_run_case+0x80/0x184
[   75.610625]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.611212]  kthread+0x16c/0x21c
[   75.611616]  ret_from_fork+0x10/0x20
[   75.612019] 
[   75.612238] The buggy address belongs to the object at ffff0000c5a46800
[   75.612238]  which belongs to the cache kmalloc-128 of size 128
[   75.613460] The buggy address is located 4 bytes inside of
[   75.613460]  128-byte region [ffff0000c5a46800, ffff0000c5a46880)
[   75.614351] 
[   75.614546] The buggy address belongs to the physical page:
[   75.614989] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46
[   75.615807] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.616504] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.617711] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.618352] page dumped because: kasan: bad access detected
[   75.618850] 
[   75.619054] Memory state around the buggy address:
[   75.619507]  ffff0000c5a46700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.620151]  ffff0000c5a46780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.620843] >ffff0000c5a46800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   75.621552]                                            ^
[   75.622059]  ffff0000c5a46880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.622676]  ffff0000c5a46900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.623244] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[   75.560813] ==================================================================
[   75.561579] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xb4/0x164
[   75.562650] Read of size 18446744073709551614 at addr ffff0000c5a76f04 by task kunit_try_catch/141
[   75.563279] 
[   75.563477] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.564112] Hardware name: linux,dummy-virt (DT)
[   75.564573] Call trace:
[   75.565272]  dump_backtrace+0xf8/0x118
[   75.565779]  show_stack+0x18/0x24
[   75.566215]  __dump_stack+0x28/0x38
[   75.566615]  dump_stack_lvl+0x54/0x6c
[   75.567065]  print_address_description+0x7c/0x1ec
[   75.567587]  print_report+0x50/0x68
[   75.568037]  kasan_report+0xac/0x100
[   75.568515]  kasan_check_range+0x260/0x2a0
[   75.569043]  memmove+0x48/0x90
[   75.569447]  kmalloc_memmove_negative_size+0xb4/0x164
[   75.569979]  kunit_try_run_case+0x80/0x184
[   75.570442]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.571494]  kthread+0x16c/0x21c
[   75.571937]  ret_from_fork+0x10/0x20
[   75.572388] 
[   75.572573] Allocated by task 141:
[   75.573144]  kasan_set_track+0x4c/0x80
[   75.573650]  kasan_save_alloc_info+0x28/0x34
[   75.574149]  __kasan_kmalloc+0x88/0xa0
[   75.574589]  kmalloc_trace+0x54/0x68
[   75.575038]  kmalloc_memmove_negative_size+0x48/0x164
[   75.575585]  kunit_try_run_case+0x80/0x184
[   75.576039]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.577079]  kthread+0x16c/0x21c
[   75.577512]  ret_from_fork+0x10/0x20
[   75.577955] 
[   75.578145] The buggy address belongs to the object at ffff0000c5a76f00
[   75.578145]  which belongs to the cache kmalloc-128 of size 128
[   75.579105] The buggy address is located 4 bytes inside of
[   75.579105]  128-byte region [ffff0000c5a76f00, ffff0000c5a76f80)
[   75.580023] 
[   75.580252] The buggy address belongs to the physical page:
[   75.580700] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76
[   75.581709] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.582394] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.583067] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.583652] page dumped because: kasan: bad access detected
[   75.584142] 
[   75.584359] Memory state around the buggy address:
[   75.585281]  ffff0000c5a76e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.585901]  ffff0000c5a76e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.586524] >ffff0000c5a76f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   75.587140]                    ^
[   75.587489]  ffff0000c5a76f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.588129]  ffff0000c5a77000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   75.589072] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[   75.528059] ==================================================================
[   75.529016] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xac/0x154
[   75.530085] Write of size 16 at addr ffff0000c5a46469 by task kunit_try_catch/140
[   75.530932] 
[   75.531199] CPU: 1 PID: 140 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.532018] Hardware name: linux,dummy-virt (DT)
[   75.532545] Call trace:
[   75.532997]  dump_backtrace+0xf8/0x118
[   75.533601]  show_stack+0x18/0x24
[   75.534180]  __dump_stack+0x28/0x38
[   75.534637]  dump_stack_lvl+0x54/0x6c
[   75.535147]  print_address_description+0x7c/0x1ec
[   75.535704]  print_report+0x50/0x68
[   75.536281]  kasan_report+0xac/0x100
[   75.537018]  kasan_check_range+0x260/0x2a0
[   75.537619]  memset+0x40/0x70
[   75.538111]  kmalloc_oob_memset_16+0xac/0x154
[   75.538590]  kunit_try_run_case+0x80/0x184
[   75.539182]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.539878]  kthread+0x16c/0x21c
[   75.540422]  ret_from_fork+0x10/0x20
[   75.541012] 
[   75.541342] Allocated by task 140:
[   75.541699]  kasan_set_track+0x4c/0x80
[   75.542366]  kasan_save_alloc_info+0x28/0x34
[   75.542926]  __kasan_kmalloc+0x88/0xa0
[   75.543387]  kmalloc_trace+0x54/0x68
[   75.543920]  kmalloc_oob_memset_16+0x48/0x154
[   75.544418]  kunit_try_run_case+0x80/0x184
[   75.545079]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.545814]  kthread+0x16c/0x21c
[   75.546221]  ret_from_fork+0x10/0x20
[   75.546629] 
[   75.546849] The buggy address belongs to the object at ffff0000c5a46400
[   75.546849]  which belongs to the cache kmalloc-128 of size 128
[   75.547729] The buggy address is located 105 bytes inside of
[   75.547729]  128-byte region [ffff0000c5a46400, ffff0000c5a46480)
[   75.548628] 
[   75.549104] The buggy address belongs to the physical page:
[   75.549555] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46
[   75.550346] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.551076] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.551774] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.552444] page dumped because: kasan: bad access detected
[   75.553011] 
[   75.553201] Memory state around the buggy address:
[   75.553558]  ffff0000c5a46300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.554089]  ffff0000c5a46380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.554661] >ffff0000c5a46400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.555331]                                                                 ^
[   75.555933]  ffff0000c5a46480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.556559]  ffff0000c5a46500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.557145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[   75.489407] ==================================================================
[   75.490172] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xac/0x154
[   75.490741] Write of size 8 at addr ffff0000c5a46371 by task kunit_try_catch/139
[   75.491788] 
[   75.492117] CPU: 1 PID: 139 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.493342] Hardware name: linux,dummy-virt (DT)
[   75.494078] Call trace:
[   75.494488]  dump_backtrace+0xf8/0x118
[   75.495169]  show_stack+0x18/0x24
[   75.495813]  __dump_stack+0x28/0x38
[   75.496454]  dump_stack_lvl+0x54/0x6c
[   75.497136]  print_address_description+0x7c/0x1ec
[   75.497917]  print_report+0x50/0x68
[   75.498541]  kasan_report+0xac/0x100
[   75.499160]  kasan_check_range+0x260/0x2a0
[   75.499841]  memset+0x40/0x70
[   75.500356]  kmalloc_oob_memset_8+0xac/0x154
[   75.501115]  kunit_try_run_case+0x80/0x184
[   75.501889]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.502708]  kthread+0x16c/0x21c
[   75.503310]  ret_from_fork+0x10/0x20
[   75.503841] 
[   75.504133] Allocated by task 139:
[   75.504680]  kasan_set_track+0x4c/0x80
[   75.505144]  kasan_save_alloc_info+0x28/0x34
[   75.505545]  __kasan_kmalloc+0x88/0xa0
[   75.506020]  kmalloc_trace+0x54/0x68
[   75.506402]  kmalloc_oob_memset_8+0x48/0x154
[   75.506882]  kunit_try_run_case+0x80/0x184
[   75.507550]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.508375]  kthread+0x16c/0x21c
[   75.509061]  ret_from_fork+0x10/0x20
[   75.509673] 
[   75.509979] The buggy address belongs to the object at ffff0000c5a46300
[   75.509979]  which belongs to the cache kmalloc-128 of size 128
[   75.511406] The buggy address is located 113 bytes inside of
[   75.511406]  128-byte region [ffff0000c5a46300, ffff0000c5a46380)
[   75.512870] 
[   75.513206] The buggy address belongs to the physical page:
[   75.513985] page:00000000e850444c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a46
[   75.514884] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.515441] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.516218] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.517269] page dumped because: kasan: bad access detected
[   75.518064] 
[   75.518356] Memory state around the buggy address:
[   75.519004]  ffff0000c5a46200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.519921]  ffff0000c5a46280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.520906] >ffff0000c5a46300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.521954]                                                                 ^
[   75.522824]  ffff0000c5a46380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.523739]  ffff0000c5a46400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.524637] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[   75.450912] ==================================================================
[   75.451633] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xac/0x154
[   75.452673] Write of size 4 at addr ffff0000c5a76875 by task kunit_try_catch/138
[   75.453655] 
[   75.453878] CPU: 0 PID: 138 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.454695] Hardware name: linux,dummy-virt (DT)
[   75.455157] Call trace:
[   75.455392]  dump_backtrace+0xf8/0x118
[   75.455833]  show_stack+0x18/0x24
[   75.456490]  __dump_stack+0x28/0x38
[   75.457018]  dump_stack_lvl+0x54/0x6c
[   75.457641]  print_address_description+0x7c/0x1ec
[   75.458237]  print_report+0x50/0x68
[   75.458695]  kasan_report+0xac/0x100
[   75.459161]  kasan_check_range+0x260/0x2a0
[   75.459646]  memset+0x40/0x70
[   75.460058]  kmalloc_oob_memset_4+0xac/0x154
[   75.460560]  kunit_try_run_case+0x80/0x184
[   75.461157]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.461719]  kthread+0x16c/0x21c
[   75.462164]  ret_from_fork+0x10/0x20
[   75.462598] 
[   75.462847] Allocated by task 138:
[   75.463223]  kasan_set_track+0x4c/0x80
[   75.463725]  kasan_save_alloc_info+0x28/0x34
[   75.464209]  __kasan_kmalloc+0x88/0xa0
[   75.464718]  kmalloc_trace+0x54/0x68
[   75.465174]  kmalloc_oob_memset_4+0x48/0x154
[   75.465649]  kunit_try_run_case+0x80/0x184
[   75.466227]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.466823]  kthread+0x16c/0x21c
[   75.467254]  ret_from_fork+0x10/0x20
[   75.467707] 
[   75.467928] The buggy address belongs to the object at ffff0000c5a76800
[   75.467928]  which belongs to the cache kmalloc-128 of size 128
[   75.468944] The buggy address is located 117 bytes inside of
[   75.468944]  128-byte region [ffff0000c5a76800, ffff0000c5a76880)
[   75.470042] 
[   75.470243] The buggy address belongs to the physical page:
[   75.470714] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76
[   75.471789] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.473172] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.473876] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.474603] page dumped because: kasan: bad access detected
[   75.475165] 
[   75.475472] Memory state around the buggy address:
[   75.476057]  ffff0000c5a76700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.477008]  ffff0000c5a76780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.477606] >ffff0000c5a76800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.478451]                                                                 ^
[   75.479147]  ffff0000c5a76880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.479857]  ffff0000c5a76900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.480527] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[   75.418564] ==================================================================
[   75.419412] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xac/0x154
[   75.420103] Write of size 2 at addr ffff0000c5a76777 by task kunit_try_catch/137
[   75.420649] 
[   75.420898] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.421823] Hardware name: linux,dummy-virt (DT)
[   75.422251] Call trace:
[   75.422515]  dump_backtrace+0xf8/0x118
[   75.423176]  show_stack+0x18/0x24
[   75.423605]  __dump_stack+0x28/0x38
[   75.424072]  dump_stack_lvl+0x54/0x6c
[   75.424497]  print_address_description+0x7c/0x1ec
[   75.425507]  print_report+0x50/0x68
[   75.425958]  kasan_report+0xac/0x100
[   75.426415]  kasan_check_range+0x260/0x2a0
[   75.426904]  memset+0x40/0x70
[   75.427299]  kmalloc_oob_memset_2+0xac/0x154
[   75.427774]  kunit_try_run_case+0x80/0x184
[   75.428243]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.429310]  kthread+0x16c/0x21c
[   75.429778]  ret_from_fork+0x10/0x20
[   75.430219] 
[   75.430408] Allocated by task 137:
[   75.430752]  kasan_set_track+0x4c/0x80
[   75.431234]  kasan_save_alloc_info+0x28/0x34
[   75.431721]  __kasan_kmalloc+0x88/0xa0
[   75.432171]  kmalloc_trace+0x54/0x68
[   75.432629]  kmalloc_oob_memset_2+0x48/0x154
[   75.433140]  kunit_try_run_case+0x80/0x184
[   75.433625]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.434190]  kthread+0x16c/0x21c
[   75.434590]  ret_from_fork+0x10/0x20
[   75.435483] 
[   75.435681] The buggy address belongs to the object at ffff0000c5a76700
[   75.435681]  which belongs to the cache kmalloc-128 of size 128
[   75.436939] The buggy address is located 119 bytes inside of
[   75.436939]  128-byte region [ffff0000c5a76700, ffff0000c5a76780)
[   75.437814] 
[   75.438035] The buggy address belongs to the physical page:
[   75.438514] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76
[   75.439308] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.440006] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.441200] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.441822] page dumped because: kasan: bad access detected
[   75.442289] 
[   75.442499] Memory state around the buggy address:
[   75.442970]  ffff0000c5a76600: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.443608]  ffff0000c5a76680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.444242] >ffff0000c5a76700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.445143]                                                                 ^
[   75.445713]  ffff0000c5a76780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.446357]  ffff0000c5a76800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.446960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[   75.381535] ==================================================================
[   75.382260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xa8/0x150
[   75.382915] Write of size 128 at addr ffff0000c5a47e00 by task kunit_try_catch/136
[   75.384282] 
[   75.384817] CPU: 1 PID: 136 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.385983] Hardware name: linux,dummy-virt (DT)
[   75.386625] Call trace:
[   75.387063]  dump_backtrace+0xf8/0x118
[   75.387751]  show_stack+0x18/0x24
[   75.388367]  __dump_stack+0x28/0x38
[   75.389051]  dump_stack_lvl+0x54/0x6c
[   75.389686]  print_address_description+0x7c/0x1ec
[   75.390452]  print_report+0x50/0x68
[   75.391092]  kasan_report+0xac/0x100
[   75.391725]  kasan_check_range+0x260/0x2a0
[   75.392428]  memset+0x40/0x70
[   75.393126]  kmalloc_oob_in_memset+0xa8/0x150
[   75.393827]  kunit_try_run_case+0x80/0x184
[   75.394297]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.394822]  kthread+0x16c/0x21c
[   75.395330]  ret_from_fork+0x10/0x20
[   75.395814] 
[   75.395997] Allocated by task 136:
[   75.396292]  kasan_set_track+0x4c/0x80
[   75.397058]  kasan_save_alloc_info+0x28/0x34
[   75.397741]  __kasan_kmalloc+0x88/0xa0
[   75.398426]  kmalloc_trace+0x54/0x68
[   75.399064]  kmalloc_oob_in_memset+0x48/0x150
[   75.399782]  kunit_try_run_case+0x80/0x184
[   75.400478]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.401393]  kthread+0x16c/0x21c
[   75.402047]  ret_from_fork+0x10/0x20
[   75.402658] 
[   75.402975] The buggy address belongs to the object at ffff0000c5a47e00
[   75.402975]  which belongs to the cache kmalloc-128 of size 128
[   75.404355] The buggy address is located 0 bytes inside of
[   75.404355]  128-byte region [ffff0000c5a47e00, ffff0000c5a47e80)
[   75.405691] 
[   75.406023] The buggy address belongs to the physical page:
[   75.406626] page:000000003f689bbf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a47
[   75.407363] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.407943] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.408820] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.409867] page dumped because: kasan: bad access detected
[   75.410561] 
[   75.410837] Memory state around the buggy address:
[   75.411382]  ffff0000c5a47d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.411918]  ffff0000c5a47d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.412409] >ffff0000c5a47e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   75.413181]                                                                 ^
[   75.413834]  ffff0000c5a47e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.414425]  ffff0000c5a47f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.415029] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_uaf_16
[   75.343257] ==================================================================
[   75.343987] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x104/0x1ac
[   75.344530] Read of size 16 at addr ffff0000c5a76100 by task kunit_try_catch/135
[   75.345885] 
[   75.346136] CPU: 0 PID: 135 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.346988] Hardware name: linux,dummy-virt (DT)
[   75.347439] Call trace:
[   75.347697]  dump_backtrace+0xf8/0x118
[   75.348213]  show_stack+0x18/0x24
[   75.348795]  __dump_stack+0x28/0x38
[   75.349256]  dump_stack_lvl+0x54/0x6c
[   75.349712]  print_address_description+0x7c/0x1ec
[   75.350251]  print_report+0x50/0x68
[   75.350777]  kasan_report+0xac/0x100
[   75.351296]  kasan_check_range+0x260/0x2a0
[   75.351786]  memcpy+0x48/0x90
[   75.352151]  kmalloc_uaf_16+0x104/0x1ac
[   75.352629]  kunit_try_run_case+0x80/0x184
[   75.353156]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.353778]  kthread+0x16c/0x21c
[   75.354223]  ret_from_fork+0x10/0x20
[   75.354665] 
[   75.354886] Allocated by task 135:
[   75.355220]  kasan_set_track+0x4c/0x80
[   75.355699]  kasan_save_alloc_info+0x28/0x34
[   75.356188]  __kasan_kmalloc+0x88/0xa0
[   75.356886]  kmalloc_trace+0x54/0x68
[   75.357327]  kmalloc_uaf_16+0xa0/0x1ac
[   75.357786]  kunit_try_run_case+0x80/0x184
[   75.358251]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.359125]  kthread+0x16c/0x21c
[   75.359569]  ret_from_fork+0x10/0x20
[   75.360035] 
[   75.360231] Freed by task 135:
[   75.360581]  kasan_set_track+0x4c/0x80
[   75.361297]  kasan_save_free_info+0x3c/0x60
[   75.361781]  ____kasan_slab_free+0xe8/0x140
[   75.362268]  __kasan_slab_free+0x18/0x28
[   75.362723]  __kmem_cache_free+0xdc/0x284
[   75.363194]  kfree+0x60/0x74
[   75.363552]  kmalloc_uaf_16+0xe8/0x1ac
[   75.364012]  kunit_try_run_case+0x80/0x184
[   75.364486]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.365552]  kthread+0x16c/0x21c
[   75.365975]  ret_from_fork+0x10/0x20
[   75.366405] 
[   75.366618] The buggy address belongs to the object at ffff0000c5a76100
[   75.366618]  which belongs to the cache kmalloc-128 of size 128
[   75.367525] The buggy address is located 0 bytes inside of
[   75.367525]  128-byte region [ffff0000c5a76100, ffff0000c5a76180)
[   75.368472] 
[   75.368916] The buggy address belongs to the physical page:
[   75.369418] page:00000000e5b61371 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a76
[   75.370187] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.370984] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.371645] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.372248] page dumped because: kasan: bad access detected
[   75.372713] 
[   75.373102] Memory state around the buggy address:
[   75.373554]  ffff0000c5a76000: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.374176]  ffff0000c5a76080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.375135] >ffff0000c5a76100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.375703]                    ^
[   75.376066]  ffff0000c5a76180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.376950]  ffff0000c5a76200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.377530] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[   75.306674] ==================================================================
[   75.307583] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xfc/0x1ac
[   75.308248] Write of size 16 at addr ffff0000c5a47900 by task kunit_try_catch/134
[   75.309389] 
[   75.309729] CPU: 1 PID: 134 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.311036] Hardware name: linux,dummy-virt (DT)
[   75.311831] Call trace:
[   75.312074]  dump_backtrace+0xf8/0x118
[   75.312507]  show_stack+0x18/0x24
[   75.313434]  __dump_stack+0x28/0x38
[   75.313868]  dump_stack_lvl+0x54/0x6c
[   75.314292]  print_address_description+0x7c/0x1ec
[   75.314840]  print_report+0x50/0x68
[   75.315285]  kasan_report+0xac/0x100
[   75.315762]  kasan_check_range+0x260/0x2a0
[   75.316257]  memcpy+0x60/0x90
[   75.316612]  kmalloc_oob_16+0xfc/0x1ac
[   75.317232]  kunit_try_run_case+0x80/0x184
[   75.317738]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.318308]  kthread+0x16c/0x21c
[   75.318741]  ret_from_fork+0x10/0x20
[   75.319189] 
[   75.319374] Allocated by task 134:
[   75.319723]  kasan_set_track+0x4c/0x80
[   75.320173]  kasan_save_alloc_info+0x28/0x34
[   75.320807]  __kasan_kmalloc+0x88/0xa0
[   75.321279]  kmalloc_trace+0x54/0x68
[   75.321737]  kmalloc_oob_16+0x48/0x1ac
[   75.322207]  kunit_try_run_case+0x80/0x184
[   75.322663]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.323228]  kthread+0x16c/0x21c
[   75.323655]  ret_from_fork+0x10/0x20
[   75.324089] 
[   75.324281] The buggy address belongs to the object at ffff0000c5a47900
[   75.324281]  which belongs to the cache kmalloc-128 of size 128
[   75.325368] The buggy address is located 0 bytes inside of
[   75.325368]  128-byte region [ffff0000c5a47900, ffff0000c5a47980)
[   75.326246] 
[   75.326472] The buggy address belongs to the physical page:
[   75.327418] page:000000003f689bbf refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a47
[   75.328234] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   75.329150] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   75.329814] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.330427] page dumped because: kasan: bad access detected
[   75.330901] 
[   75.331082] Memory state around the buggy address:
[   75.331539]  ffff0000c5a47800: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.332165]  ffff0000c5a47880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.332963] >ffff0000c5a47900: 00 05 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.333560]                       ^
[   75.333942]  ffff0000c5a47980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.334556]  ffff0000c5a47a00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.335151] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-krealloc_uaf
[   75.268508] ==================================================================
[   75.269367] BUG: KASAN: use-after-free in krealloc_uaf+0xd0/0x21c
[   75.270019] Read of size 1 at addr ffff0000c56f1800 by task kunit_try_catch/133
[   75.270646] 
[   75.270870] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.271574] Hardware name: linux,dummy-virt (DT)
[   75.272027] Call trace:
[   75.272302]  dump_backtrace+0xf8/0x118
[   75.273431]  show_stack+0x18/0x24
[   75.273909]  __dump_stack+0x28/0x38
[   75.274358]  dump_stack_lvl+0x54/0x6c
[   75.274790]  print_address_description+0x7c/0x1ec
[   75.275319]  print_report+0x50/0x68
[   75.275763]  kasan_report+0xac/0x100
[   75.276211]  __asan_load1+0x6c/0x70
[   75.276933]  krealloc_uaf+0xd0/0x21c
[   75.277376]  kunit_try_run_case+0x80/0x184
[   75.277893]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.278457]  kthread+0x16c/0x21c
[   75.278874]  ret_from_fork+0x10/0x20
[   75.279305] 
[   75.279498] Allocated by task 133:
[   75.279860]  kasan_set_track+0x4c/0x80
[   75.280329]  kasan_save_alloc_info+0x28/0x34
[   75.281356]  __kasan_kmalloc+0x88/0xa0
[   75.281851]  kmalloc_trace+0x54/0x68
[   75.282286]  krealloc_uaf+0x48/0x21c
[   75.282682]  kunit_try_run_case+0x80/0x184
[   75.283148]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.283708]  kthread+0x16c/0x21c
[   75.284144]  ret_from_fork+0x10/0x20
[   75.284558] 
[   75.285009] Freed by task 133:
[   75.285325]  kasan_set_track+0x4c/0x80
[   75.285799]  kasan_save_free_info+0x3c/0x60
[   75.286313]  ____kasan_slab_free+0xe8/0x140
[   75.286885]  __kasan_slab_free+0x18/0x28
[   75.287388]  __kmem_cache_free+0xdc/0x284
[   75.287842]  kfree+0x60/0x74
[   75.288235]  krealloc_uaf+0x90/0x21c
[   75.288929]  kunit_try_run_case+0x80/0x184
[   75.289415]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.290045]  kthread+0x16c/0x21c
[   75.290453]  ret_from_fork+0x10/0x20
[   75.291160] 
[   75.291352] The buggy address belongs to the object at ffff0000c56f1800
[   75.291352]  which belongs to the cache kmalloc-256 of size 256
[   75.292324] The buggy address is located 0 bytes inside of
[   75.292324]  256-byte region [ffff0000c56f1800, ffff0000c56f1900)
[   75.293456] 
[   75.293690] The buggy address belongs to the physical page:
[   75.294166] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   75.294961] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   75.295596] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.296320] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   75.297459] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.298090] page dumped because: kasan: bad access detected
[   75.298563] 
[   75.298767] Memory state around the buggy address:
[   75.299199]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.299834]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.300463] >ffff0000c56f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.301299]                    ^
[   75.301658]  ffff0000c56f1880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.302284]  ffff0000c56f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.302894] ==================================================================
[   75.232336] ==================================================================
[   75.233840] BUG: KASAN: use-after-free in krealloc_uaf+0xac/0x21c
[   75.234437] Read of size 1 at addr ffff0000c56f1800 by task kunit_try_catch/133
[   75.235077] 
[   75.235302] CPU: 0 PID: 133 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.236034] Hardware name: linux,dummy-virt (DT)
[   75.236495] Call trace:
[   75.236774]  dump_backtrace+0xf8/0x118
[   75.237291]  show_stack+0x18/0x24
[   75.237723]  __dump_stack+0x28/0x38
[   75.238149]  dump_stack_lvl+0x54/0x6c
[   75.238565]  print_address_description+0x7c/0x1ec
[   75.239406]  print_report+0x50/0x68
[   75.239889]  kasan_report+0xac/0x100
[   75.240332]  __kasan_check_byte+0x3c/0x54
[   75.241327]  krealloc+0x54/0x270
[   75.241773]  krealloc_uaf+0xac/0x21c
[   75.242217]  kunit_try_run_case+0x80/0x184
[   75.242671]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.243242]  kthread+0x16c/0x21c
[   75.243686]  ret_from_fork+0x10/0x20
[   75.244114] 
[   75.244329] Allocated by task 133:
[   75.244654]  kasan_set_track+0x4c/0x80
[   75.245177]  kasan_save_alloc_info+0x28/0x34
[   75.245620]  __kasan_kmalloc+0x88/0xa0
[   75.246078]  kmalloc_trace+0x54/0x68
[   75.246518]  krealloc_uaf+0x48/0x21c
[   75.247206]  kunit_try_run_case+0x80/0x184
[   75.247666]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.248243]  kthread+0x16c/0x21c
[   75.249126]  ret_from_fork+0x10/0x20
[   75.249547] 
[   75.249786] Freed by task 133:
[   75.250125]  kasan_set_track+0x4c/0x80
[   75.250558]  kasan_save_free_info+0x3c/0x60
[   75.251053]  ____kasan_slab_free+0xe8/0x140
[   75.251536]  __kasan_slab_free+0x18/0x28
[   75.252048]  __kmem_cache_free+0xdc/0x284
[   75.252539]  kfree+0x60/0x74
[   75.252947]  krealloc_uaf+0x90/0x21c
[   75.253399]  kunit_try_run_case+0x80/0x184
[   75.253872]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.254427]  kthread+0x16c/0x21c
[   75.255110]  ret_from_fork+0x10/0x20
[   75.255568] 
[   75.255780] The buggy address belongs to the object at ffff0000c56f1800
[   75.255780]  which belongs to the cache kmalloc-256 of size 256
[   75.256720] The buggy address is located 0 bytes inside of
[   75.256720]  256-byte region [ffff0000c56f1800, ffff0000c56f1900)
[   75.258083] 
[   75.258280] The buggy address belongs to the physical page:
[   75.258708] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   75.259551] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   75.260239] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.261147] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   75.261844] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.262432] page dumped because: kasan: bad access detected
[   75.262917] 
[   75.263104] Memory state around the buggy address:
[   75.263538]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.264190]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.264890] >ffff0000c56f1800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.265483]                    ^
[   75.265837]  ffff0000c56f1880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   75.266472]  ffff0000c56f1900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.267497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[   75.141585] ==================================================================
[   75.142449] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[   75.143460] Write of size 1 at addr ffff0000c5a260d0 by task kunit_try_catch/132
[   75.144319] 
[   75.144514] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.145824] Hardware name: linux,dummy-virt (DT)
[   75.146439] Call trace:
[   75.146823]  dump_backtrace+0xf8/0x118
[   75.147454]  show_stack+0x18/0x24
[   75.147939]  __dump_stack+0x28/0x38
[   75.148322]  dump_stack_lvl+0x54/0x6c
[   75.149031]  print_address_description+0x7c/0x1ec
[   75.149793]  print_report+0x50/0x68
[   75.150400]  kasan_report+0xac/0x100
[   75.151016]  __asan_store1+0x6c/0x70
[   75.151622]  krealloc_less_oob_helper+0x158/0x4b8
[   75.152339]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.153233]  kunit_try_run_case+0x80/0x184
[   75.153911]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.154705]  kthread+0x16c/0x21c
[   75.155240]  ret_from_fork+0x10/0x20
[   75.155617] 
[   75.155812] The buggy address belongs to the physical page:
[   75.156296] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.157256] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.157883] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.158564] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.159262] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.159858] page dumped because: kasan: bad access detected
[   75.160305] 
[   75.160521] Memory state around the buggy address:
[   75.160954]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.161570]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.162228] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.162977]                                                  ^
[   75.163509]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.164150]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.165285] ==================================================================
[   74.907949] ==================================================================
[   74.908812] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[   74.909829] Write of size 1 at addr ffff0000c56f16c9 by task kunit_try_catch/130
[   74.910500] 
[   74.910856] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.911931] Hardware name: linux,dummy-virt (DT)
[   74.912556] Call trace:
[   74.913033]  dump_backtrace+0xf8/0x118
[   74.913774]  show_stack+0x18/0x24
[   74.914398]  __dump_stack+0x28/0x38
[   74.915018]  dump_stack_lvl+0x54/0x6c
[   74.915481]  print_address_description+0x7c/0x1ec
[   74.916252]  print_report+0x50/0x68
[   74.916979]  kasan_report+0xac/0x100
[   74.917651]  __asan_store1+0x6c/0x70
[   74.918322]  krealloc_less_oob_helper+0x104/0x4b8
[   74.919068]  krealloc_less_oob+0x18/0x24
[   74.919701]  kunit_try_run_case+0x80/0x184
[   74.920362]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.921263]  kthread+0x16c/0x21c
[   74.922059]  ret_from_fork+0x10/0x20
[   74.922750] 
[   74.923151] Allocated by task 130:
[   74.923689]  kasan_set_track+0x4c/0x80
[   74.924384]  kasan_save_alloc_info+0x28/0x34
[   74.925139]  __kasan_krealloc+0xcc/0xf8
[   74.925884]  krealloc+0x150/0x270
[   74.926296]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.926739]  krealloc_less_oob+0x18/0x24
[   74.927173]  kunit_try_run_case+0x80/0x184
[   74.927587]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.928401]  kthread+0x16c/0x21c
[   74.929461]  ret_from_fork+0x10/0x20
[   74.930056] 
[   74.930327] The buggy address belongs to the object at ffff0000c56f1600
[   74.930327]  which belongs to the cache kmalloc-256 of size 256
[   74.931710] The buggy address is located 201 bytes inside of
[   74.931710]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   74.933204] 
[   74.933400] The buggy address belongs to the physical page:
[   74.933784] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.934719] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.935365] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.936067] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.936735] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.937384] page dumped because: kasan: bad access detected
[   74.937845] 
[   74.938037] Memory state around the buggy address:
[   74.938441]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.939445]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.940147] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.940735]                                               ^
[   74.941280]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.941932]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.942848] ==================================================================
[   75.114913] ==================================================================
[   75.115663] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x104/0x4b8
[   75.117179] Write of size 1 at addr ffff0000c5a260c9 by task kunit_try_catch/132
[   75.118273] 
[   75.118567] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.119647] Hardware name: linux,dummy-virt (DT)
[   75.120295] Call trace:
[   75.120780]  dump_backtrace+0xf8/0x118
[   75.121484]  show_stack+0x18/0x24
[   75.122122]  __dump_stack+0x28/0x38
[   75.122711]  dump_stack_lvl+0x54/0x6c
[   75.123105]  print_address_description+0x7c/0x1ec
[   75.123576]  print_report+0x50/0x68
[   75.124113]  kasan_report+0xac/0x100
[   75.124703]  __asan_store1+0x6c/0x70
[   75.125268]  krealloc_less_oob_helper+0x104/0x4b8
[   75.125827]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.126356]  kunit_try_run_case+0x80/0x184
[   75.126862]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.127415]  kthread+0x16c/0x21c
[   75.127857]  ret_from_fork+0x10/0x20
[   75.128294] 
[   75.128489] The buggy address belongs to the physical page:
[   75.129098] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.130222] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.131119] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.132051] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.133125] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.134025] page dumped because: kasan: bad access detected
[   75.134695] 
[   75.134975] Memory state around the buggy address:
[   75.135412]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.136022]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.136977] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.138225]                                               ^
[   75.138965]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.139869]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.140531] ==================================================================
[   75.035662] ==================================================================
[   75.036215] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[   75.037336] Write of size 1 at addr ffff0000c56f16eb by task kunit_try_catch/130
[   75.037991] 
[   75.038209] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.038938] Hardware name: linux,dummy-virt (DT)
[   75.039380] Call trace:
[   75.039650]  dump_backtrace+0xf8/0x118
[   75.040119]  show_stack+0x18/0x24
[   75.040557]  __dump_stack+0x28/0x38
[   75.041446]  dump_stack_lvl+0x54/0x6c
[   75.041897]  print_address_description+0x7c/0x1ec
[   75.042419]  print_report+0x50/0x68
[   75.042868]  kasan_report+0xac/0x100
[   75.043301]  __asan_store1+0x6c/0x70
[   75.043743]  krealloc_less_oob_helper+0x260/0x4b8
[   75.044288]  krealloc_less_oob+0x18/0x24
[   75.045023]  kunit_try_run_case+0x80/0x184
[   75.045510]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.046130]  kthread+0x16c/0x21c
[   75.046533]  ret_from_fork+0x10/0x20
[   75.046959] 
[   75.047144] Allocated by task 130:
[   75.047478]  kasan_set_track+0x4c/0x80
[   75.047946]  kasan_save_alloc_info+0x28/0x34
[   75.048446]  __kasan_krealloc+0xcc/0xf8
[   75.048939]  krealloc+0x150/0x270
[   75.049355]  krealloc_less_oob_helper+0x9c/0x4b8
[   75.049860]  krealloc_less_oob+0x18/0x24
[   75.050329]  kunit_try_run_case+0x80/0x184
[   75.051281]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.051878]  kthread+0x16c/0x21c
[   75.052291]  ret_from_fork+0x10/0x20
[   75.053007] 
[   75.053227] The buggy address belongs to the object at ffff0000c56f1600
[   75.053227]  which belongs to the cache kmalloc-256 of size 256
[   75.054145] The buggy address is located 235 bytes inside of
[   75.054145]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   75.055043] 
[   75.055262] The buggy address belongs to the physical page:
[   75.055731] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   75.056526] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   75.057616] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.058329] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   75.059030] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.059647] page dumped because: kasan: bad access detected
[   75.060119] 
[   75.060306] Memory state around the buggy address:
[   75.061059]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.061660]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.062253] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   75.062857]                                                           ^
[   75.063434]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.064064]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.065146] ==================================================================
[   75.165986] ==================================================================
[   75.166536] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[   75.167318] Write of size 1 at addr ffff0000c5a260da by task kunit_try_catch/132
[   75.167970] 
[   75.168189] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.169115] Hardware name: linux,dummy-virt (DT)
[   75.169558] Call trace:
[   75.169851]  dump_backtrace+0xf8/0x118
[   75.170379]  show_stack+0x18/0x24
[   75.170821]  __dump_stack+0x28/0x38
[   75.171246]  dump_stack_lvl+0x54/0x6c
[   75.171677]  print_address_description+0x7c/0x1ec
[   75.172227]  print_report+0x50/0x68
[   75.172844]  kasan_report+0xac/0x100
[   75.173301]  __asan_store1+0x6c/0x70
[   75.173736]  krealloc_less_oob_helper+0x1c4/0x4b8
[   75.174255]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.174752]  kunit_try_run_case+0x80/0x184
[   75.175222]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.175798]  kthread+0x16c/0x21c
[   75.176244]  ret_from_fork+0x10/0x20
[   75.176803] 
[   75.177039] The buggy address belongs to the physical page:
[   75.177510] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.178295] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.178963] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.179645] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.180304] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.181047] page dumped because: kasan: bad access detected
[   75.181651] 
[   75.181867] Memory state around the buggy address:
[   75.182262]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.182902]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.183557] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.184142]                                                     ^
[   75.185225]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.185822]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.186444] ==================================================================
[   75.005533] ==================================================================
[   75.006060] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[   75.006891] Write of size 1 at addr ffff0000c56f16ea by task kunit_try_catch/130
[   75.007516] 
[   75.007732] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.008469] Hardware name: linux,dummy-virt (DT)
[   75.009062] Call trace:
[   75.009350]  dump_backtrace+0xf8/0x118
[   75.009816]  show_stack+0x18/0x24
[   75.010244]  __dump_stack+0x28/0x38
[   75.010671]  dump_stack_lvl+0x54/0x6c
[   75.011491]  print_address_description+0x7c/0x1ec
[   75.012032]  print_report+0x50/0x68
[   75.012473]  kasan_report+0xac/0x100
[   75.013166]  __asan_store1+0x6c/0x70
[   75.013613]  krealloc_less_oob_helper+0x214/0x4b8
[   75.014167]  krealloc_less_oob+0x18/0x24
[   75.014600]  kunit_try_run_case+0x80/0x184
[   75.015072]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.015623]  kthread+0x16c/0x21c
[   75.016084]  ret_from_fork+0x10/0x20
[   75.016557] 
[   75.017238] Allocated by task 130:
[   75.017586]  kasan_set_track+0x4c/0x80
[   75.018047]  kasan_save_alloc_info+0x28/0x34
[   75.018545]  __kasan_krealloc+0xcc/0xf8
[   75.019002]  krealloc+0x150/0x270
[   75.019424]  krealloc_less_oob_helper+0x9c/0x4b8
[   75.019940]  krealloc_less_oob+0x18/0x24
[   75.020379]  kunit_try_run_case+0x80/0x184
[   75.021113]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.021741]  kthread+0x16c/0x21c
[   75.022195]  ret_from_fork+0x10/0x20
[   75.022637] 
[   75.022849] The buggy address belongs to the object at ffff0000c56f1600
[   75.022849]  which belongs to the cache kmalloc-256 of size 256
[   75.023783] The buggy address is located 234 bytes inside of
[   75.023783]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   75.024667] 
[   75.025367] The buggy address belongs to the physical page:
[   75.025852] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   75.026645] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   75.027290] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   75.027995] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   75.028648] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   75.029289] page dumped because: kasan: bad access detected
[   75.029769] 
[   75.029978] Memory state around the buggy address:
[   75.030405]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.031295]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.031949] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   75.032547]                                                           ^
[   75.033570]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.034253]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.034827] ==================================================================
[   75.187158] ==================================================================
[   75.187671] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x214/0x4b8
[   75.188403] Write of size 1 at addr ffff0000c5a260ea by task kunit_try_catch/132
[   75.189246] 
[   75.189503] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.190222] Hardware name: linux,dummy-virt (DT)
[   75.190608] Call trace:
[   75.190927]  dump_backtrace+0xf8/0x118
[   75.191436]  show_stack+0x18/0x24
[   75.191865]  __dump_stack+0x28/0x38
[   75.192304]  dump_stack_lvl+0x54/0x6c
[   75.192896]  print_address_description+0x7c/0x1ec
[   75.193479]  print_report+0x50/0x68
[   75.193953]  kasan_report+0xac/0x100
[   75.194396]  __asan_store1+0x6c/0x70
[   75.194853]  krealloc_less_oob_helper+0x214/0x4b8
[   75.195360]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.195906]  kunit_try_run_case+0x80/0x184
[   75.196387]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.197097]  kthread+0x16c/0x21c
[   75.197516]  ret_from_fork+0x10/0x20
[   75.197942] 
[   75.198139] The buggy address belongs to the physical page:
[   75.198616] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.199393] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.200023] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.200900] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.201574] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.202176] page dumped because: kasan: bad access detected
[   75.202647] 
[   75.202839] Memory state around the buggy address:
[   75.203309]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.203942]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.204560] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.205649]                                                           ^
[   75.206241]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.206881]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.207427] ==================================================================
[   75.208258] ==================================================================
[   75.208816] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x260/0x4b8
[   75.209543] Write of size 1 at addr ffff0000c5a260eb by task kunit_try_catch/132
[   75.210235] 
[   75.210432] CPU: 1 PID: 132 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.211255] Hardware name: linux,dummy-virt (DT)
[   75.211712] Call trace:
[   75.211997]  dump_backtrace+0xf8/0x118
[   75.212521]  show_stack+0x18/0x24
[   75.213085]  __dump_stack+0x28/0x38
[   75.213498]  dump_stack_lvl+0x54/0x6c
[   75.213925]  print_address_description+0x7c/0x1ec
[   75.214444]  print_report+0x50/0x68
[   75.214913]  kasan_report+0xac/0x100
[   75.215384]  __asan_store1+0x6c/0x70
[   75.215834]  krealloc_less_oob_helper+0x260/0x4b8
[   75.216355]  krealloc_pagealloc_less_oob+0x18/0x24
[   75.217002]  kunit_try_run_case+0x80/0x184
[   75.217477]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.218058]  kthread+0x16c/0x21c
[   75.218463]  ret_from_fork+0x10/0x20
[   75.218911] 
[   75.219105] The buggy address belongs to the physical page:
[   75.219563] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.220377] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.221240] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.221943] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.222627] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.223217] page dumped because: kasan: bad access detected
[   75.223663] 
[   75.223892] Memory state around the buggy address:
[   75.224308]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.225494]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.226117] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   75.226700]                                                           ^
[   75.227262]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.227870]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.228459] ==================================================================
[   74.943949] ==================================================================
[   74.944470] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x158/0x4b8
[   74.945214] Write of size 1 at addr ffff0000c56f16d0 by task kunit_try_catch/130
[   74.946372] 
[   74.946605] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.947346] Hardware name: linux,dummy-virt (DT)
[   74.947802] Call trace:
[   74.948109]  dump_backtrace+0xf8/0x118
[   74.948594]  show_stack+0x18/0x24
[   74.949046]  __dump_stack+0x28/0x38
[   74.949753]  dump_stack_lvl+0x54/0x6c
[   74.950215]  print_address_description+0x7c/0x1ec
[   74.950773]  print_report+0x50/0x68
[   74.951230]  kasan_report+0xac/0x100
[   74.951691]  __asan_store1+0x6c/0x70
[   74.952162]  krealloc_less_oob_helper+0x158/0x4b8
[   74.952840]  krealloc_less_oob+0x18/0x24
[   74.953282]  kunit_try_run_case+0x80/0x184
[   74.954187]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.954780]  kthread+0x16c/0x21c
[   74.955209]  ret_from_fork+0x10/0x20
[   74.955639] 
[   74.955872] Allocated by task 130:
[   74.956248]  kasan_set_track+0x4c/0x80
[   74.956881]  kasan_save_alloc_info+0x28/0x34
[   74.957329]  __kasan_krealloc+0xcc/0xf8
[   74.958026]  krealloc+0x150/0x270
[   74.958485]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.959008]  krealloc_less_oob+0x18/0x24
[   74.959461]  kunit_try_run_case+0x80/0x184
[   74.960007]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.960594]  kthread+0x16c/0x21c
[   74.961511]  ret_from_fork+0x10/0x20
[   74.961968] 
[   74.962178] The buggy address belongs to the object at ffff0000c56f1600
[   74.962178]  which belongs to the cache kmalloc-256 of size 256
[   74.963156] The buggy address is located 208 bytes inside of
[   74.963156]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   74.964115] 
[   74.964377] The buggy address belongs to the physical page:
[   74.965118] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.965890] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.966527] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.967255] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.967948] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.968618] page dumped because: kasan: bad access detected
[   74.969119] 
[   74.969306] Memory state around the buggy address:
[   74.969745]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.970381]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.971516] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   74.972123]                                                  ^
[   74.972902]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.973517]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.974165] ==================================================================
[   74.974973] ==================================================================
[   74.975510] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x1c4/0x4b8
[   74.976300] Write of size 1 at addr ffff0000c56f16da by task kunit_try_catch/130
[   74.977395] 
[   74.977624] CPU: 0 PID: 130 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.978409] Hardware name: linux,dummy-virt (DT)
[   74.978839] Call trace:
[   74.979115]  dump_backtrace+0xf8/0x118
[   74.979569]  show_stack+0x18/0x24
[   74.980022]  __dump_stack+0x28/0x38
[   74.980433]  dump_stack_lvl+0x54/0x6c
[   74.980901]  print_address_description+0x7c/0x1ec
[   74.981422]  print_report+0x50/0x68
[   74.981869]  kasan_report+0xac/0x100
[   74.982301]  __asan_store1+0x6c/0x70
[   74.982734]  krealloc_less_oob_helper+0x1c4/0x4b8
[   74.983525]  krealloc_less_oob+0x18/0x24
[   74.984022]  kunit_try_run_case+0x80/0x184
[   74.984488]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.985538]  kthread+0x16c/0x21c
[   74.986002]  ret_from_fork+0x10/0x20
[   74.986443] 
[   74.986627] Allocated by task 130:
[   74.986986]  kasan_set_track+0x4c/0x80
[   74.987503]  kasan_save_alloc_info+0x28/0x34
[   74.987995]  __kasan_krealloc+0xcc/0xf8
[   74.988505]  krealloc+0x150/0x270
[   74.989166]  krealloc_less_oob_helper+0x9c/0x4b8
[   74.989718]  krealloc_less_oob+0x18/0x24
[   74.990193]  kunit_try_run_case+0x80/0x184
[   74.990685]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.991278]  kthread+0x16c/0x21c
[   74.991673]  ret_from_fork+0x10/0x20
[   74.992113] 
[   74.992308] The buggy address belongs to the object at ffff0000c56f1600
[   74.992308]  which belongs to the cache kmalloc-256 of size 256
[   74.993896] The buggy address is located 218 bytes inside of
[   74.993896]  256-byte region [ffff0000c56f1600, ffff0000c56f1700)
[   74.994791] 
[   74.994982] The buggy address belongs to the physical page:
[   74.995414] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.996266] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.997204] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.997942] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.998582] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.999182] page dumped because: kasan: bad access detected
[   74.999648] 
[   74.999853] Memory state around the buggy address:
[   75.000307]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.001410]  ffff0000c56f1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.002022] >ffff0000c56f1680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   75.002636]                                                     ^
[   75.003178]  ffff0000c56f1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.003837]  ffff0000c56f1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.004434] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[   74.833831] ==================================================================
[   74.834568] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[   74.835176] Write of size 1 at addr ffff0000c56f14eb by task kunit_try_catch/129
[   74.835676] 
[   74.835936] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.837076] Hardware name: linux,dummy-virt (DT)
[   74.837829] Call trace:
[   74.838212]  dump_backtrace+0xf8/0x118
[   74.838651]  show_stack+0x18/0x24
[   74.839056]  __dump_stack+0x28/0x38
[   74.839763]  dump_stack_lvl+0x54/0x6c
[   74.840196]  print_address_description+0x7c/0x1ec
[   74.840715]  print_report+0x50/0x68
[   74.841290]  kasan_report+0xac/0x100
[   74.841830]  __asan_store1+0x6c/0x70
[   74.842332]  krealloc_more_oob_helper+0x12c/0x2a4
[   74.842942]  krealloc_more_oob+0x18/0x24
[   74.843405]  kunit_try_run_case+0x80/0x184
[   74.843891]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.844474]  kthread+0x16c/0x21c
[   74.845181]  ret_from_fork+0x10/0x20
[   74.845616] 
[   74.845854] Allocated by task 129:
[   74.846233]  kasan_set_track+0x4c/0x80
[   74.846717]  kasan_save_alloc_info+0x28/0x34
[   74.847196]  __kasan_krealloc+0xcc/0xf8
[   74.847666]  krealloc+0x150/0x270
[   74.848091]  krealloc_more_oob_helper+0x9c/0x2a4
[   74.848619]  krealloc_more_oob+0x18/0x24
[   74.849159]  kunit_try_run_case+0x80/0x184
[   74.849781]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.850385]  kthread+0x16c/0x21c
[   74.850870]  ret_from_fork+0x10/0x20
[   74.851281] 
[   74.851491] The buggy address belongs to the object at ffff0000c56f1400
[   74.851491]  which belongs to the cache kmalloc-256 of size 256
[   74.852400] The buggy address is located 235 bytes inside of
[   74.852400]  256-byte region [ffff0000c56f1400, ffff0000c56f1500)
[   74.853680] 
[   74.853925] The buggy address belongs to the physical page:
[   74.854382] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.855319] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.855930] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.856908] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.857565] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.858194] page dumped because: kasan: bad access detected
[   74.858668] 
[   74.858883] Memory state around the buggy address:
[   74.859309]  ffff0000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.859959]  ffff0000c56f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.860578] >ffff0000c56f1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   74.861425]                                                           ^
[   74.861979]  ffff0000c56f1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.862612]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.863215] ==================================================================
[   74.866155] ==================================================================
[   74.866911] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[   74.867510] Write of size 1 at addr ffff0000c56f14f0 by task kunit_try_catch/129
[   74.868365] 
[   74.869002] CPU: 0 PID: 129 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.869980] Hardware name: linux,dummy-virt (DT)
[   74.870336] Call trace:
[   74.870569]  dump_backtrace+0xf8/0x118
[   74.871008]  show_stack+0x18/0x24
[   74.871399]  __dump_stack+0x28/0x38
[   74.871788]  dump_stack_lvl+0x54/0x6c
[   74.872780]  print_address_description+0x7c/0x1ec
[   74.873636]  print_report+0x50/0x68
[   74.874293]  kasan_report+0xac/0x100
[   74.874968]  __asan_store1+0x6c/0x70
[   74.875603]  krealloc_more_oob_helper+0x17c/0x2a4
[   74.876351]  krealloc_more_oob+0x18/0x24
[   74.877090]  kunit_try_run_case+0x80/0x184
[   74.877912]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.878731]  kthread+0x16c/0x21c
[   74.879324]  ret_from_fork+0x10/0x20
[   74.879930] 
[   74.880235] Allocated by task 129:
[   74.880791]  kasan_set_track+0x4c/0x80
[   74.881496]  kasan_save_alloc_info+0x28/0x34
[   74.882170]  __kasan_krealloc+0xcc/0xf8
[   74.882836]  krealloc+0x150/0x270
[   74.883409]  krealloc_more_oob_helper+0x9c/0x2a4
[   74.884149]  krealloc_more_oob+0x18/0x24
[   74.884860]  kunit_try_run_case+0x80/0x184
[   74.885632]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.886459]  kthread+0x16c/0x21c
[   74.887047]  ret_from_fork+0x10/0x20
[   74.887641] 
[   74.887938] The buggy address belongs to the object at ffff0000c56f1400
[   74.887938]  which belongs to the cache kmalloc-256 of size 256
[   74.889612] The buggy address is located 240 bytes inside of
[   74.889612]  256-byte region [ffff0000c56f1400, ffff0000c56f1500)
[   74.891430] 
[   74.891873] The buggy address belongs to the physical page:
[   74.892463] page:00000000b1c7ebef refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f0
[   74.893715] head:00000000b1c7ebef order:1 compound_mapcount:0 compound_pincount:0
[   74.894835] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.895839] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002480
[   74.897232] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.897717] page dumped because: kasan: bad access detected
[   74.898203] 
[   74.898451] Memory state around the buggy address:
[   74.898969]  ffff0000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.899618]  ffff0000c56f1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.900223] >ffff0000c56f1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   74.901076]                                                              ^
[   74.901662]  ffff0000c56f1500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.902284]  ffff0000c56f1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.902869] ==================================================================
[   75.069551] ==================================================================
[   75.070411] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x12c/0x2a4
[   75.071144] Write of size 1 at addr ffff0000c5a260eb by task kunit_try_catch/131
[   75.071791] 
[   75.071995] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.072683] Hardware name: linux,dummy-virt (DT)
[   75.073232] Call trace:
[   75.073517]  dump_backtrace+0xf8/0x118
[   75.074407]  show_stack+0x18/0x24
[   75.074853]  __dump_stack+0x28/0x38
[   75.075285]  dump_stack_lvl+0x54/0x6c
[   75.075703]  print_address_description+0x7c/0x1ec
[   75.076251]  print_report+0x50/0x68
[   75.077156]  kasan_report+0xac/0x100
[   75.077648]  __asan_store1+0x6c/0x70
[   75.078110]  krealloc_more_oob_helper+0x12c/0x2a4
[   75.078636]  krealloc_pagealloc_more_oob+0x18/0x24
[   75.079159]  kunit_try_run_case+0x80/0x184
[   75.079632]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.080218]  kthread+0x16c/0x21c
[   75.080777]  ret_from_fork+0x10/0x20
[   75.081205] 
[   75.081399] The buggy address belongs to the physical page:
[   75.081882] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.082648] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.083264] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.083953] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.084632] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.085251] page dumped because: kasan: bad access detected
[   75.085712] 
[   75.085919] Memory state around the buggy address:
[   75.086392]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.087179]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.087808] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   75.088401]                                                           ^
[   75.089038]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.089803]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.090384] ==================================================================
[   75.091254] ==================================================================
[   75.091799] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x17c/0x2a4
[   75.092527] Write of size 1 at addr ffff0000c5a260f0 by task kunit_try_catch/131
[   75.093597] 
[   75.093841] CPU: 1 PID: 131 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   75.094546] Hardware name: linux,dummy-virt (DT)
[   75.094986] Call trace:
[   75.095254]  dump_backtrace+0xf8/0x118
[   75.095707]  show_stack+0x18/0x24
[   75.096135]  __dump_stack+0x28/0x38
[   75.096585]  dump_stack_lvl+0x54/0x6c
[   75.097047]  print_address_description+0x7c/0x1ec
[   75.097569]  print_report+0x50/0x68
[   75.098046]  kasan_report+0xac/0x100
[   75.098519]  __asan_store1+0x6c/0x70
[   75.099185]  krealloc_more_oob_helper+0x17c/0x2a4
[   75.099701]  krealloc_pagealloc_more_oob+0x18/0x24
[   75.100211]  kunit_try_run_case+0x80/0x184
[   75.100842]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   75.101419]  kthread+0x16c/0x21c
[   75.101844]  ret_from_fork+0x10/0x20
[   75.102247] 
[   75.102461] The buggy address belongs to the physical page:
[   75.102937] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   75.103661] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   75.104307] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   75.105179] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   75.105877] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   75.106505] page dumped because: kasan: bad access detected
[   75.106986] 
[   75.107167] Memory state around the buggy address:
[   75.107606]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.108243]  ffff0000c5a26000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   75.109110] >ffff0000c5a26080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   75.109717]                                                              ^
[   75.110246]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.110895]  ffff0000c5a26180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   75.111514] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[   74.795207] ==================================================================
[   74.795920] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xa0/0x14c
[   74.796505] Write of size 1 at addr ffff0000c4085f00 by task kunit_try_catch/128
[   74.797712] 
[   74.798035] CPU: 1 PID: 128 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.799088] Hardware name: linux,dummy-virt (DT)
[   74.799678] Call trace:
[   74.800059]  dump_backtrace+0xf8/0x118
[   74.800765]  show_stack+0x18/0x24
[   74.801457]  __dump_stack+0x28/0x38
[   74.802039]  dump_stack_lvl+0x54/0x6c
[   74.802630]  print_address_description+0x7c/0x1ec
[   74.803377]  print_report+0x50/0x68
[   74.803993]  kasan_report+0xac/0x100
[   74.804437]  __asan_store1+0x6c/0x70
[   74.805148]  kmalloc_large_oob_right+0xa0/0x14c
[   74.805864]  kunit_try_run_case+0x80/0x184
[   74.806511]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.807311]  kthread+0x16c/0x21c
[   74.807804]  ret_from_fork+0x10/0x20
[   74.808180] 
[   74.808367] Allocated by task 128:
[   74.808653]  kasan_set_track+0x4c/0x80
[   74.809453]  kasan_save_alloc_info+0x28/0x34
[   74.810116]  __kasan_kmalloc+0x88/0xa0
[   74.810742]  kmalloc_trace+0x54/0x68
[   74.811335]  kmalloc_large_oob_right+0x48/0x14c
[   74.812027]  kunit_try_run_case+0x80/0x184
[   74.812724]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.813540]  kthread+0x16c/0x21c
[   74.814117]  ret_from_fork+0x10/0x20
[   74.814694] 
[   74.814972] The buggy address belongs to the object at ffff0000c4084000
[   74.814972]  which belongs to the cache kmalloc-8k of size 8192
[   74.816354] The buggy address is located 7936 bytes inside of
[   74.816354]  8192-byte region [ffff0000c4084000, ffff0000c4086000)
[   74.817971] 
[   74.818289] The buggy address belongs to the physical page:
[   74.819054] page:000000002acc5e88 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104080
[   74.819781] head:000000002acc5e88 order:3 compound_mapcount:0 compound_pincount:0
[   74.820278] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.821134] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002c00
[   74.822130] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   74.823028] page dumped because: kasan: bad access detected
[   74.823694] 
[   74.823972] Memory state around the buggy address:
[   74.824608]  ffff0000c4085e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.825525]  ffff0000c4085e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.826401] >ffff0000c4085f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.827248]                    ^
[   74.827730]  ffff0000c4085f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.828628]  ffff0000c4086000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.829578] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-pagealloc_uaf
[   74.771656] ==================================================================
[   74.772849] BUG: KASAN: use-after-free in pagealloc_uaf+0x90/0x134
[   74.773613] Read of size 1 at addr ffff0000c5a80000 by task kunit_try_catch/127
[   74.774359] 
[   74.774638] CPU: 0 PID: 127 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.775365] Hardware name: linux,dummy-virt (DT)
[   74.775830] Call trace:
[   74.776124]  dump_backtrace+0xf8/0x118
[   74.776694]  show_stack+0x18/0x24
[   74.777261]  __dump_stack+0x28/0x38
[   74.777733]  dump_stack_lvl+0x54/0x6c
[   74.778229]  print_address_description+0x7c/0x1ec
[   74.778835]  print_report+0x50/0x68
[   74.779344]  kasan_report+0xac/0x100
[   74.779872]  __asan_load1+0x6c/0x70
[   74.780393]  pagealloc_uaf+0x90/0x134
[   74.780964]  kunit_try_run_case+0x80/0x184
[   74.781438]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.782044]  kthread+0x16c/0x21c
[   74.782545]  ret_from_fork+0x10/0x20
[   74.783014] 
[   74.783256] The buggy address belongs to the physical page:
[   74.783796] page:000000003f79304c refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x105a80
[   74.784670] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   74.785552] raw: 0bfffc0000000000 ffff0000ff7f4ad8 ffff0000ff7f4ad8 0000000000000000
[   74.786332] raw: 0000000000000000 0000000000000007 00000000ffffff7f 0000000000000000
[   74.786947] page dumped because: kasan: bad access detected
[   74.787382] 
[   74.787574] Memory state around the buggy address:
[   74.787998]  ffff0000c5a7ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.788700]  ffff0000c5a7ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.789479] >ffff0000c5a80000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.790133]                    ^
[   74.790552]  ffff0000c5a80080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.791220]  ffff0000c5a80100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.791861] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[   74.743076] ==================================================================
[   74.744449] BUG: KASAN: invalid-free in kfree+0x70/0x74
[   74.745446] Free of addr ffff0000c5a24001 by task kunit_try_catch/125
[   74.745948] 
[   74.746184] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.746952] Hardware name: linux,dummy-virt (DT)
[   74.747347] Call trace:
[   74.747642]  dump_backtrace+0xf8/0x118
[   74.748165]  show_stack+0x18/0x24
[   74.748611]  __dump_stack+0x28/0x38
[   74.749097]  dump_stack_lvl+0x54/0x6c
[   74.749514]  print_address_description+0x7c/0x1ec
[   74.750044]  print_report+0x50/0x68
[   74.750474]  kasan_report_invalid_free+0x9c/0xe8
[   74.751017]  __kasan_kfree_large+0x68/0x78
[   74.751486]  free_large_kmalloc+0x60/0xe8
[   74.751947]  kfree+0x70/0x74
[   74.752342]  kmalloc_pagealloc_invalid_free+0x80/0x120
[   74.752881]  kunit_try_run_case+0x80/0x184
[   74.753338]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.753920]  kthread+0x16c/0x21c
[   74.754367]  ret_from_fork+0x10/0x20
[   74.754780] 
[   74.755009] The buggy address belongs to the physical page:
[   74.755448] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   74.756226] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   74.756862] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.757561] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.758249] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.758875] page dumped because: kasan: bad access detected
[   74.759360] 
[   74.759584] Memory state around the buggy address:
[   74.759996]  ffff0000c5a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.760648]  ffff0000c5a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.761272] >ffff0000c5a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.761872]                    ^
[   74.762208]  ffff0000c5a24080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.762850]  ffff0000c5a24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.763449] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_pagealloc_uaf
[   74.718669] ==================================================================
[   74.719590] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0x88/0x12c
[   74.720338] Read of size 1 at addr ffff0000c5a24000 by task kunit_try_catch/124
[   74.720894] 
[   74.721135] CPU: 1 PID: 124 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.721904] Hardware name: linux,dummy-virt (DT)
[   74.722329] Call trace:
[   74.722604]  dump_backtrace+0xf8/0x118
[   74.723147]  show_stack+0x18/0x24
[   74.723699]  __dump_stack+0x28/0x38
[   74.724143]  dump_stack_lvl+0x54/0x6c
[   74.724622]  print_address_description+0x7c/0x1ec
[   74.725210]  print_report+0x50/0x68
[   74.725697]  kasan_report+0xac/0x100
[   74.726178]  __asan_load1+0x6c/0x70
[   74.726618]  kmalloc_pagealloc_uaf+0x88/0x12c
[   74.727096]  kunit_try_run_case+0x80/0x184
[   74.727588]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.728162]  kthread+0x16c/0x21c
[   74.728606]  ret_from_fork+0x10/0x20
[   74.729074] 
[   74.729301] The buggy address belongs to the physical page:
[   74.729781] page:0000000021e95fe4 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   74.730570] flags: 0xbfffc0000000000(node=0|zone=2|lastcpupid=0xffff)
[   74.731219] raw: 0bfffc0000000000 ffff0000daf62fb8 ffff0000daf62fb8 0000000000000000
[   74.731910] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   74.732493] page dumped because: kasan: bad access detected
[   74.732994] 
[   74.733260] Memory state around the buggy address:
[   74.733697]  ffff0000c5a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.734302]  ffff0000c5a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.734990] >ffff0000c5a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.735841]                    ^
[   74.736330]  ffff0000c5a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.737325]  ffff0000c5a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   74.738307] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_pagealloc_oob_right
[   74.689959] ==================================================================
[   74.690710] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0x84/0x130
[   74.691885] Write of size 1 at addr ffff0000c5a2600a by task kunit_try_catch/123
[   74.693071] 
[   74.693436] CPU: 1 PID: 123 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.694594] Hardware name: linux,dummy-virt (DT)
[   74.695330] Call trace:
[   74.695752]  dump_backtrace+0xf8/0x118
[   74.696398]  show_stack+0x18/0x24
[   74.697064]  __dump_stack+0x28/0x38
[   74.697689]  dump_stack_lvl+0x54/0x6c
[   74.698338]  print_address_description+0x7c/0x1ec
[   74.699113]  print_report+0x50/0x68
[   74.699717]  kasan_report+0xac/0x100
[   74.700286]  __asan_store1+0x6c/0x70
[   74.700736]  kmalloc_pagealloc_oob_right+0x84/0x130
[   74.701674]  kunit_try_run_case+0x80/0x184
[   74.702130]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.702632]  kthread+0x16c/0x21c
[   74.703211]  ret_from_fork+0x10/0x20
[   74.703799] 
[   74.704071] The buggy address belongs to the physical page:
[   74.704895] page:0000000021e95fe4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a24
[   74.706034] head:0000000021e95fe4 order:2 compound_mapcount:0 compound_pincount:0
[   74.706953] flags: 0xbfffc0000010000(head|node=0|zone=2|lastcpupid=0xffff)
[   74.707894] raw: 0bfffc0000010000 0000000000000000 dead000000000122 0000000000000000
[   74.708919] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   74.709955] page dumped because: kasan: bad access detected
[   74.710578] 
[   74.710770] Memory state around the buggy address:
[   74.711125]  ffff0000c5a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.711613]  ffff0000c5a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.712155] >ffff0000c5a26000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.712781]                       ^
[   74.713215]  ffff0000c5a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.713997]  ffff0000c5a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   74.714688] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[   74.658047] ==================================================================
[   74.658874] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xa4/0x15c
[   74.659648] Read of size 1 at addr ffff0000c58cf000 by task kunit_try_catch/122
[   74.660289] 
[   74.660547] CPU: 1 PID: 122 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.661258] Hardware name: linux,dummy-virt (DT)
[   74.661676] Call trace:
[   74.661986]  dump_backtrace+0xf8/0x118
[   74.662459]  show_stack+0x18/0x24
[   74.662884]  __dump_stack+0x28/0x38
[   74.663338]  dump_stack_lvl+0x54/0x6c
[   74.663945]  print_address_description+0x7c/0x1ec
[   74.664498]  print_report+0x50/0x68
[   74.665134]  kasan_report+0xac/0x100
[   74.665571]  __asan_load1+0x6c/0x70
[   74.666021]  kmalloc_node_oob_right+0xa4/0x15c
[   74.666496]  kunit_try_run_case+0x80/0x184
[   74.666961]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.667520]  kthread+0x16c/0x21c
[   74.667947]  ret_from_fork+0x10/0x20
[   74.668365] 
[   74.668564] Allocated by task 122:
[   74.669089]  kasan_set_track+0x4c/0x80
[   74.669596]  kasan_save_alloc_info+0x28/0x34
[   74.670090]  __kasan_kmalloc+0x88/0xa0
[   74.670536]  kmalloc_node_trace+0x4c/0x60
[   74.671028]  kmalloc_node_oob_right+0x4c/0x15c
[   74.671500]  kunit_try_run_case+0x80/0x184
[   74.672002]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.672560]  kthread+0x16c/0x21c
[   74.673171]  ret_from_fork+0x10/0x20
[   74.673626] 
[   74.673843] The buggy address belongs to the object at ffff0000c58ce000
[   74.673843]  which belongs to the cache kmalloc-4k of size 4096
[   74.674789] The buggy address is located 0 bytes to the right of
[   74.674789]  4096-byte region [ffff0000c58ce000, ffff0000c58cf000)
[   74.675722] 
[   74.675937] The buggy address belongs to the physical page:
[   74.676443] page:00000000de932318 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c8
[   74.677839] head:00000000de932318 order:3 compound_mapcount:0 compound_pincount:0
[   74.678442] flags: 0xbfffc0000010200(slab|head|node=0|zone=2|lastcpupid=0xffff)
[   74.679205] raw: 0bfffc0000010200 0000000000000000 dead000000000122 ffff0000c0002a80
[   74.679901] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   74.680528] page dumped because: kasan: bad access detected
[   74.681154] 
[   74.681354] Memory state around the buggy address:
[   74.681792]  ffff0000c58cef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.682432]  ffff0000c58cef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   74.683046] >ffff0000c58cf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.683632]                    ^
[   74.684035]  ffff0000c58cf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.684866]  ffff0000c58cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.685453] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[   74.622957] ==================================================================
[   74.623870] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x9c/0x154
[   74.624600] Read of size 1 at addr ffff0000c59e1dff by task kunit_try_catch/121
[   74.625383] 
[   74.625668] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.626737] Hardware name: linux,dummy-virt (DT)
[   74.627158] Call trace:
[   74.627478]  dump_backtrace+0xf8/0x118
[   74.627992]  show_stack+0x18/0x24
[   74.628475]  __dump_stack+0x28/0x38
[   74.628936]  dump_stack_lvl+0x54/0x6c
[   74.629363]  print_address_description+0x7c/0x1ec
[   74.629933]  print_report+0x50/0x68
[   74.630388]  kasan_report+0xac/0x100
[   74.630841]  __asan_load1+0x6c/0x70
[   74.631318]  kmalloc_oob_left+0x9c/0x154
[   74.631841]  kunit_try_run_case+0x80/0x184
[   74.632440]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.633047]  kthread+0x16c/0x21c
[   74.633790]  ret_from_fork+0x10/0x20
[   74.634235] 
[   74.634444] Allocated by task 1:
[   74.634768]  kasan_set_track+0x4c/0x80
[   74.635281]  kasan_save_alloc_info+0x28/0x34
[   74.635782]  __kasan_kmalloc+0x88/0xa0
[   74.636250]  __kmalloc_node_track_caller+0xc4/0xf0
[   74.636840]  kvasprintf+0xac/0x138
[   74.637430]  __kthread_create_on_node+0x1dc/0x28c
[   74.638018]  kthread_create_on_node+0x8c/0xbc
[   74.638502]  kunit_try_catch_run+0xac/0x314
[   74.638992]  kunit_run_tests+0x2fc/0xa40
[   74.639431]  __kunit_test_suites_init+0x74/0xa8
[   74.639939]  kunit_exec_run_tests+0x64/0x74
[   74.640417]  kunit_run_all_tests+0x88/0x1e0
[   74.640950]  kernel_init_freeable+0x174/0x1ec
[   74.641661]  kernel_init+0x20/0x138
[   74.642098]  ret_from_fork+0x10/0x20
[   74.642490] 
[   74.642696] The buggy address belongs to the object at ffff0000c59e1d00
[   74.642696]  which belongs to the cache kmalloc-128 of size 128
[   74.643601] The buggy address is located 127 bytes to the right of
[   74.643601]  128-byte region [ffff0000c59e1d00, ffff0000c59e1d80)
[   74.644559] 
[   74.644774] The buggy address belongs to the physical page:
[   74.645312] page:000000000015983b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059e1
[   74.646245] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.646951] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.647566] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.648237] page dumped because: kasan: bad access detected
[   74.648711] 
[   74.648936] Memory state around the buggy address:
[   74.649434]  ffff0000c59e1c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.650267]  ffff0000c59e1d00: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.650899] >ffff0000c59e1d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.651518]                                                                 ^
[   74.652109]  ffff0000c59e1e00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.653274]  ffff0000c59e1e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.653892] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[   74.520063] ==================================================================
[   74.520901] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x9c/0x264
[   74.522261] Write of size 1 at addr ffff0000c598a973 by task kunit_try_catch/120
[   74.523270] 
[   74.524001] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G                 N 6.1.146-rc1 #1
[   74.524860] Hardware name: linux,dummy-virt (DT)
[   74.525694] Call trace:
[   74.526030]  dump_backtrace+0xf8/0x118
[   74.526676]  show_stack+0x18/0x24
[   74.527244]  __dump_stack+0x28/0x38
[   74.527700]  dump_stack_lvl+0x54/0x6c
[   74.528205]  print_address_description+0x7c/0x1ec
[   74.528952]  print_report+0x50/0x68
[   74.529406]  kasan_report+0xac/0x100
[   74.529841]  __asan_store1+0x6c/0x70
[   74.530308]  kmalloc_oob_right+0x9c/0x264
[   74.530712]  kunit_try_run_case+0x80/0x184
[   74.531146]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.531637]  kthread+0x16c/0x21c
[   74.532027]  ret_from_fork+0x10/0x20
[   74.532581] 
[   74.532965] Allocated by task 120:
[   74.533450]  kasan_set_track+0x4c/0x80
[   74.533992]  kasan_save_alloc_info+0x28/0x34
[   74.534449]  __kasan_kmalloc+0x88/0xa0
[   74.534996]  kmalloc_trace+0x54/0x68
[   74.535577]  kmalloc_oob_right+0x48/0x264
[   74.536203]  kunit_try_run_case+0x80/0x184
[   74.536911]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.537840]  kthread+0x16c/0x21c
[   74.538414]  ret_from_fork+0x10/0x20
[   74.538869] 
[   74.539108] The buggy address belongs to the object at ffff0000c598a900
[   74.539108]  which belongs to the cache kmalloc-128 of size 128
[   74.539886] The buggy address is located 115 bytes inside of
[   74.539886]  128-byte region [ffff0000c598a900, ffff0000c598a980)
[   74.541421] 
[   74.541833] The buggy address belongs to the physical page:
[   74.542824] page:00000000c3a27766 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   74.544199] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.545980] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.547001] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.547955] page dumped because: kasan: bad access detected
[   74.548696] 
[   74.549153] Memory state around the buggy address:
[   74.549862]  ffff0000c598a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.550398]  ffff0000c598a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.551035] >ffff0000c598a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   74.551932]                                                              ^
[   74.552904]  ffff0000c598a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.553876]  ffff0000c598aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.554770] ==================================================================
[   74.556988] ==================================================================
[   74.557978] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xe8/0x264
[   74.558898] Write of size 1 at addr ffff0000c598a978 by task kunit_try_catch/120
[   74.559796] 
[   74.560074] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.561374] Hardware name: linux,dummy-virt (DT)
[   74.561722] Call trace:
[   74.561967]  dump_backtrace+0xf8/0x118
[   74.562392]  show_stack+0x18/0x24
[   74.562801]  __dump_stack+0x28/0x38
[   74.563367]  dump_stack_lvl+0x54/0x6c
[   74.563960]  print_address_description+0x7c/0x1ec
[   74.564894]  print_report+0x50/0x68
[   74.565521]  kasan_report+0xac/0x100
[   74.566144]  __asan_store1+0x6c/0x70
[   74.566768]  kmalloc_oob_right+0xe8/0x264
[   74.567390]  kunit_try_run_case+0x80/0x184
[   74.568043]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.569029]  kthread+0x16c/0x21c
[   74.569608]  ret_from_fork+0x10/0x20
[   74.570195] 
[   74.570464] Allocated by task 120:
[   74.570942]  kasan_set_track+0x4c/0x80
[   74.571563]  kasan_save_alloc_info+0x28/0x34
[   74.572225]  __kasan_kmalloc+0x88/0xa0
[   74.573042]  kmalloc_trace+0x54/0x68
[   74.573638]  kmalloc_oob_right+0x48/0x264
[   74.574264]  kunit_try_run_case+0x80/0x184
[   74.574899]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.575402]  kthread+0x16c/0x21c
[   74.575786]  ret_from_fork+0x10/0x20
[   74.576158] 
[   74.576342] The buggy address belongs to the object at ffff0000c598a900
[   74.576342]  which belongs to the cache kmalloc-128 of size 128
[   74.578133] The buggy address is located 120 bytes inside of
[   74.578133]  128-byte region [ffff0000c598a900, ffff0000c598a980)
[   74.579037] 
[   74.579223] The buggy address belongs to the physical page:
[   74.579582] page:00000000c3a27766 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   74.580311] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.580947] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.581748] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.582630] page dumped because: kasan: bad access detected
[   74.583137] 
[   74.583316] Memory state around the buggy address:
[   74.583982]  ffff0000c598a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   74.584934]  ffff0000c598a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.585862] >ffff0000c598a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   74.586357]                                                                 ^
[   74.586829]  ffff0000c598a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.587310]  ffff0000c598aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.587784] ==================================================================
[   74.589225] ==================================================================
[   74.590090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x134/0x264
[   74.591017] Read of size 1 at addr ffff0000c598a980 by task kunit_try_catch/120
[   74.591921] 
[   74.592224] CPU: 1 PID: 120 Comm: kunit_try_catch Tainted: G    B            N 6.1.146-rc1 #1
[   74.593377] Hardware name: linux,dummy-virt (DT)
[   74.594008] Call trace:
[   74.594376]  dump_backtrace+0xf8/0x118
[   74.595015]  show_stack+0x18/0x24
[   74.595590]  __dump_stack+0x28/0x38
[   74.596166]  dump_stack_lvl+0x54/0x6c
[   74.596953]  print_address_description+0x7c/0x1ec
[   74.597702]  print_report+0x50/0x68
[   74.598319]  kasan_report+0xac/0x100
[   74.598946]  __asan_load1+0x6c/0x70
[   74.599549]  kmalloc_oob_right+0x134/0x264
[   74.600192]  kunit_try_run_case+0x80/0x184
[   74.601020]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.601882]  kthread+0x16c/0x21c
[   74.602450]  ret_from_fork+0x10/0x20
[   74.602877] 
[   74.603061] Allocated by task 120:
[   74.603347]  kasan_set_track+0x4c/0x80
[   74.603773]  kasan_save_alloc_info+0x28/0x34
[   74.604196]  __kasan_kmalloc+0x88/0xa0
[   74.604714]  kmalloc_trace+0x54/0x68
[   74.605386]  kmalloc_oob_right+0x48/0x264
[   74.605872]  kunit_try_run_case+0x80/0x184
[   74.606349]  kunit_generic_run_threadfn_adapter+0x30/0x4c
[   74.606930]  kthread+0x16c/0x21c
[   74.607342]  ret_from_fork+0x10/0x20
[   74.607774] 
[   74.607970] The buggy address belongs to the object at ffff0000c598a900
[   74.607970]  which belongs to the cache kmalloc-128 of size 128
[   74.609708] The buggy address is located 0 bytes to the right of
[   74.609708]  128-byte region [ffff0000c598a900, ffff0000c598a980)
[   74.610645] 
[   74.610871] The buggy address belongs to the physical page:
[   74.611322] page:00000000c3a27766 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598a
[   74.612149] flags: 0xbfffc0000000200(slab|node=0|zone=2|lastcpupid=0xffff)
[   74.612986] raw: 0bfffc0000000200 0000000000000000 dead000000000122 ffff0000c0002300
[   74.613664] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   74.614267] page dumped because: kasan: bad access detected
[   74.614726] 
[   74.614983] Memory state around the buggy address:
[   74.615420]  ffff0000c598a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.616079]  ffff0000c598a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   74.616929] >ffff0000c598a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.617537]                    ^
[   74.617906]  ffff0000c598aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.618527]  ffff0000c598aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.619145] ==================================================================