Build

Regressions (compared to v6.14-rc3-12-g2408a807bfc3)

qemu-arm64-protected, kvm-unit-tests

qemu-arm64, kselftest-seccomp

qemu-arm64, ltp-fs

qemu-arm64, kselftest-cgroup

Boot Parser (compared to v6.14-rc3-12-g2408a807bfc3)

qemu-arm64, log-parser-boot

Test Parser (compared to v6.14-rc3-12-g2408a807bfc3)

qemu-arm64, log-parser-test

Test log snippets

test log snippet regressions 1

timer-ptimer-busy-loop-interrupt-signal-pending fail

test log snippet regressions 2

seccomp_seccomp_benchmark_native_1_bitmap pass
seccomp_seccomp_benchmark_native_1_filter pass
seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail
seccomp_seccomp_benchmark_1_bitmapped_2_bitmapped pass
seccomp_seccomp_benchmark_entry_1_bitmapped pass
seccomp_seccomp_benchmark_entry_2_bitmapped pass
seccomp_seccomp_benchmark_native_entry_per_filter_4_4_filters_total pass
seccomp_seccomp_benchmark fail

test log snippet regressions 3

seccomp_seccomp_benchmark_per-filter_last_2_diff_per-filter_filters_4 fail

test log snippet regressions 4

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 30670ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 22020ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 32291ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 8007ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 14914ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 12929ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 27748ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 1000ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file6
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file6
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file3
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 6325ms

test log snippet regressions 5

cgroup_test_freezer_test_cgfreezer_ptrace fail
cgroup_test_freezer_test_cgfreezer_ptraced pass

test log snippet boot parser 1

[   24.104330] ==================================================================
[   24.105043] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0
[   24.105910] Free of addr fffb4e7bc5a9dc60 by task kunit_try_catch/180
[   24.107033] 
[   24.108201] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   24.108411] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.108670] Hardware name: linux,dummy-virt (DT)
[   24.108771] Call trace:
[   24.108825]  show_stack+0x20/0x38 (C)
[   24.108941]  dump_stack_lvl+0x8c/0xd0
[   24.109052]  print_report+0x118/0x5e0
[   24.109172]  kasan_report_invalid_free+0xb0/0xd8
[   24.109292]  check_slab_allocation+0xd4/0x108
[   24.109403]  __kasan_slab_pre_free+0x2c/0x48
[   24.109524]  kfree+0xe8/0x3c8
[   24.109628]  kfree_sensitive+0x3c/0xb0
[   24.109756]  kmalloc_double_kzfree+0x168/0x308
[   24.109871]  kunit_try_run_case+0x14c/0x3d0
[   24.109979]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.110102]  kthread+0x318/0x618
[   24.110212]  ret_from_fork+0x10/0x20
[   24.110340] 
[   24.119001] Allocated by task 180:
[   24.119611]  kasan_save_stack+0x3c/0x68
[   24.120307]  kasan_save_track+0x20/0x40
[   24.120952]  kasan_save_alloc_info+0x40/0x58
[   24.121614]  __kasan_kmalloc+0xd4/0xd8
[   24.122268]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.123005]  kmalloc_double_kzfree+0xb8/0x308
[   24.123684]  kunit_try_run_case+0x14c/0x3d0
[   24.124311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.125120]  kthread+0x318/0x618
[   24.125714]  ret_from_fork+0x10/0x20
[   24.126300] 
[   24.126899] Freed by task 180:
[   24.127529]  kasan_save_stack+0x3c/0x68
[   24.128140]  kasan_save_track+0x20/0x40
[   24.128695]  kasan_save_free_info+0x4c/0x78
[   24.129512]  __kasan_slab_free+0x6c/0x98
[   24.130670]  kfree+0x214/0x3c8
[   24.131217]  kfree_sensitive+0x80/0xb0
[   24.131855]  kmalloc_double_kzfree+0x11c/0x308
[   24.132557]  kunit_try_run_case+0x14c/0x3d0
[   24.133224]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.133959]  kthread+0x318/0x618
[   24.134754]  ret_from_fork+0x10/0x20
[   24.135272] 
[   24.135607] The buggy address belongs to the object at fffb4e7bc5a9dc60
[   24.135607]  which belongs to the cache kmalloc-16 of size 16
[   24.136988] The buggy address is located 0 bytes inside of
[   24.136988]  16-byte region [fffb4e7bc5a9dc60, fffb4e7bc5a9dc70)
[   24.138190] 
[   24.138957] The buggy address belongs to the physical page:
[   24.139604] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   24.140477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.141268] page_type: f5(slab)
[   24.141745] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   24.142756] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.143853] page dumped because: kasan: bad access detected
[   24.144501] 
[   24.144838] Memory state around the buggy address:
[   24.145472]  fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[   24.146297]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.147557] >fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.148256]                                                        ^
[   24.149011]  fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.149823]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.150902] ==================================================================

test log snippet boot parser 2

[   26.827605] ==================================================================
[   26.828332] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   26.829229] Read of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[   26.830066] 
[   26.830485] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.830917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.831202] Hardware name: linux,dummy-virt (DT)
[   26.831396] Call trace:
[   26.831479]  show_stack+0x20/0x38 (C)
[   26.831620]  dump_stack_lvl+0x8c/0xd0
[   26.831789]  print_report+0x118/0x5e0
[   26.831918]  kasan_report+0xc8/0x118
[   26.832037]  __asan_report_load8_noabort+0x20/0x30
[   26.832173]  kasan_bitops_modify.constprop.0+0xa28/0xbc8
[   26.832373]  kasan_bitops_generic+0x110/0x1c8
[   26.832495]  kunit_try_run_case+0x14c/0x3d0
[   26.832560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.832627]  kthread+0x318/0x618
[   26.832682]  ret_from_fork+0x10/0x20
[   26.832772] 
[   26.840648] Allocated by task 249:
[   26.841093]  kasan_save_stack+0x3c/0x68
[   26.841815]  kasan_save_track+0x20/0x40
[   26.842386]  kasan_save_alloc_info+0x40/0x58
[   26.843072]  __kasan_kmalloc+0xd4/0xd8
[   26.844113]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.844793]  kasan_bitops_generic+0xa0/0x1c8
[   26.845485]  kunit_try_run_case+0x14c/0x3d0
[   26.846192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.847243]  kthread+0x318/0x618
[   26.847739]  ret_from_fork+0x10/0x20
[   26.848205] 
[   26.848482] The buggy address belongs to the object at fffb4e7bc5a9dc80
[   26.848482]  which belongs to the cache kmalloc-16 of size 16
[   26.849900] The buggy address is located 8 bytes inside of
[   26.849900]  allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[   26.851271] 
[   26.852058] The buggy address belongs to the physical page:
[   26.853329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   26.854341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.855326] page_type: f5(slab)
[   26.855823] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   26.856600] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.857495] page dumped because: kasan: bad access detected
[   26.858143] 
[   26.858629] Memory state around the buggy address:
[   26.859253]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   26.860021]  fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.860987] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.861671]                       ^
[   26.862170]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.863191]  fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.863960] ==================================================================
---
[   26.528082] ==================================================================
[   26.528770] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   26.529599] Read of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[   26.530604] 
[   26.530929] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.531577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.531617] Hardware name: linux,dummy-virt (DT)
[   26.531657] Call trace:
[   26.531686]  show_stack+0x20/0x38 (C)
[   26.531781]  dump_stack_lvl+0x8c/0xd0
[   26.531846]  print_report+0x118/0x5e0
[   26.531903]  kasan_report+0xc8/0x118
[   26.531957]  __asan_report_load8_noabort+0x20/0x30
[   26.532022]  kasan_bitops_modify.constprop.0+0xa4c/0xbc8
[   26.532085]  kasan_bitops_generic+0x110/0x1c8
[   26.532144]  kunit_try_run_case+0x14c/0x3d0
[   26.532205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.532270]  kthread+0x318/0x618
[   26.532327]  ret_from_fork+0x10/0x20
[   26.532389] 
[   26.540225] Allocated by task 249:
[   26.540873]  kasan_save_stack+0x3c/0x68
[   26.541484]  kasan_save_track+0x20/0x40
[   26.542269]  kasan_save_alloc_info+0x40/0x58
[   26.543128]  __kasan_kmalloc+0xd4/0xd8
[   26.543802]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.544497]  kasan_bitops_generic+0xa0/0x1c8
[   26.545143]  kunit_try_run_case+0x14c/0x3d0
[   26.545846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.546645]  kthread+0x318/0x618
[   26.547176]  ret_from_fork+0x10/0x20
[   26.547748] 
[   26.548097] The buggy address belongs to the object at fffb4e7bc5a9dc80
[   26.548097]  which belongs to the cache kmalloc-16 of size 16
[   26.549657] The buggy address is located 8 bytes inside of
[   26.549657]  allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[   26.551051] 
[   26.551644] The buggy address belongs to the physical page:
[   26.552276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   26.553181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.554143] page_type: f5(slab)
[   26.554683] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   26.555665] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.556637] page dumped because: kasan: bad access detected
[   26.557270] 
[   26.557541] Memory state around the buggy address:
[   26.558325]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   26.559546]  fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.560440] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.561259]                       ^
[   26.561727]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.562796]  fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.563759] ==================================================================
---
[   26.715840] ==================================================================
[   26.716590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   26.717497] Read of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[   26.719507] 
[   26.719868] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.720085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.720169] Hardware name: linux,dummy-virt (DT)
[   26.720263] Call trace:
[   26.720328]  show_stack+0x20/0x38 (C)
[   26.720471]  dump_stack_lvl+0x8c/0xd0
[   26.720618]  print_report+0x118/0x5e0
[   26.720754]  kasan_report+0xc8/0x118
[   26.720820]  __asan_report_load8_noabort+0x20/0x30
[   26.720887]  kasan_bitops_modify.constprop.0+0xaf4/0xbc8
[   26.720953]  kasan_bitops_generic+0x110/0x1c8
[   26.721013]  kunit_try_run_case+0x14c/0x3d0
[   26.721074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.721140]  kthread+0x318/0x618
[   26.721197]  ret_from_fork+0x10/0x20
[   26.721259] 
[   26.728248] Allocated by task 249:
[   26.728852]  kasan_save_stack+0x3c/0x68
[   26.729368]  kasan_save_track+0x20/0x40
[   26.729907]  kasan_save_alloc_info+0x40/0x58
[   26.730869]  __kasan_kmalloc+0xd4/0xd8
[   26.731466]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.732007]  kasan_bitops_generic+0xa0/0x1c8
[   26.732644]  kunit_try_run_case+0x14c/0x3d0
[   26.733314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.734056]  kthread+0x318/0x618
[   26.734869]  ret_from_fork+0x10/0x20
[   26.735434] 
[   26.735737] The buggy address belongs to the object at fffb4e7bc5a9dc80
[   26.735737]  which belongs to the cache kmalloc-16 of size 16
[   26.736995] The buggy address is located 8 bytes inside of
[   26.736995]  allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[   26.738287] 
[   26.739267] The buggy address belongs to the physical page:
[   26.739873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   26.740731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.741411] page_type: f5(slab)
[   26.741937] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   26.742897] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.743765] page dumped because: kasan: bad access detected
[   26.744437] 
[   26.745220] Memory state around the buggy address:
[   26.745719]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   26.746992]  fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.747671] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.748449]                       ^
[   26.748981]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.749670]  fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.750536] ==================================================================
---
[   26.601261] ==================================================================
[   26.601909] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   26.603255] Read of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[   26.604038] 
[   26.604418] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.604633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.604733] Hardware name: linux,dummy-virt (DT)
[   26.604821] Call trace:
[   26.604895]  show_stack+0x20/0x38 (C)
[   26.605039]  dump_stack_lvl+0x8c/0xd0
[   26.605179]  print_report+0x118/0x5e0
[   26.605324]  kasan_report+0xc8/0x118
[   26.605425]  __asan_report_load8_noabort+0x20/0x30
[   26.605537]  kasan_bitops_modify.constprop.0+0xa88/0xbc8
[   26.605605]  kasan_bitops_generic+0x110/0x1c8
[   26.605668]  kunit_try_run_case+0x14c/0x3d0
[   26.605754]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.605821]  kthread+0x318/0x618
[   26.605881]  ret_from_fork+0x10/0x20
[   26.605942] 
[   26.614040] Allocated by task 249:
[   26.615195]  kasan_save_stack+0x3c/0x68
[   26.615628]  kasan_save_track+0x20/0x40
[   26.616187]  kasan_save_alloc_info+0x40/0x58
[   26.617093]  __kasan_kmalloc+0xd4/0xd8
[   26.617598]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.618181]  kasan_bitops_generic+0xa0/0x1c8
[   26.619073]  kunit_try_run_case+0x14c/0x3d0
[   26.619784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.620555]  kthread+0x318/0x618
[   26.621186]  ret_from_fork+0x10/0x20
[   26.621828] 
[   26.622283] The buggy address belongs to the object at fffb4e7bc5a9dc80
[   26.622283]  which belongs to the cache kmalloc-16 of size 16
[   26.623581] The buggy address is located 8 bytes inside of
[   26.623581]  allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[   26.625424] 
[   26.625736] The buggy address belongs to the physical page:
[   26.626865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   26.627766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.628607] page_type: f5(slab)
[   26.629095] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   26.630172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.631273] page dumped because: kasan: bad access detected
[   26.632044] 
[   26.632346] Memory state around the buggy address:
[   26.633151]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   26.634113]  fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.635293] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.636094]                       ^
[   26.636521]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.637517]  fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.638312] ==================================================================

test log snippet boot parser 3

[   26.939564] ==================================================================
[   26.940364] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   26.941239] Write of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[   26.941970] 
[   26.942309] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.942738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.942820] Hardware name: linux,dummy-virt (DT)
[   26.942913] Call trace:
[   26.942977]  show_stack+0x20/0x38 (C)
[   26.943119]  dump_stack_lvl+0x8c/0xd0
[   26.943264]  print_report+0x118/0x5e0
[   26.943383]  kasan_report+0xc8/0x118
[   26.943460]  kasan_check_range+0x100/0x1a8
[   26.943520]  __kasan_check_write+0x20/0x30
[   26.943582]  kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc8
[   26.943651]  kasan_bitops_generic+0x11c/0x1c8
[   26.943738]  kunit_try_run_case+0x14c/0x3d0
[   26.943804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.943870]  kthread+0x318/0x618
[   26.943926]  ret_from_fork+0x10/0x20
[   26.943987] 
[   26.952046] Allocated by task 249:
[   26.952543]  kasan_save_stack+0x3c/0x68
[   26.953215]  kasan_save_track+0x20/0x40
[   26.953738]  kasan_save_alloc_info+0x40/0x58
[   26.954293]  __kasan_kmalloc+0xd4/0xd8
[   26.955146]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.955783]  kasan_bitops_generic+0xa0/0x1c8
[   26.956461]  kunit_try_run_case+0x14c/0x3d0
[   26.957180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.957874]  kthread+0x318/0x618
[   26.958218]  ret_from_fork+0x10/0x20
[   26.959196] 
[   26.959919] The buggy address belongs to the object at fffb4e7bc5a9dc80
[   26.959919]  which belongs to the cache kmalloc-16 of size 16
[   26.961039] The buggy address is located 8 bytes inside of
[   26.961039]  allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[   26.962352] 
[   26.962973] The buggy address belongs to the physical page:
[   26.963635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   26.964594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.965394] page_type: f5(slab)
[   26.965938] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   26.967268] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.968109] page dumped because: kasan: bad access detected
[   26.968690] 
[   26.969144] Memory state around the buggy address:
[   26.969781]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   26.970688]  fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.971489] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.972191]                       ^
[   26.972601]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.974013]  fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.975111] ==================================================================
---
[   27.016911] ==================================================================
[   27.017777] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   27.018989] Write of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[   27.019961] 
[   27.020328] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   27.020671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.020762] Hardware name: linux,dummy-virt (DT)
[   27.020842] Call trace:
[   27.020900]  show_stack+0x20/0x38 (C)
[   27.021054]  dump_stack_lvl+0x8c/0xd0
[   27.021224]  print_report+0x118/0x5e0
[   27.021365]  kasan_report+0xc8/0x118
[   27.021459]  kasan_check_range+0x100/0x1a8
[   27.021526]  __kasan_check_write+0x20/0x30
[   27.021587]  kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc8
[   27.021654]  kasan_bitops_generic+0x11c/0x1c8
[   27.021737]  kunit_try_run_case+0x14c/0x3d0
[   27.021804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.021868]  kthread+0x318/0x618
[   27.021924]  ret_from_fork+0x10/0x20
[   27.021984] 
[   27.030971] Allocated by task 249:
[   27.031591]  kasan_save_stack+0x3c/0x68
[   27.032267]  kasan_save_track+0x20/0x40
[   27.032910]  kasan_save_alloc_info+0x40/0x58
[   27.033578]  __kasan_kmalloc+0xd4/0xd8
[   27.034190]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.035020]  kasan_bitops_generic+0xa0/0x1c8
[   27.035696]  kunit_try_run_case+0x14c/0x3d0
[   27.036391]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.037146]  kthread+0x318/0x618
[   27.037747]  ret_from_fork+0x10/0x20
[   27.038343] 
[   27.038961] The buggy address belongs to the object at fffb4e7bc5a9dc80
[   27.038961]  which belongs to the cache kmalloc-16 of size 16
[   27.040070] The buggy address is located 8 bytes inside of
[   27.040070]  allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[   27.041545] 
[   27.041895] The buggy address belongs to the physical page:
[   27.042649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   27.043575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.044475] page_type: f5(slab)
[   27.044958] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   27.045316] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.045652] page dumped because: kasan: bad access detected
[   27.046120] 
[   27.046493] Memory state around the buggy address:
[   27.047555]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   27.048361]  fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.049189] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.049928]                       ^
[   27.050480]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.051536]  fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.052386] ==================================================================
---
[   27.090624] ==================================================================
[   27.091579] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   27.092650] Write of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[   27.093413] 
[   27.093782] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   27.093999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.094080] Hardware name: linux,dummy-virt (DT)
[   27.094177] Call trace:
[   27.094249]  show_stack+0x20/0x38 (C)
[   27.094394]  dump_stack_lvl+0x8c/0xd0
[   27.094542]  print_report+0x118/0x5e0
[   27.094685]  kasan_report+0xc8/0x118
[   27.094785]  kasan_check_range+0x100/0x1a8
[   27.094850]  __kasan_check_write+0x20/0x30
[   27.094912]  kasan_bitops_test_and_modify.constprop.0+0x334/0xbc8
[   27.094982]  kasan_bitops_generic+0x11c/0x1c8
[   27.095043]  kunit_try_run_case+0x14c/0x3d0
[   27.095102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.095166]  kthread+0x318/0x618
[   27.095222]  ret_from_fork+0x10/0x20
[   27.095281] 
[   27.102508] Allocated by task 249:
[   27.102979]  kasan_save_stack+0x3c/0x68
[   27.103671]  kasan_save_track+0x20/0x40
[   27.104345]  kasan_save_alloc_info+0x40/0x58
[   27.105000]  __kasan_kmalloc+0xd4/0xd8
[   27.105480]  __kmalloc_cache_noprof+0x15c/0x3c0
[   27.106245]  kasan_bitops_generic+0xa0/0x1c8
[   27.106954]  kunit_try_run_case+0x14c/0x3d0
[   27.107612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   27.108372]  kthread+0x318/0x618
[   27.108967]  ret_from_fork+0x10/0x20
[   27.109495] 
[   27.109909] The buggy address belongs to the object at fffb4e7bc5a9dc80
[   27.109909]  which belongs to the cache kmalloc-16 of size 16
[   27.111207] The buggy address is located 8 bytes inside of
[   27.111207]  allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[   27.112404] 
[   27.112826] The buggy address belongs to the physical page:
[   27.113574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   27.114506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   27.115308] page_type: f5(slab)
[   27.115834] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   27.116744] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   27.117592] page dumped because: kasan: bad access detected
[   27.118275] 
[   27.118565] Memory state around the buggy address:
[   27.119139]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   27.119944]  fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   27.120726] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.121683]                       ^
[   27.122291]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.123146]  fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.124034] ==================================================================
---
[   26.865468] ==================================================================
[   26.866214] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   26.867613] Write of size 8 at addr fffb4e7bc5a9dc88 by task kunit_try_catch/249
[   26.868414] 
[   26.869612] CPU: 1 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.869836] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.869921] Hardware name: linux,dummy-virt (DT)
[   26.869993] Call trace:
[   26.870026]  show_stack+0x20/0x38 (C)
[   26.870090]  dump_stack_lvl+0x8c/0xd0
[   26.870150]  print_report+0x118/0x5e0
[   26.870209]  kasan_report+0xc8/0x118
[   26.870268]  kasan_check_range+0x100/0x1a8
[   26.870330]  __kasan_check_write+0x20/0x30
[   26.870446]  kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc8
[   26.870596]  kasan_bitops_generic+0x11c/0x1c8
[   26.870744]  kunit_try_run_case+0x14c/0x3d0
[   26.870812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.870879]  kthread+0x318/0x618
[   26.870937]  ret_from_fork+0x10/0x20
[   26.870995] 
[   26.879006] Allocated by task 249:
[   26.879440]  kasan_save_stack+0x3c/0x68
[   26.880102]  kasan_save_track+0x20/0x40
[   26.880597]  kasan_save_alloc_info+0x40/0x58
[   26.881566]  __kasan_kmalloc+0xd4/0xd8
[   26.882137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.883072]  kasan_bitops_generic+0xa0/0x1c8
[   26.883593]  kunit_try_run_case+0x14c/0x3d0
[   26.884277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.885087]  kthread+0x318/0x618
[   26.885564]  ret_from_fork+0x10/0x20
[   26.886197] 
[   26.887012] The buggy address belongs to the object at fffb4e7bc5a9dc80
[   26.887012]  which belongs to the cache kmalloc-16 of size 16
[   26.888437] The buggy address is located 8 bytes inside of
[   26.888437]  allocated 9-byte region [fffb4e7bc5a9dc80, fffb4e7bc5a9dc89)
[   26.889652] 
[   26.890013] The buggy address belongs to the physical page:
[   26.890748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   26.891626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.892370] page_type: f5(slab)
[   26.893185] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   26.894067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.895144] page dumped because: kasan: bad access detected
[   26.895753] 
[   26.896055] Memory state around the buggy address:
[   26.896603]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   26.897425]  fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   26.898270] >fffb4e7bc5a9dc80: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.899156]                       ^
[   26.899603]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.900417]  fffb4e7bc5a9dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.901370] ==================================================================

test log snippet boot parser 4

[   23.493092] ==================================================================
[   23.494128] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8
[   23.494879] Write of size 16 at addr fffb4e7bc5a9dbe0 by task kunit_try_catch/154
[   23.496028] 
[   23.496400] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   23.496501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.496531] Hardware name: linux,dummy-virt (DT)
[   23.496571] Call trace:
[   23.496598]  show_stack+0x20/0x38 (C)
[   23.496664]  dump_stack_lvl+0x8c/0xd0
[   23.496779]  print_report+0x118/0x5e0
[   23.496914]  kasan_report+0xc8/0x118
[   23.497024]  __asan_report_store16_noabort+0x20/0x30
[   23.497092]  kmalloc_oob_16+0x3a0/0x3f8
[   23.497162]  kunit_try_run_case+0x14c/0x3d0
[   23.497342]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.497488]  kthread+0x318/0x618
[   23.497586]  ret_from_fork+0x10/0x20
[   23.497646] 
[   23.505015] Allocated by task 154:
[   23.505583]  kasan_save_stack+0x3c/0x68
[   23.506230]  kasan_save_track+0x20/0x40
[   23.506956]  kasan_save_alloc_info+0x40/0x58
[   23.507825]  __kasan_kmalloc+0xd4/0xd8
[   23.508344]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.509009]  kmalloc_oob_16+0xb4/0x3f8
[   23.509582]  kunit_try_run_case+0x14c/0x3d0
[   23.510171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.511152]  kthread+0x318/0x618
[   23.511722]  ret_from_fork+0x10/0x20
[   23.512192] 
[   23.512482] The buggy address belongs to the object at fffb4e7bc5a9dbe0
[   23.512482]  which belongs to the cache kmalloc-16 of size 16
[   23.513746] The buggy address is located 0 bytes inside of
[   23.513746]  allocated 13-byte region [fffb4e7bc5a9dbe0, fffb4e7bc5a9dbed)
[   23.515248] 
[   23.515600] The buggy address belongs to the physical page:
[   23.516217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   23.517139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.517930] page_type: f5(slab)
[   23.518422] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   23.519752] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.520563] page dumped because: kasan: bad access detected
[   23.521160] 
[   23.521459] Memory state around the buggy address:
[   23.522482]  fffb4e7bc5a9da80: fa fb fc fc 00 04 fc fc 00 04 fc fc fa fb fc fc
[   23.523350]  fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[   23.524099] >fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc 00 05 fc fc
[   23.525101]                                                           ^
[   23.525635]  fffb4e7bc5a9dc00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.526397]  fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.527298] ==================================================================

test log snippet boot parser 5

[   22.420852] ==================================================================
[   22.421974] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320
[   22.423020] Read of size 1 at addr fffb4e7bc6224e3f by task kunit_try_catch/126
[   22.424309] 
[   22.424741] CPU: 0 UID: 0 PID: 126 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   22.424985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.425059] Hardware name: linux,dummy-virt (DT)
[   22.425144] Call trace:
[   22.425206]  show_stack+0x20/0x38 (C)
[   22.425294]  dump_stack_lvl+0x8c/0xd0
[   22.425357]  print_report+0x118/0x5e0
[   22.425414]  kasan_report+0xc8/0x118
[   22.425467]  __asan_report_load1_noabort+0x20/0x30
[   22.425527]  kmalloc_oob_left+0x2ec/0x320
[   22.425580]  kunit_try_run_case+0x14c/0x3d0
[   22.425639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.425719]  kthread+0x318/0x618
[   22.425786]  ret_from_fork+0x10/0x20
[   22.425845] 
[   22.433141] Allocated by task 1:
[   22.433686]  kasan_save_stack+0x3c/0x68
[   22.434260]  kasan_save_track+0x20/0x40
[   22.435214]  kasan_save_alloc_info+0x40/0x58
[   22.436130]  __kasan_kmalloc+0xd4/0xd8
[   22.436820]  __kmalloc_node_track_caller_noprof+0x184/0x4b8
[   22.437532]  kvasprintf+0xcc/0x170
[   22.438061]  kasprintf+0xa8/0xe8
[   22.438683]  input_devnode+0x84/0xb8
[   22.439522]  device_get_devnode+0x114/0x258
[   22.440157]  dev_uevent+0x334/0x5b8
[   22.440724]  kobject_uevent_env+0x424/0xc98
[   22.441387]  kobject_uevent+0x14/0x20
[   22.441965]  device_add+0xc00/0x12b8
[   22.442565]  cdev_device_add+0xdc/0x208
[   22.443503]  evdev_connect+0x2e0/0x410
[   22.443971]  input_attach_handler.isra.0+0xec/0x1d8
[   22.444851]  input_register_device+0x48c/0x9e0
[   22.445436]  gpio_keys_probe+0xabc/0x1ec8
[   22.445968]  platform_probe+0xcc/0x198
[   22.446540]  really_probe+0x188/0x7f0
[   22.447081]  __driver_probe_device+0x164/0x378
[   22.447608]  driver_probe_device+0x64/0x180
[   22.448560]  __driver_attach+0x1cc/0x478
[   22.449097]  bus_for_each_dev+0x104/0x198
[   22.449633]  driver_attach+0x44/0x68
[   22.450143]  bus_add_driver+0x23c/0x4e8
[   22.450654]  driver_register+0xf8/0x3d0
[   22.451955]  __platform_driver_register+0x64/0x98
[   22.452569]  gpio_keys_init+0x24/0x38
[   22.453169]  do_one_initcall+0xcc/0x628
[   22.453730]  kernel_init_freeable+0x3e0/0x8b0
[   22.454340]  kernel_init+0x2c/0x1f8
[   22.454995]  ret_from_fork+0x10/0x20
[   22.455948] 
[   22.456371] Freed by task 1:
[   22.456840]  kasan_save_stack+0x3c/0x68
[   22.457329]  kasan_save_track+0x20/0x40
[   22.457878]  kasan_save_free_info+0x4c/0x78
[   22.458431]  __kasan_slab_free+0x6c/0x98
[   22.459135]  kfree+0x214/0x3c8
[   22.459635]  dev_uevent+0x368/0x5b8
[   22.460736]  kobject_uevent_env+0x424/0xc98
[   22.461455]  kobject_uevent+0x14/0x20
[   22.461988]  device_add+0xc00/0x12b8
[   22.462839]  cdev_device_add+0xdc/0x208
[   22.463272]  evdev_connect+0x2e0/0x410
[   22.463893]  input_attach_handler.isra.0+0xec/0x1d8
[   22.464442]  input_register_device+0x48c/0x9e0
[   22.465168]  gpio_keys_probe+0xabc/0x1ec8
[   22.465680]  platform_probe+0xcc/0x198
[   22.466289]  really_probe+0x188/0x7f0
[   22.466932]  __driver_probe_device+0x164/0x378
[   22.467431]  driver_probe_device+0x64/0x180
[   22.468502]  __driver_attach+0x1cc/0x478
[   22.469088]  bus_for_each_dev+0x104/0x198
[   22.469645]  driver_attach+0x44/0x68
[   22.470140]  bus_add_driver+0x23c/0x4e8
[   22.470629]  driver_register+0xf8/0x3d0
[   22.471224]  __platform_driver_register+0x64/0x98
[   22.471860]  gpio_keys_init+0x24/0x38
[   22.472418]  do_one_initcall+0xcc/0x628
[   22.473306]  kernel_init_freeable+0x3e0/0x8b0
[   22.473848]  kernel_init+0x2c/0x1f8
[   22.474424]  ret_from_fork+0x10/0x20
[   22.475389] 
[   22.475822] The buggy address belongs to the object at fffb4e7bc6224e20
[   22.475822]  which belongs to the cache kmalloc-16 of size 16
[   22.476959] The buggy address is located 15 bytes to the right of
[   22.476959]  allocated 16-byte region [fffb4e7bc6224e20, fffb4e7bc6224e30)
[   22.478174] 
[   22.478538] The buggy address belongs to the physical page:
[   22.479278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106224
[   22.480575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.481319] page_type: f5(slab)
[   22.481920] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   22.482938] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.484169] page dumped because: kasan: bad access detected
[   22.484905] 
[   22.485183] Memory state around the buggy address:
[   22.485772]  fffb4e7bc6224d00: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   22.486821]  fffb4e7bc6224d80: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   22.487439] >fffb4e7bc6224e00: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   22.488277]                                         ^
[   22.488912]  fffb4e7bc6224e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.489712]  fffb4e7bc6224f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.490915] ==================================================================

test log snippet boot parser 6

[   26.344193] ==================================================================
[   26.345115] BUG: KASAN: slab-use-after-free in kasan_strings+0x838/0x8d8
[   26.345982] Read of size 1 at addr fffb4e7bc6467f10 by task kunit_try_catch/247
[   26.347436] 
[   26.347814] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.348035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.348156] Hardware name: linux,dummy-virt (DT)
[   26.348250] Call trace:
[   26.348306]  show_stack+0x20/0x38 (C)
[   26.348376]  dump_stack_lvl+0x8c/0xd0
[   26.348438]  print_report+0x118/0x5e0
[   26.348500]  kasan_report+0xc8/0x118
[   26.348558]  __asan_report_load1_noabort+0x20/0x30
[   26.348621]  kasan_strings+0x838/0x8d8
[   26.348677]  kunit_try_run_case+0x14c/0x3d0
[   26.348767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.348836]  kthread+0x318/0x618
[   26.348894]  ret_from_fork+0x10/0x20
[   26.348954] 
[   26.357531] Allocated by task 247:
[   26.358062]  kasan_save_stack+0x3c/0x68
[   26.358649]  kasan_save_track+0x20/0x40
[   26.359212]  kasan_save_alloc_info+0x40/0x58
[   26.360031]  __kasan_kmalloc+0xd4/0xd8
[   26.360500]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.361176]  kasan_strings+0xb0/0x8d8
[   26.362203]  kunit_try_run_case+0x14c/0x3d0
[   26.363125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.363850]  kthread+0x318/0x618
[   26.364238]  ret_from_fork+0x10/0x20
[   26.364756] 
[   26.365111] Freed by task 247:
[   26.365593]  kasan_save_stack+0x3c/0x68
[   26.366089]  kasan_save_track+0x20/0x40
[   26.366731]  kasan_save_free_info+0x4c/0x78
[   26.367344]  __kasan_slab_free+0x6c/0x98
[   26.367874]  kfree+0x214/0x3c8
[   26.368343]  kasan_strings+0x124/0x8d8
[   26.368886]  kunit_try_run_case+0x14c/0x3d0
[   26.369527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.370270]  kthread+0x318/0x618
[   26.370878]  ret_from_fork+0x10/0x20
[   26.371440] 
[   26.372550] The buggy address belongs to the object at fffb4e7bc6467f00
[   26.372550]  which belongs to the cache kmalloc-32 of size 32
[   26.373779] The buggy address is located 16 bytes inside of
[   26.373779]  freed 32-byte region [fffb4e7bc6467f00, fffb4e7bc6467f20)
[   26.375194] 
[   26.375498] The buggy address belongs to the physical page:
[   26.376140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106467
[   26.377093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.378013] page_type: f5(slab)
[   26.378652] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[   26.379496] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   26.380809] page dumped because: kasan: bad access detected
[   26.381324] 
[   26.381718] Memory state around the buggy address:
[   26.382325]  fffb4e7bc6467e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.383889]  fffb4e7bc6467e80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   26.384739] >fffb4e7bc6467f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   26.385468]                          ^
[   26.385958]  fffb4e7bc6467f80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.386675]  fffb4e7bc6468000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.387822] ==================================================================

test log snippet boot parser 7

[   24.058236] ==================================================================
[   24.060092] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308
[   24.061043] Read of size 1 at addr fffb4e7bc5a9dc60 by task kunit_try_catch/180
[   24.061745] 
[   24.062054] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   24.062266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.062341] Hardware name: linux,dummy-virt (DT)
[   24.062609] Call trace:
[   24.062679]  show_stack+0x20/0x38 (C)
[   24.062840]  dump_stack_lvl+0x8c/0xd0
[   24.062937]  print_report+0x118/0x5e0
[   24.062997]  kasan_report+0xc8/0x118
[   24.063055]  __kasan_check_byte+0x54/0x70
[   24.063109]  kfree_sensitive+0x30/0xb0
[   24.063169]  kmalloc_double_kzfree+0x168/0x308
[   24.063227]  kunit_try_run_case+0x14c/0x3d0
[   24.063287]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.063346]  kthread+0x318/0x618
[   24.063402]  ret_from_fork+0x10/0x20
[   24.063476] 
[   24.070550] Allocated by task 180:
[   24.071353]  kasan_save_stack+0x3c/0x68
[   24.071979]  kasan_save_track+0x20/0x40
[   24.072527]  kasan_save_alloc_info+0x40/0x58
[   24.073204]  __kasan_kmalloc+0xd4/0xd8
[   24.073768]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.074459]  kmalloc_double_kzfree+0xb8/0x308
[   24.075253]  kunit_try_run_case+0x14c/0x3d0
[   24.076064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.076779]  kthread+0x318/0x618
[   24.077288]  ret_from_fork+0x10/0x20
[   24.077841] 
[   24.078168] Freed by task 180:
[   24.079060]  kasan_save_stack+0x3c/0x68
[   24.079610]  kasan_save_track+0x20/0x40
[   24.080193]  kasan_save_free_info+0x4c/0x78
[   24.080852]  __kasan_slab_free+0x6c/0x98
[   24.081417]  kfree+0x214/0x3c8
[   24.081919]  kfree_sensitive+0x80/0xb0
[   24.082725]  kmalloc_double_kzfree+0x11c/0x308
[   24.083310]  kunit_try_run_case+0x14c/0x3d0
[   24.084114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.084829]  kthread+0x318/0x618
[   24.085359]  ret_from_fork+0x10/0x20
[   24.085913] 
[   24.086215] The buggy address belongs to the object at fffb4e7bc5a9dc60
[   24.086215]  which belongs to the cache kmalloc-16 of size 16
[   24.087766] The buggy address is located 0 bytes inside of
[   24.087766]  freed 16-byte region [fffb4e7bc5a9dc60, fffb4e7bc5a9dc70)
[   24.089097] 
[   24.089485] The buggy address belongs to the physical page:
[   24.090173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   24.091248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.092025] page_type: f5(slab)
[   24.092471] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   24.093368] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   24.094168] page dumped because: kasan: bad access detected
[   24.095235] 
[   24.095659] Memory state around the buggy address:
[   24.096307]  fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[   24.097084]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   24.097922] >fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   24.098912]                                                        ^
[   24.099445]  fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.100298]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.101492] ==================================================================

test log snippet boot parser 8

[   23.898287] ==================================================================
[   23.899537] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338
[   23.900359] Read of size 1 at addr fffb4e7bc5a9dc48 by task kunit_try_catch/172
[   23.902655] 
[   23.903460] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   23.903742] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.903830] Hardware name: linux,dummy-virt (DT)
[   23.903922] Call trace:
[   23.903955]  show_stack+0x20/0x38 (C)
[   23.904021]  dump_stack_lvl+0x8c/0xd0
[   23.904082]  print_report+0x118/0x5e0
[   23.904139]  kasan_report+0xc8/0x118
[   23.904193]  __asan_report_load1_noabort+0x20/0x30
[   23.904255]  kmalloc_uaf+0x300/0x338
[   23.904304]  kunit_try_run_case+0x14c/0x3d0
[   23.904361]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.904422]  kthread+0x318/0x618
[   23.904477]  ret_from_fork+0x10/0x20
[   23.904539] 
[   23.912195] Allocated by task 172:
[   23.912807]  kasan_save_stack+0x3c/0x68
[   23.913479]  kasan_save_track+0x20/0x40
[   23.914062]  kasan_save_alloc_info+0x40/0x58
[   23.914975]  __kasan_kmalloc+0xd4/0xd8
[   23.915652]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.916230]  kmalloc_uaf+0xb8/0x338
[   23.916862]  kunit_try_run_case+0x14c/0x3d0
[   23.917484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.918131]  kthread+0x318/0x618
[   23.918768]  ret_from_fork+0x10/0x20
[   23.919263] 
[   23.919631] Freed by task 172:
[   23.920465]  kasan_save_stack+0x3c/0x68
[   23.920986]  kasan_save_track+0x20/0x40
[   23.921524]  kasan_save_free_info+0x4c/0x78
[   23.922056]  __kasan_slab_free+0x6c/0x98
[   23.922929]  kfree+0x214/0x3c8
[   23.923365]  kmalloc_uaf+0x11c/0x338
[   23.923936]  kunit_try_run_case+0x14c/0x3d0
[   23.924512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.925216]  kthread+0x318/0x618
[   23.925726]  ret_from_fork+0x10/0x20
[   23.926238] 
[   23.926602] The buggy address belongs to the object at fffb4e7bc5a9dc40
[   23.926602]  which belongs to the cache kmalloc-16 of size 16
[   23.928235] The buggy address is located 8 bytes inside of
[   23.928235]  freed 16-byte region [fffb4e7bc5a9dc40, fffb4e7bc5a9dc50)
[   23.929398] 
[   23.929789] The buggy address belongs to the physical page:
[   23.930547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   23.931627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.932398] page_type: f5(slab)
[   23.932938] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   23.933730] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.934562] page dumped because: kasan: bad access detected
[   23.935174] 
[   23.935493] Memory state around the buggy address:
[   23.936084]  fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[   23.936885]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   23.937676] >fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   23.938916]                                               ^
[   23.939582]  fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.940410]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.941284] ==================================================================

test log snippet boot parser 9

[   23.536287] ==================================================================
[   23.537509] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438
[   23.538299] Read of size 16 at addr fffb4e7bc5a9dc20 by task kunit_try_catch/156
[   23.539187] 
[   23.539528] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   23.539736] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.539798] Hardware name: linux,dummy-virt (DT)
[   23.539867] Call trace:
[   23.539917]  show_stack+0x20/0x38 (C)
[   23.540041]  dump_stack_lvl+0x8c/0xd0
[   23.540173]  print_report+0x118/0x5e0
[   23.540306]  kasan_report+0xc8/0x118
[   23.540439]  __asan_report_load16_noabort+0x20/0x30
[   23.540583]  kmalloc_uaf_16+0x3bc/0x438
[   23.540728]  kunit_try_run_case+0x14c/0x3d0
[   23.540803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.540863]  kthread+0x318/0x618
[   23.540919]  ret_from_fork+0x10/0x20
[   23.540975] 
[   23.548027] Allocated by task 156:
[   23.548595]  kasan_save_stack+0x3c/0x68
[   23.549160]  kasan_save_track+0x20/0x40
[   23.549719]  kasan_save_alloc_info+0x40/0x58
[   23.550281]  __kasan_kmalloc+0xd4/0xd8
[   23.550935]  __kmalloc_cache_noprof+0x15c/0x3c0
[   23.551538]  kmalloc_uaf_16+0x140/0x438
[   23.552474]  kunit_try_run_case+0x14c/0x3d0
[   23.553065]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.553753]  kthread+0x318/0x618
[   23.554201]  ret_from_fork+0x10/0x20
[   23.555552] 
[   23.555983] Freed by task 156:
[   23.556366]  kasan_save_stack+0x3c/0x68
[   23.556748]  kasan_save_track+0x20/0x40
[   23.557297]  kasan_save_free_info+0x4c/0x78
[   23.557873]  __kasan_slab_free+0x6c/0x98
[   23.558403]  kfree+0x214/0x3c8
[   23.559218]  kmalloc_uaf_16+0x190/0x438
[   23.559758]  kunit_try_run_case+0x14c/0x3d0
[   23.560425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   23.561057]  kthread+0x318/0x618
[   23.561551]  ret_from_fork+0x10/0x20
[   23.562050] 
[   23.562370] The buggy address belongs to the object at fffb4e7bc5a9dc20
[   23.562370]  which belongs to the cache kmalloc-16 of size 16
[   23.563724] The buggy address is located 0 bytes inside of
[   23.563724]  freed 16-byte region [fffb4e7bc5a9dc20, fffb4e7bc5a9dc30)
[   23.565113] 
[   23.565408] The buggy address belongs to the physical page:
[   23.566047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a9d
[   23.567426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   23.568216] page_type: f5(slab)
[   23.568790] raw: 0bfffe0000000000 fffb4e7bc0001640 dead000000000122 0000000000000000
[   23.569667] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.570746] page dumped because: kasan: bad access detected
[   23.571455] 
[   23.571843] Memory state around the buggy address:
[   23.572479]  fffb4e7bc5a9db00: 00 05 fc fc 00 05 fc fc 00 00 fc fc 00 06 fc fc
[   23.573453]  fffb4e7bc5a9db80: 00 06 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   23.574296] >fffb4e7bc5a9dc00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   23.575364]                                ^
[   23.575891]  fffb4e7bc5a9dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.577013]  fffb4e7bc5a9dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.577897] ==================================================================

test log snippet boot parser 10

[   24.936203] ==================================================================
[   24.937246] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x17c/0x2f8
[   24.937961] Read of size 1 at addr fffb4e7bc1863c80 by task kunit_try_catch/203
[   24.939379] 
[   24.940082] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   24.940410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.940455] Hardware name: linux,dummy-virt (DT)
[   24.940496] Call trace:
[   24.940525]  show_stack+0x20/0x38 (C)
[   24.940592]  dump_stack_lvl+0x8c/0xd0
[   24.940653]  print_report+0x118/0x5e0
[   24.940737]  kasan_report+0xc8/0x118
[   24.940799]  __kasan_check_byte+0x54/0x70
[   24.940857]  kmem_cache_destroy+0x34/0x218
[   24.940918]  kmem_cache_double_destroy+0x17c/0x2f8
[   24.940978]  kunit_try_run_case+0x14c/0x3d0
[   24.941036]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.941099]  kthread+0x318/0x618
[   24.941155]  ret_from_fork+0x10/0x20
[   24.941214] 
[   24.949997] Allocated by task 203:
[   24.950417]  kasan_save_stack+0x3c/0x68
[   24.951488]  kasan_save_track+0x20/0x40
[   24.952213]  kasan_save_alloc_info+0x40/0x58
[   24.952898]  __kasan_slab_alloc+0xa8/0xb0
[   24.953563]  kmem_cache_alloc_noprof+0x108/0x398
[   24.954246]  __kmem_cache_create_args+0x18c/0x2b0
[   24.954949]  kmem_cache_double_destroy+0xc8/0x2f8
[   24.955856]  kunit_try_run_case+0x14c/0x3d0
[   24.956364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.957130]  kthread+0x318/0x618
[   24.957664]  ret_from_fork+0x10/0x20
[   24.958230] 
[   24.958614] Freed by task 203:
[   24.959338]  kasan_save_stack+0x3c/0x68
[   24.959940]  kasan_save_track+0x20/0x40
[   24.960440]  kasan_save_free_info+0x4c/0x78
[   24.961070]  __kasan_slab_free+0x6c/0x98
[   24.961750]  kmem_cache_free+0x260/0x470
[   24.962271]  slab_kmem_cache_release+0x38/0x50
[   24.963112]  kmem_cache_release+0x1c/0x30
[   24.963869]  kobject_put+0x17c/0x430
[   24.964219]  sysfs_slab_release+0x1c/0x30
[   24.964866]  kmem_cache_destroy+0x118/0x218
[   24.965463]  kmem_cache_double_destroy+0x130/0x2f8
[   24.966073]  kunit_try_run_case+0x14c/0x3d0
[   24.967045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.967679]  kthread+0x318/0x618
[   24.968213]  ret_from_fork+0x10/0x20
[   24.968715] 
[   24.969008] The buggy address belongs to the object at fffb4e7bc1863c80
[   24.969008]  which belongs to the cache kmem_cache of size 208
[   24.970343] The buggy address is located 0 bytes inside of
[   24.970343]  freed 208-byte region [fffb4e7bc1863c80, fffb4e7bc1863d50)
[   24.971890] 
[   24.972187] The buggy address belongs to the physical page:
[   24.973125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101863
[   24.973878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.974950] page_type: f5(slab)
[   24.975600] raw: 0bfffe0000000000 fffb4e7bc0001000 dead000000000122 0000000000000000
[   24.976543] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   24.977476] page dumped because: kasan: bad access detected
[   24.978188] 
[   24.978661] Memory state around the buggy address:
[   24.979204]  fffb4e7bc1863b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.980317]  fffb4e7bc1863c00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.981163] >fffb4e7bc1863c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.982012]                    ^
[   24.982439]  fffb4e7bc1863d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   24.983237]  fffb4e7bc1863d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.984002] ==================================================================

test log snippet boot parser 11

[   24.435215] ==================================================================
[   24.436001] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70
[   24.436669] Read of size 4 at addr fffb4e7bc6402440 by task swapper/1/0
[   24.437357] 
[   24.437742] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.14.0-rc3 #1
[   24.437933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.438007] Hardware name: linux,dummy-virt (DT)
[   24.438099] Call trace:
[   24.438162]  show_stack+0x20/0x38 (C)
[   24.438308]  dump_stack_lvl+0x8c/0xd0
[   24.438441]  print_report+0x118/0x5e0
[   24.438596]  kasan_report+0xc8/0x118
[   24.438746]  __asan_report_load4_noabort+0x20/0x30
[   24.438887]  rcu_uaf_reclaim+0x64/0x70
[   24.439010]  rcu_core+0x9f4/0x1e20
[   24.439105]  rcu_core_si+0x18/0x30
[   24.439163]  handle_softirqs+0x374/0xb20
[   24.439220]  __do_softirq+0x1c/0x28
[   24.439271]  ____do_softirq+0x18/0x30
[   24.439323]  call_on_irq_stack+0x24/0x58
[   24.439377]  do_softirq_own_stack+0x24/0x38
[   24.439440]  __irq_exit_rcu+0x1fc/0x318
[   24.439496]  irq_exit_rcu+0x1c/0x80
[   24.439546]  el1_interrupt+0x38/0x58
[   24.439603]  el1h_64_irq_handler+0x18/0x28
[   24.439663]  el1h_64_irq+0x6c/0x70
[   24.439802]  arch_local_irq_enable+0x4/0x8 (P)
[   24.439878]  do_idle+0x384/0x4e8
[   24.439930]  cpu_startup_entry+0x68/0x80
[   24.439986]  secondary_start_kernel+0x288/0x340
[   24.440048]  __secondary_switched+0xc0/0xc8
[   24.440113] 
[   24.454050] Allocated by task 186:
[   24.455489]  kasan_save_stack+0x3c/0x68
[   24.455786]  kasan_save_track+0x20/0x40
[   24.456666]  kasan_save_alloc_info+0x40/0x58
[   24.457341]  __kasan_kmalloc+0xd4/0xd8
[   24.457853]  __kmalloc_cache_noprof+0x15c/0x3c0
[   24.458606]  rcu_uaf+0xb0/0x2d0
[   24.459084]  kunit_try_run_case+0x14c/0x3d0
[   24.459627]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.460313]  kthread+0x318/0x618
[   24.460837]  ret_from_fork+0x10/0x20
[   24.461340] 
[   24.461696] Freed by task 0:
[   24.462103]  kasan_save_stack+0x3c/0x68
[   24.463165]  kasan_save_track+0x20/0x40
[   24.463658]  kasan_save_free_info+0x4c/0x78
[   24.464242]  __kasan_slab_free+0x6c/0x98
[   24.464823]  kfree+0x214/0x3c8
[   24.465285]  rcu_uaf_reclaim+0x28/0x70
[   24.465780]  rcu_core+0x9f4/0x1e20
[   24.466263]  rcu_core_si+0x18/0x30
[   24.466984]  handle_softirqs+0x374/0xb20
[   24.467462]  __do_softirq+0x1c/0x28
[   24.468031] 
[   24.468349] Last potentially related work creation:
[   24.468886]  kasan_save_stack+0x3c/0x68
[   24.469473]  kasan_record_aux_stack+0xb4/0xc8
[   24.470106]  __call_rcu_common.constprop.0+0x74/0xa10
[   24.471123]  call_rcu+0x18/0x30
[   24.471563]  rcu_uaf+0x14c/0x2d0
[   24.472101]  kunit_try_run_case+0x14c/0x3d0
[   24.472688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   24.473339]  kthread+0x318/0x618
[   24.473933]  ret_from_fork+0x10/0x20
[   24.474864] 
[   24.475132] The buggy address belongs to the object at fffb4e7bc6402440
[   24.475132]  which belongs to the cache kmalloc-32 of size 32
[   24.477039] The buggy address is located 0 bytes inside of
[   24.477039]  freed 32-byte region [fffb4e7bc6402440, fffb4e7bc6402460)
[   24.478242] 
[   24.478585] The buggy address belongs to the physical page:
[   24.479155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106402
[   24.480187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   24.481068] page_type: f5(slab)
[   24.481554] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[   24.482663] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   24.483519] page dumped because: kasan: bad access detected
[   24.484145] 
[   24.484457] Memory state around the buggy address:
[   24.485040]  fffb4e7bc6402300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.485846]  fffb4e7bc6402380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.486898] >fffb4e7bc6402400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   24.487718]                                            ^
[   24.488330]  fffb4e7bc6402480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.489121]  fffb4e7bc6402500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.489889] ==================================================================

test log snippet boot parser 12

[   26.297354] ==================================================================
[   26.300074] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8
[   26.300822] Read of size 1 at addr fffb4e7bc6467f10 by task kunit_try_catch/247
[   26.301638] 
[   26.301984] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.302196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.302274] Hardware name: linux,dummy-virt (DT)
[   26.302409] Call trace:
[   26.302487]  show_stack+0x20/0x38 (C)
[   26.302632]  dump_stack_lvl+0x8c/0xd0
[   26.302797]  print_report+0x118/0x5e0
[   26.302922]  kasan_report+0xc8/0x118
[   26.302986]  __asan_report_load1_noabort+0x20/0x30
[   26.303050]  strcmp+0xc0/0xc8
[   26.303104]  kasan_strings+0x228/0x8d8
[   26.303162]  kunit_try_run_case+0x14c/0x3d0
[   26.303225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.303288]  kthread+0x318/0x618
[   26.303345]  ret_from_fork+0x10/0x20
[   26.303408] 
[   26.310556] Allocated by task 247:
[   26.311670]  kasan_save_stack+0x3c/0x68
[   26.312288]  kasan_save_track+0x20/0x40
[   26.312880]  kasan_save_alloc_info+0x40/0x58
[   26.313551]  __kasan_kmalloc+0xd4/0xd8
[   26.314096]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.315043]  kasan_strings+0xb0/0x8d8
[   26.315549]  kunit_try_run_case+0x14c/0x3d0
[   26.316217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.316943]  kthread+0x318/0x618
[   26.317494]  ret_from_fork+0x10/0x20
[   26.318039] 
[   26.318342] Freed by task 247:
[   26.319593]  kasan_save_stack+0x3c/0x68
[   26.320204]  kasan_save_track+0x20/0x40
[   26.320814]  kasan_save_free_info+0x4c/0x78
[   26.321425]  __kasan_slab_free+0x6c/0x98
[   26.322091]  kfree+0x214/0x3c8
[   26.322915]  kasan_strings+0x124/0x8d8
[   26.323514]  kunit_try_run_case+0x14c/0x3d0
[   26.324062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.324684]  kthread+0x318/0x618
[   26.325252]  ret_from_fork+0x10/0x20
[   26.325805] 
[   26.326157] The buggy address belongs to the object at fffb4e7bc6467f00
[   26.326157]  which belongs to the cache kmalloc-32 of size 32
[   26.328161] The buggy address is located 16 bytes inside of
[   26.328161]  freed 32-byte region [fffb4e7bc6467f00, fffb4e7bc6467f20)
[   26.329432] 
[   26.329753] The buggy address belongs to the physical page:
[   26.330961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106467
[   26.331923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.332737] page_type: f5(slab)
[   26.333253] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[   26.334191] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   26.335248] page dumped because: kasan: bad access detected
[   26.336109] 
[   26.336480] Memory state around the buggy address:
[   26.337143]  fffb4e7bc6467e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.337937]  fffb4e7bc6467e80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   26.338883] >fffb4e7bc6467f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   26.339810]                          ^
[   26.340680]  fffb4e7bc6467f80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.341651]  fffb4e7bc6468000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.342540] ==================================================================

test log snippet boot parser 13

[   26.390342] ==================================================================
[   26.391618] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
[   26.392136] Read of size 1 at addr fffb4e7bc6467f10 by task kunit_try_catch/247
[   26.392478] 
[   26.392623] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.392779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.392863] Hardware name: linux,dummy-virt (DT)
[   26.392955] Call trace:
[   26.393022]  show_stack+0x20/0x38 (C)
[   26.393210]  dump_stack_lvl+0x8c/0xd0
[   26.393355]  print_report+0x118/0x5e0
[   26.393494]  kasan_report+0xc8/0x118
[   26.393634]  __asan_report_load1_noabort+0x20/0x30
[   26.393805]  strlen+0xa8/0xb0
[   26.393938]  kasan_strings+0x304/0x8d8
[   26.394076]  kunit_try_run_case+0x14c/0x3d0
[   26.394219]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.394341]  kthread+0x318/0x618
[   26.394460]  ret_from_fork+0x10/0x20
[   26.394593] 
[   26.403382] Allocated by task 247:
[   26.404194]  kasan_save_stack+0x3c/0x68
[   26.404867]  kasan_save_track+0x20/0x40
[   26.405385]  kasan_save_alloc_info+0x40/0x58
[   26.406062]  __kasan_kmalloc+0xd4/0xd8
[   26.406938]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.407618]  kasan_strings+0xb0/0x8d8
[   26.408197]  kunit_try_run_case+0x14c/0x3d0
[   26.408789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.409546]  kthread+0x318/0x618
[   26.410108]  ret_from_fork+0x10/0x20
[   26.410966] 
[   26.411554] Freed by task 247:
[   26.412267]  kasan_save_stack+0x3c/0x68
[   26.412982]  kasan_save_track+0x20/0x40
[   26.413436]  kasan_save_free_info+0x4c/0x78
[   26.414015]  __kasan_slab_free+0x6c/0x98
[   26.414907]  kfree+0x214/0x3c8
[   26.415323]  kasan_strings+0x124/0x8d8
[   26.415910]  kunit_try_run_case+0x14c/0x3d0
[   26.416494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.417352]  kthread+0x318/0x618
[   26.417857]  ret_from_fork+0x10/0x20
[   26.418382] 
[   26.419621] The buggy address belongs to the object at fffb4e7bc6467f00
[   26.419621]  which belongs to the cache kmalloc-32 of size 32
[   26.420733] The buggy address is located 16 bytes inside of
[   26.420733]  freed 32-byte region [fffb4e7bc6467f00, fffb4e7bc6467f20)
[   26.421913] 
[   26.422223] The buggy address belongs to the physical page:
[   26.422941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106467
[   26.423946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.424653] page_type: f5(slab)
[   26.425235] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[   26.426022] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   26.427168] page dumped because: kasan: bad access detected
[   26.427840] 
[   26.428118] Memory state around the buggy address:
[   26.429387]  fffb4e7bc6467e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.430104]  fffb4e7bc6467e80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   26.431076] >fffb4e7bc6467f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   26.431861]                          ^
[   26.432327]  fffb4e7bc6467f80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.433622]  fffb4e7bc6468000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.435068] ==================================================================

test log snippet boot parser 14

[   26.436287] ==================================================================
[   26.437020] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88
[   26.437754] Read of size 1 at addr fffb4e7bc6467f10 by task kunit_try_catch/247
[   26.438579] 
[   26.438970] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.14.0-rc3 #1
[   26.439193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.439276] Hardware name: linux,dummy-virt (DT)
[   26.439370] Call trace:
[   26.439448]  show_stack+0x20/0x38 (C)
[   26.439590]  dump_stack_lvl+0x8c/0xd0
[   26.439754]  print_report+0x118/0x5e0
[   26.439897]  kasan_report+0xc8/0x118
[   26.440040]  __asan_report_load1_noabort+0x20/0x30
[   26.440192]  strnlen+0x80/0x88
[   26.440321]  kasan_strings+0x364/0x8d8
[   26.440438]  kunit_try_run_case+0x14c/0x3d0
[   26.440507]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.440573]  kthread+0x318/0x618
[   26.440628]  ret_from_fork+0x10/0x20
[   26.440690] 
[   26.449665] Allocated by task 247:
[   26.450342]  kasan_save_stack+0x3c/0x68
[   26.451219]  kasan_save_track+0x20/0x40
[   26.451974]  kasan_save_alloc_info+0x40/0x58
[   26.452626]  __kasan_kmalloc+0xd4/0xd8
[   26.453340]  __kmalloc_cache_noprof+0x15c/0x3c0
[   26.454013]  kasan_strings+0xb0/0x8d8
[   26.454686]  kunit_try_run_case+0x14c/0x3d0
[   26.455406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.456204]  kthread+0x318/0x618
[   26.456565]  ret_from_fork+0x10/0x20
[   26.456932] 
[   26.457302] Freed by task 247:
[   26.457864]  kasan_save_stack+0x3c/0x68
[   26.458547]  kasan_save_track+0x20/0x40
[   26.459869]  kasan_save_free_info+0x4c/0x78
[   26.460664]  __kasan_slab_free+0x6c/0x98
[   26.461213]  kfree+0x214/0x3c8
[   26.461745]  kasan_strings+0x124/0x8d8
[   26.462350]  kunit_try_run_case+0x14c/0x3d0
[   26.463141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   26.463975]  kthread+0x318/0x618
[   26.464510]  ret_from_fork+0x10/0x20
[   26.465050] 
[   26.465421] The buggy address belongs to the object at fffb4e7bc6467f00
[   26.465421]  which belongs to the cache kmalloc-32 of size 32
[   26.467348] The buggy address is located 16 bytes inside of
[   26.467348]  freed 32-byte region [fffb4e7bc6467f00, fffb4e7bc6467f20)
[   26.468692] 
[   26.469113] The buggy address belongs to the physical page:
[   26.469784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106467
[   26.470792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   26.472009] page_type: f5(slab)
[   26.472638] raw: 0bfffe0000000000 fffb4e7bc0001780 dead000000000122 0000000000000000
[   26.473511] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000
[   26.474612] page dumped because: kasan: bad access detected
[   26.475546] 
[   26.476172] Memory state around the buggy address:
[   26.476755]  fffb4e7bc6467e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.477641]  fffb4e7bc6467e80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   26.478814] >fffb4e7bc6467f00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   26.479539]                          ^
[   26.479950]  fffb4e7bc6467f80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   26.480581]  fffb4e7bc6468000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   26.481646] ==================================================================

test log snippet test parser 1

------------[ cut here ]------------
[   41.938179] WARNING: CPU: 1 PID: 472 at mm/util.c:674 __kvmalloc_node_noprof+0x11c/0x124
[   41.939575] Modules linked in: sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 fuse drm backlight ip_tables x_tables
[   41.943644] CPU: 1 UID: 0 PID: 472 Comm: unshare_test Not tainted 6.14.0-rc3 #1
[   41.944439] Hardware name: linux,dummy-virt (DT)
[   41.945100] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   41.946071] pc : __kvmalloc_node_noprof+0x11c/0x124
[   41.946560] lr : __kvmalloc_node_noprof+0x50/0x124
[   41.947179] sp : ffff800080a23ce0
[   41.947562] x29: ffff800080a23cf0 x28: fff474e2c1ada500 x27: 0000000000000000
[   41.948415] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   41.949276] x23: 0000000080001000 x22: 0f9f9fb4b2f61ca4 x21: 0000000200001e00
[   41.950341] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   41.951240] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   41.952194] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   41.953342] x11: 0000000000000040 x10: 7c209abaae743b00 x9 : 7c209abaae743b00
[   41.954698] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   41.955435] x5 : 0000000000000000 x4 : ffff800080a23cb0 x3 : 0000000000000000
[   41.956097] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   41.956718] Call trace:
[   41.957209]  __kvmalloc_node_noprof+0x11c/0x124 (P)
[   41.958103]  alloc_fdtable+0x74/0x118
[   41.958567]  expand_files+0x114/0x2e0
[   41.958943]  ksys_dup3+0x64/0xe8
[   41.959294]  __arm64_sys_dup3+0x20/0x30
[   41.959658]  invoke_syscall+0x40/0xf8
[   41.960022]  el0_svc_common+0xa8/0xd8
[   41.960426]  do_el0_svc+0x1c/0x28
[   41.960815]  el0_svc+0x38/0x68
[   41.961123]  el0t_64_sync_handler+0x78/0x108
[   41.961527]  el0t_64_sync+0x198/0x19c
[   41.962165] ---[ end trace 0000000000000000 ]---