All of lore.kernel.org
 help / color / mirror / Atom feed
* WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
@ 2022-11-17 11:31 Naresh Kamboju
  2022-11-17 13:58 ` Marco Elver
  0 siblings, 1 reply; 10+ messages in thread
From: Naresh Kamboju @ 2022-11-17 11:31 UTC (permalink / raw)
  To: kasan-dev, X86 ML, open list, linux-mm, regressions, lkft-triage
  Cc: Andrew Morton, Marco Elver, Alexander Potapenko

Kunit test cases failed and found warnings while booting Linux next
version 6.1.0-rc5-next-20221117 on qemu-x86_64 [1].

It was working on Linux next-20221116 tag.

[    0.663761] WARNING: CPU: 0 PID: 0 at
arch/x86/include/asm/kfence.h:46 kfence_protect+0x7b/0x120
[    0.664033] WARNING: CPU: 0 PID: 0 at mm/kfence/core.c:234
kfence_protect+0x7d/0x120
[    0.664465] kfence: kfence_init failed

Reported-by: Linux Kernel Functional Testing <lkft@linaro.org>

Regressions found on qemu_x86_64:[2]

    - kunit/test_use_after_free_read
    - kunit/test_invalid_access
    - kunit/test_double_free-memcache
    - kunit/test_krealloc
    - kunit/test_shrink_memcache
    - kunit/test_memcache_typesafe_by_rcu
    - kunit/test_use_after_free_read-memcache
    - kunit/test_invalid_addr_free-memcache
    - kunit/test_out_of_bounds_read-memcache
    - kunit/test_memcache_alloc_bulk
    - kunit/test_out_of_bounds_read
    - kunit/test_memcache_ctor
    - kunit/test_corruption-memcache
    - kunit/test_gfpzero
    - kunit/test_out_of_bounds_write
    - kunit/test_out_of_bounds_write-memcache
    - kunit/test_kmalloc_aligned_oob_read
    - kunit/test_free_bulk-memcache

[    0.663758] ------------[ cut here ]------------
[    0.663761] WARNING: CPU: 0 PID: 0 at
arch/x86/include/asm/kfence.h:46 kfence_protect+0x7b/0x120
[    0.663782] Modules linked in:
[    0.663788] CPU: 0 PID: 0 Comm: swapper/0 Not tainted
6.1.0-rc5-next-20221117 #1
[    0.663795] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS 1.12.0-1 04/01/2014
[    0.663801] RIP: 0010:kfence_protect+0x7b/0x120
[    0.663811] Code: f1 f1 f1 f1 c7 40 04 04 f3 f3 f3 65 48 8b 04 25
28 00 00 00 48 89 45 d8 31 c0 e8 e0 0d ba ff 48 85 c0 74 06 83 7d a0
01 74 17 <0f> 0b 0f 0b c6 05 cb 97 1d 03 00 45 31 c0 c6 05 c0 97 1d 03
01 eb
[    0.663819] RSP: 0000:ffffffff9c407d98 EFLAGS: 00010002
[    0.663826] RAX: ffff8880adc01020 RBX: 00000000000001ff RCX: 80000001000001e3
[    0.663830] RDX: dffffc0000000000 RSI: ffff88811ac00000 RDI: ffff8880adc01020
[    0.663836] RBP: ffffffff9c407e18 R08: ffffffff997c8ef8 R09: ffffea00046b7f87
[    0.663841] R10: fffff940008d6ff0 R11: 0000000000000001 R12: 1ffffffff3880fb3
[    0.663845] R13: ffff88811ac00000 R14: ffffea00046b7fc0 R15: 0000000000000200
[    0.663852] FS:  0000000000000000(0000) GS:ffff88811b400000(0000)
knlGS:0000000000000000
[    0.663859] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    0.663864] CR2: ffff88813ffff000 CR3: 00000000ac814000 CR4: 00000000000406b0
[    0.663869] Call Trace:
[    0.663871]  <TASK>
[    0.663876]  ? __pfx_kfence_protect+0x10/0x10
[    0.663886]  ? __pfx_set_memory_4k+0x10/0x10
[    0.663899]  kfence_init_pool+0x1ea/0x350
[    0.663909]  ? __pfx_kfence_init_pool+0x10/0x10
[    0.663919]  ? random_init+0xe9/0x13b
[    0.663930]  ? __pfx_random_init+0x10/0x10
[    0.663936]  ? _find_next_bit+0x46/0xe0
[    0.663947]  kfence_init+0x42/0x1e8
[    0.663959]  start_kernel+0x1fd/0x3a6
[    0.663970]  x86_64_start_reservations+0x28/0x2e
[    0.663978]  x86_64_start_kernel+0x96/0xa0
[    0.663986]  secondary_startup_64_no_verify+0xe0/0xeb
[    0.664001]  </TASK>
[    0.664003] ---[ end trace 0000000000000000 ]---
[    0.664032] ------------[ cut here ]------------
[    0.664033] WARNING: CPU: 0 PID: 0 at mm/kfence/core.c:234
kfence_protect+0x7d/0x120
[    0.664045] Modules linked in:
[    0.664049] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G        W
   6.1.0-rc5-next-20221117 #1
[    0.664055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS 1.12.0-1 04/01/2014
[    0.664058] RIP: 0010:kfence_protect+0x7d/0x120
[    0.664068] Code: f1 f1 c7 40 04 04 f3 f3 f3 65 48 8b 04 25 28 00
00 00 48 89 45 d8 31 c0 e8 e0 0d ba ff 48 85 c0 74 06 83 7d a0 01 74
17 0f 0b <0f> 0b c6 05 cb 97 1d 03 00 45 31 c0 c6 05 c0 97 1d 03 01 eb
4a 48
[    0.664074] RSP: 0000:ffffffff9c407d98 EFLAGS: 00010002
[    0.664080] RAX: ffff8880adc01020 RBX: 00000000000001ff RCX: 80000001000001e3
[    0.664085] RDX: dffffc0000000000 RSI: ffff88811ac00000 RDI: ffff8880adc01020
[    0.664090] RBP: ffffffff9c407e18 R08: ffffffff997c8ef8 R09: ffffea00046b7f87
[    0.664095] R10: fffff940008d6ff0 R11: 0000000000000001 R12: 1ffffffff3880fb3
[    0.664099] R13: ffff88811ac00000 R14: ffffea00046b7fc0 R15: 0000000000000200
[    0.664105] FS:  0000000000000000(0000) GS:ffff88811b400000(0000)
knlGS:0000000000000000
[    0.664112] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    0.664116] CR2: ffff88813ffff000 CR3: 00000000ac814000 CR4: 00000000000406b0
[    0.664121] Call Trace:
[    0.664123]  <TASK>
[    0.664126]  ? __pfx_kfence_protect+0x10/0x10
[    0.664136]  ? __pfx_set_memory_4k+0x10/0x10
[    0.664146]  kfence_init_pool+0x1ea/0x350
[    0.664156]  ? __pfx_kfence_init_pool+0x10/0x10
[    0.664166]  ? random_init+0xe9/0x13b
[    0.664172]  ? __pfx_random_init+0x10/0x10
[    0.664179]  ? _find_next_bit+0x46/0xe0
[    0.664186]  kfence_init+0x42/0x1e8
[    0.664196]  start_kernel+0x1fd/0x3a6
[    0.664205]  x86_64_start_reservations+0x28/0x2e
[    0.664213]  x86_64_start_kernel+0x96/0xa0
[    0.664221]  secondary_startup_64_no_verify+0xe0/0xeb
[    0.664232]  </TASK>
[    0.664235] ---[ end trace 0000000000000000 ]---
[    0.664465] kfence: kfence_init failed

metadata:
  git_ref: master
  git_repo: https://gitlab.com/Linaro/lkft/mirrors/next/linux-next
  git_sha: af37ad1e01c72483c4ee8453d9d9bac95d35f023
  git_describe: next-20221117
  kernel_version: 6.1.0-rc5
  kernel-config: https://builds.tuxbuild.com/2Hfb6n1z0frt4iBlIvqUzjMHiLm/config
  build-url: https://gitlab.com/Linaro/lkft/mirrors/next/linux-next/-/pipelines/697483979
  artifact-location: https://builds.tuxbuild.com/2Hfb6n1z0frt4iBlIvqUzjMHiLm
  toolchain: gcc-11


[1] https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20221117/testrun/13045566/suite/kunit/test/kfence/log
[2] https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20221117/testrun/13045566/suite/kunit/tests/
[3] https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20221117/testrun/13045566/suite/kunit/test/test_invalid_access/history/



--
Linaro LKFT
https://lkft.linaro.org

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
  2022-11-17 11:31 WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect Naresh Kamboju
@ 2022-11-17 13:58 ` Marco Elver
  2022-11-17 14:34   ` Dave Hansen
  0 siblings, 1 reply; 10+ messages in thread
From: Marco Elver @ 2022-11-17 13:58 UTC (permalink / raw)
  To: Naresh Kamboju, Peter Zijlstra, Dave Hansen
  Cc: kasan-dev, X86 ML, open list, linux-mm, regressions, lkft-triage,
	Andrew Morton, Alexander Potapenko

On Thu, Nov 17, 2022 at 05:01PM +0530, Naresh Kamboju wrote:
> Kunit test cases failed and found warnings while booting Linux next
> version 6.1.0-rc5-next-20221117 on qemu-x86_64 [1].
> 
> It was working on Linux next-20221116 tag.
> 
> [    0.663761] WARNING: CPU: 0 PID: 0 at
> arch/x86/include/asm/kfence.h:46 kfence_protect+0x7b/0x120
> [    0.664033] WARNING: CPU: 0 PID: 0 at mm/kfence/core.c:234
> kfence_protect+0x7d/0x120
> [    0.664465] kfence: kfence_init failed
> 
> Reported-by: Linux Kernel Functional Testing <lkft@linaro.org>
[...]
> [    0.663758] ------------[ cut here ]------------
> [    0.663761] WARNING: CPU: 0 PID: 0 at
> arch/x86/include/asm/kfence.h:46 kfence_protect+0x7b/0x120
[...]
> [    0.664465] kfence: kfence_init failed
> 
> metadata:
>   git_ref: master
>   git_repo: https://gitlab.com/Linaro/lkft/mirrors/next/linux-next
>   git_sha: af37ad1e01c72483c4ee8453d9d9bac95d35f023
>   git_describe: next-20221117
>   kernel_version: 6.1.0-rc5
>   kernel-config: https://builds.tuxbuild.com/2Hfb6n1z0frt4iBlIvqUzjMHiLm/config
>   build-url: https://gitlab.com/Linaro/lkft/mirrors/next/linux-next/-/pipelines/697483979
>   artifact-location: https://builds.tuxbuild.com/2Hfb6n1z0frt4iBlIvqUzjMHiLm
>   toolchain: gcc-11

I bisected this to:

	commit 127960a05548ea699a95791669e8112552eb2452
	Author: Peter Zijlstra <peterz@infradead.org>
	Date:   Thu Nov 10 13:33:57 2022 +0100

	    x86/mm: Inhibit _PAGE_NX changes from cpa_process_alias()

	    There is a cludge in change_page_attr_set_clr() that inhibits
	    propagating NX changes to the aliases (directmap and highmap) -- this
	    is a cludge twofold:

	     - it also inhibits the primary checks in __change_page_attr();
	     - it hard depends on single bit changes.

	    The introduction of set_memory_rox() triggered this last issue for
	    clearing both _PAGE_RW and _PAGE_NX.

	    Explicitly ignore _PAGE_NX in cpa_process_alias() instead.

	    Fixes: b38994948567 ("x86/mm: Implement native set_memory_rox()")
	    Reported-by: kernel test robot <oliver.sang@intel.com>
	    Debugged-by: Dave Hansen <dave.hansen@intel.com>
	    Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
	    Link: https://lkml.kernel.org/r/20221110125544.594991716%40infradead.org

A simple revert of this commit fixes the issue.

Since all this seems to be about set_memory_rox(), and this is a fix
commit, the fix itself missed something?

Thanks,
-- Marco

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
  2022-11-17 13:58 ` Marco Elver
@ 2022-11-17 14:34   ` Dave Hansen
  2022-11-17 23:23     ` Marco Elver
  2022-11-21  5:40     ` Naresh Kamboju
  0 siblings, 2 replies; 10+ messages in thread
From: Dave Hansen @ 2022-11-17 14:34 UTC (permalink / raw)
  To: Marco Elver, Naresh Kamboju, Peter Zijlstra
  Cc: kasan-dev, X86 ML, open list, linux-mm, regressions, lkft-triage,
	Andrew Morton, Alexander Potapenko

[-- Attachment #1: Type: text/plain, Size: 1659 bytes --]

On 11/17/22 05:58, Marco Elver wrote:
> [    0.663761] WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect+0x7b/0x120
> [    0.664033] WARNING: CPU: 0 PID: 0 at mm/kfence/core.c:234 kfence_protect+0x7d/0x120
> [    0.664465] kfence: kfence_init failed

Any chance you could add some debugging and figure out what actually
made kfence call over?  Was it the pte or the level?

        if (WARN_ON(!pte || level != PG_LEVEL_4K))
                return false;

I can see how the thing you bisected to might lead to a page table not
being split, which could mess with the 'level' check.

Also, is there a reason this code is mucking with the page tables
directly?  It seems, uh, rather wonky.  This, for instance:

>         if (protect)
>                 set_pte(pte, __pte(pte_val(*pte) & ~_PAGE_PRESENT));
>         else
>                 set_pte(pte, __pte(pte_val(*pte) | _PAGE_PRESENT));
> 
>         /*
>          * Flush this CPU's TLB, assuming whoever did the allocation/free is
>          * likely to continue running on this CPU.
>          */
>         preempt_disable();
>         flush_tlb_one_kernel(addr);
>         preempt_enable();

Seems rather broken.  I assume the preempt_disable() is there to get rid
of some warnings.  But, there is nothing I can see to *keep* the CPU
that did the free from being different from the one where the TLB flush
is performed until the preempt_disable().  That makes the
flush_tlb_one_kernel() mostly useless.

Is there a reason this code isn't using the existing page table
manipulation functions and tries to code its own?  What prevents it from
using something like the attached patch?

[-- Attachment #2: kfence.patch --]
[-- Type: text/x-patch, Size: 1265 bytes --]

diff --git a/arch/x86/include/asm/kfence.h b/arch/x86/include/asm/kfence.h
index ff5c7134a37a..5cdb3a1f3995 100644
--- a/arch/x86/include/asm/kfence.h
+++ b/arch/x86/include/asm/kfence.h
@@ -37,34 +37,13 @@ static inline bool arch_kfence_init_pool(void)
 	return true;
 }
 
-/* Protect the given page and flush TLB. */
 static inline bool kfence_protect_page(unsigned long addr, bool protect)
 {
-	unsigned int level;
-	pte_t *pte = lookup_address(addr, &level);
-
-	if (WARN_ON(!pte || level != PG_LEVEL_4K))
-		return false;
-
-	/*
-	 * We need to avoid IPIs, as we may get KFENCE allocations or faults
-	 * with interrupts disabled. Therefore, the below is best-effort, and
-	 * does not flush TLBs on all CPUs. We can tolerate some inaccuracy;
-	 * lazy fault handling takes care of faults after the page is PRESENT.
-	 */
-
 	if (protect)
-		set_pte(pte, __pte(pte_val(*pte) & ~_PAGE_PRESENT));
+		set_memory_np(addr, addr + PAGE_SIZE);
 	else
-		set_pte(pte, __pte(pte_val(*pte) | _PAGE_PRESENT));
+		set_memory_p(addr, addr + PAGE_SIZE);
 
-	/*
-	 * Flush this CPU's TLB, assuming whoever did the allocation/free is
-	 * likely to continue running on this CPU.
-	 */
-	preempt_disable();
-	flush_tlb_one_kernel(addr);
-	preempt_enable();
 	return true;
 }
 

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* Re: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
  2022-11-17 14:34   ` Dave Hansen
@ 2022-11-17 23:23     ` Marco Elver
  2022-11-17 23:54       ` Dave Hansen
  2022-11-21  5:40     ` Naresh Kamboju
  1 sibling, 1 reply; 10+ messages in thread
From: Marco Elver @ 2022-11-17 23:23 UTC (permalink / raw)
  To: Dave Hansen
  Cc: Naresh Kamboju, Peter Zijlstra, kasan-dev, X86 ML, open list,
	linux-mm, regressions, lkft-triage, Andrew Morton,
	Alexander Potapenko

On Thu, Nov 17, 2022 at 06:34AM -0800, Dave Hansen wrote:
> On 11/17/22 05:58, Marco Elver wrote:
> > [    0.663761] WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect+0x7b/0x120
> > [    0.664033] WARNING: CPU: 0 PID: 0 at mm/kfence/core.c:234 kfence_protect+0x7d/0x120
> > [    0.664465] kfence: kfence_init failed
> 
> Any chance you could add some debugging and figure out what actually
> made kfence call over?  Was it the pte or the level?
> 
>         if (WARN_ON(!pte || level != PG_LEVEL_4K))
>                 return false;
> 
> I can see how the thing you bisected to might lead to a page table not
> being split, which could mess with the 'level' check.

Yes - it's the 'level != PG_LEVEL_4K'.

We do actually try to split the pages in arch_kfence_init_pool() (above
this function) - so with "x86/mm: Inhibit _PAGE_NX changes from
cpa_process_alias()" this somehow fails...

> Also, is there a reason this code is mucking with the page tables
> directly?  It seems, uh, rather wonky.  This, for instance:
> 
> >         if (protect)
> >                 set_pte(pte, __pte(pte_val(*pte) & ~_PAGE_PRESENT));
> >         else
> >                 set_pte(pte, __pte(pte_val(*pte) | _PAGE_PRESENT));
> > 
> >         /*
> >          * Flush this CPU's TLB, assuming whoever did the allocation/free is
> >          * likely to continue running on this CPU.
> >          */
> >         preempt_disable();
> >         flush_tlb_one_kernel(addr);
> >         preempt_enable();
> 
> Seems rather broken.  I assume the preempt_disable() is there to get rid
> of some warnings.  But, there is nothing I can see to *keep* the CPU
> that did the free from being different from the one where the TLB flush
> is performed until the preempt_disable().  That makes the
> flush_tlb_one_kernel() mostly useless.
> 
> Is there a reason this code isn't using the existing page table
> manipulation functions and tries to code its own?  What prevents it from
> using something like the attached patch?

Yes, see the comment below - it's to avoid the IPIs and TLB shoot-downs,
because KFENCE _can_ tolerate the inaccuracy even if we hit the wrong
TLB or other CPUs' TLBs aren't immediately flushed - we trade a few
false negatives for minimizing performance impact.

> diff --git a/arch/x86/include/asm/kfence.h b/arch/x86/include/asm/kfence.h
> index ff5c7134a37a..5cdb3a1f3995 100644
> --- a/arch/x86/include/asm/kfence.h
> +++ b/arch/x86/include/asm/kfence.h
> @@ -37,34 +37,13 @@ static inline bool arch_kfence_init_pool(void)
>  	return true;
>  }
>  
> -/* Protect the given page and flush TLB. */
>  static inline bool kfence_protect_page(unsigned long addr, bool protect)
>  {
> -	unsigned int level;
> -	pte_t *pte = lookup_address(addr, &level);
> -
> -	if (WARN_ON(!pte || level != PG_LEVEL_4K))
> -		return false;
> -
> -	/*
> -	 * We need to avoid IPIs, as we may get KFENCE allocations or faults
> -	 * with interrupts disabled. Therefore, the below is best-effort, and
> -	 * does not flush TLBs on all CPUs. We can tolerate some inaccuracy;
> -	 * lazy fault handling takes care of faults after the page is PRESENT.
> -	 */
> -

^^ See this comment. Additionally there's a real performance concern,
and the inaccuracy is something that we deliberately accept.

>  	if (protect)
> -		set_pte(pte, __pte(pte_val(*pte) & ~_PAGE_PRESENT));
> +		set_memory_np(addr, addr + PAGE_SIZE);
>  	else
> -		set_pte(pte, __pte(pte_val(*pte) | _PAGE_PRESENT));
> +		set_memory_p(addr, addr + PAGE_SIZE);

Isn't this going to do tons of IPIs and shoot down other CPU's TLBs?
KFENCE shouldn't incur this overhead on large machines with >100 CPUs if
we can avoid it.

What does "x86/mm: Inhibit _PAGE_NX changes from cpa_process_alias()" do
that suddenly makes all this fail?

What solution do you prefer that both fixes the issue and avoids the
IPIs?

Thanks,
-- Marco

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
  2022-11-17 23:23     ` Marco Elver
@ 2022-11-17 23:54       ` Dave Hansen
  2022-11-18  9:19         ` Marco Elver
                           ` (2 more replies)
  0 siblings, 3 replies; 10+ messages in thread
From: Dave Hansen @ 2022-11-17 23:54 UTC (permalink / raw)
  To: Marco Elver
  Cc: Naresh Kamboju, Peter Zijlstra, kasan-dev, X86 ML, open list,
	linux-mm, regressions, lkft-triage, Andrew Morton,
	Alexander Potapenko

[-- Attachment #1: Type: text/plain, Size: 517 bytes --]

On 11/17/22 15:23, Marco Elver wrote:
> Yes - it's the 'level != PG_LEVEL_4K'.

That plus the bisect made it pretty easy to find, thanks for the effort!

Could you double-check that the attached patch fixes it?  It seemed to
for me.

The issue was that the new "No changes, easy!" check in the suspect
commit didn't check the cpa->force_split option.  It didn't split down
to 4k and then all hell broke loose.

Oh, and I totally misread the kfence ability to tolerate partial TLB
flushes.  Sorry for the noise there!

[-- Attachment #2: kfence.patch --]
[-- Type: text/x-patch, Size: 505 bytes --]

diff --git a/arch/x86/mm/pat/set_memory.c b/arch/x86/mm/pat/set_memory.c
index 220361ceb997..9b4e2ad957f6 100644
--- a/arch/x86/mm/pat/set_memory.c
+++ b/arch/x86/mm/pat/set_memory.c
@@ -1727,7 +1727,8 @@ static int __change_page_attr_set_clr(struct cpa_data *cpa, int primary)
 	/*
 	 * No changes, easy!
 	 */
-	if (!(pgprot_val(cpa->mask_set) | pgprot_val(cpa->mask_clr)))
+	if (!(pgprot_val(cpa->mask_set) | pgprot_val(cpa->mask_clr))
+	    && !cpa->force_split)
 		return ret;
 
 	while (rempages) {

^ permalink raw reply related	[flat|nested] 10+ messages in thread

* Re: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
  2022-11-17 23:54       ` Dave Hansen
@ 2022-11-18  9:19         ` Marco Elver
  2022-11-18 10:32         ` Peter Zijlstra
  2022-11-21  7:28         ` Naresh Kamboju
  2 siblings, 0 replies; 10+ messages in thread
From: Marco Elver @ 2022-11-18  9:19 UTC (permalink / raw)
  To: Dave Hansen
  Cc: Naresh Kamboju, Peter Zijlstra, kasan-dev, X86 ML, open list,
	linux-mm, regressions, lkft-triage, Andrew Morton,
	Alexander Potapenko

On Thu, Nov 17, 2022 at 03:54PM -0800, Dave Hansen wrote:
> On 11/17/22 15:23, Marco Elver wrote:
> > Yes - it's the 'level != PG_LEVEL_4K'.
> 
> That plus the bisect made it pretty easy to find, thanks for the effort!
> 
> Could you double-check that the attached patch fixes it?  It seemed to
> for me.

Yes, that works - thanks!

> The issue was that the new "No changes, easy!" check in the suspect
> commit didn't check the cpa->force_split option.  It didn't split down
> to 4k and then all hell broke loose.
> 
> Oh, and I totally misread the kfence ability to tolerate partial TLB
> flushes.  Sorry for the noise there!

> diff --git a/arch/x86/mm/pat/set_memory.c b/arch/x86/mm/pat/set_memory.c
> index 220361ceb997..9b4e2ad957f6 100644
> --- a/arch/x86/mm/pat/set_memory.c
> +++ b/arch/x86/mm/pat/set_memory.c
> @@ -1727,7 +1727,8 @@ static int __change_page_attr_set_clr(struct cpa_data *cpa, int primary)
>  	/*
>  	 * No changes, easy!
>  	 */
> -	if (!(pgprot_val(cpa->mask_set) | pgprot_val(cpa->mask_clr)))
> +	if (!(pgprot_val(cpa->mask_set) | pgprot_val(cpa->mask_clr))
> +	    && !cpa->force_split)
>  		return ret;
>  
>  	while (rempages) {

Tested-by: Marco Elver <elver@google.com>

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
  2022-11-17 23:54       ` Dave Hansen
  2022-11-18  9:19         ` Marco Elver
@ 2022-11-18 10:32         ` Peter Zijlstra
  2022-11-21  7:28         ` Naresh Kamboju
  2 siblings, 0 replies; 10+ messages in thread
From: Peter Zijlstra @ 2022-11-18 10:32 UTC (permalink / raw)
  To: Dave Hansen
  Cc: Marco Elver, Naresh Kamboju, kasan-dev, X86 ML, open list,
	linux-mm, regressions, lkft-triage, Andrew Morton,
	Alexander Potapenko

On Thu, Nov 17, 2022 at 03:54:21PM -0800, Dave Hansen wrote:
> On 11/17/22 15:23, Marco Elver wrote:
> > Yes - it's the 'level != PG_LEVEL_4K'.
> 
> That plus the bisect made it pretty easy to find, thanks for the effort!
> 
> Could you double-check that the attached patch fixes it?  It seemed to
> for me.
> 
> The issue was that the new "No changes, easy!" check in the suspect
> commit didn't check the cpa->force_split option.  It didn't split down
> to 4k and then all hell broke loose.
> 
> Oh, and I totally misread the kfence ability to tolerate partial TLB
> flushes.  Sorry for the noise there!

> diff --git a/arch/x86/mm/pat/set_memory.c b/arch/x86/mm/pat/set_memory.c
> index 220361ceb997..9b4e2ad957f6 100644
> --- a/arch/x86/mm/pat/set_memory.c
> +++ b/arch/x86/mm/pat/set_memory.c
> @@ -1727,7 +1727,8 @@ static int __change_page_attr_set_clr(struct cpa_data *cpa, int primary)
>  	/*
>  	 * No changes, easy!
>  	 */
> -	if (!(pgprot_val(cpa->mask_set) | pgprot_val(cpa->mask_clr)))
> +	if (!(pgprot_val(cpa->mask_set) | pgprot_val(cpa->mask_clr))
> +	    && !cpa->force_split)

(operators go at the end of the previous line)

>  		return ret;
>  
>  	while (rempages) {

Urgh.. sorry about that.


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
  2022-11-17 14:34   ` Dave Hansen
  2022-11-17 23:23     ` Marco Elver
@ 2022-11-21  5:40     ` Naresh Kamboju
  1 sibling, 0 replies; 10+ messages in thread
From: Naresh Kamboju @ 2022-11-21  5:40 UTC (permalink / raw)
  To: Dave Hansen
  Cc: Marco Elver, Peter Zijlstra, kasan-dev, X86 ML, open list,
	linux-mm, regressions, lkft-triage, Andrew Morton,
	Alexander Potapenko

On Thu, 17 Nov 2022 at 20:04, Dave Hansen <dave.hansen@intel.com> wrote:
>
> On 11/17/22 05:58, Marco Elver wrote:
> > [    0.663761] WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect+0x7b/0x120
> > [    0.664033] WARNING: CPU: 0 PID: 0 at mm/kfence/core.c:234 kfence_protect+0x7d/0x120
> > [    0.664465] kfence: kfence_init failed
>
> Any chance you could add some debugging and figure out what actually
> made kfence call over?  Was it the pte or the level?
>
>         if (WARN_ON(!pte || level != PG_LEVEL_4K))
>                 return false;
>
> I can see how the thing you bisected to might lead to a page table not
> being split, which could mess with the 'level' check.
>
> Also, is there a reason this code is mucking with the page tables
> directly?  It seems, uh, rather wonky.  This, for instance:
>
> >         if (protect)
> >                 set_pte(pte, __pte(pte_val(*pte) & ~_PAGE_PRESENT));
> >         else
> >                 set_pte(pte, __pte(pte_val(*pte) | _PAGE_PRESENT));
> >
> >         /*
> >          * Flush this CPU's TLB, assuming whoever did the allocation/free is
> >          * likely to continue running on this CPU.
> >          */
> >         preempt_disable();
> >         flush_tlb_one_kernel(addr);
> >         preempt_enable();
>
> Seems rather broken.  I assume the preempt_disable() is there to get rid
> of some warnings.  But, there is nothing I can see to *keep* the CPU
> that did the free from being different from the one where the TLB flush
> is performed until the preempt_disable().  That makes the
> flush_tlb_one_kernel() mostly useless.
>
> Is there a reason this code isn't using the existing page table
> manipulation functions and tries to code its own?  What prevents it from
> using something like the attached patch?

I have applied this patch and found build warnings / errors.

In file included from mm/kfence/core.c:34:
arch/x86/include/asm/kfence.h: In function 'kfence_protect_page':
arch/x86/include/asm/kfence.h:45:17: error: implicit declaration of
function 'set_memory_p'; did you mean 'set_memory_np'?
[-Werror=implicit-function-declaration]
   45 |                 set_memory_p(addr, addr + PAGE_SIZE);
      |                 ^~~~~~~~~~~~
      |                 set_memory_np
cc1: all warnings being treated as errors
make[4]: *** [scripts/Makefile.build:250: mm/kfence/core.o] Error 1
In file included from mm/kfence/report.c:20:
arch/x86/include/asm/kfence.h: In function 'kfence_protect_page':
arch/x86/include/asm/kfence.h:45:17: error: implicit declaration of
function 'set_memory_p'; did you mean 'set_memory_np'?
[-Werror=implicit-function-declaration]
   45 |                 set_memory_p(addr, addr + PAGE_SIZE);
      |                 ^~~~~~~~~~~~
      |                 set_memory_np
cc1: all warnings being treated as errors
make[4]: *** [scripts/Makefile.build:250: mm/kfence/report.o] Error 1
In file included from mm/kfence/kfence_test.c:26:
arch/x86/include/asm/kfence.h: In function 'kfence_protect_page':
arch/x86/include/asm/kfence.h:45:17: error: implicit declaration of
function 'set_memory_p'; did you mean 'set_memory_np'?
[-Werror=implicit-function-declaration]
   45 |                 set_memory_p(addr, addr + PAGE_SIZE);
      |                 ^~~~~~~~~~~~
      |                 set_memory_np
cc1: all warnings being treated as errors
make[4]: *** [scripts/Makefile.build:250: mm/kfence/kfence_test.o] Error 1

ref:
https://builds.tuxbuild.com/2HqMWcweeInju7rqVgGdNge7gby/

- Naresh

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
  2022-11-17 23:54       ` Dave Hansen
  2022-11-18  9:19         ` Marco Elver
  2022-11-18 10:32         ` Peter Zijlstra
@ 2022-11-21  7:28         ` Naresh Kamboju
  2022-11-21  8:43           ` Marco Elver
  2 siblings, 1 reply; 10+ messages in thread
From: Naresh Kamboju @ 2022-11-21  7:28 UTC (permalink / raw)
  To: Dave Hansen
  Cc: Marco Elver, Peter Zijlstra, kasan-dev, X86 ML, open list,
	linux-mm, regressions, lkft-triage, Andrew Morton,
	Alexander Potapenko

[-- Attachment #1: Type: text/plain, Size: 2982 bytes --]

Hi Dave,

On Fri, 18 Nov 2022 at 05:24, Dave Hansen <dave.hansen@intel.com> wrote:
>
> On 11/17/22 15:23, Marco Elver wrote:
> > Yes - it's the 'level != PG_LEVEL_4K'.
>
> That plus the bisect made it pretty easy to find, thanks for the effort!
>
> Could you double-check that the attached patch fixes it?  It seemed to
> for me.

I have applied the attached patch on Linux next 20221118 and tested [1].
The reported issue has been fixed now.

Reported-by: Linux Kernel Functional Testing <lkft@linaro.org>
Tested-by: Linux Kernel Functional Testing <lkft@linaro.org>
Tested-by: Naresh Kamboju <naresh.kamboju@linaro.org>

OTOH,
I request you to walk through the boot and test log [1] (new see few failures).
 not ok 7 - test_double_free
 not ok 9 - test_invalid_addr_free
 not ok 11 - test_corruption
 not ok 18 - test_kmalloc_aligned_oob_write
 # kfence: pass:19 fail:4 skip:2 total:25
 # Totals: pass:19 fail:4 skip:2 total:25
 not ok 6 - kfence

> The issue was that the new "No changes, easy!" check in the suspect
> commit didn't check the cpa->force_split option.  It didn't split down
> to 4k and then all hell broke loose.
>
> Oh, and I totally misread the kfence ability to tolerate partial TLB
> flushes.  Sorry for the noise there!

[1] https://lkft.validation.linaro.org/scheduler/job/5866612#L621
[2] https://tuxmake.org/
[3] https://qa-reports.linaro.org/lkft/

Steps to reproduce by tuxmake
---

# To install tuxmake on your system globally:
# sudo pip3 install -U tuxmake
#
# See https://docs.tuxmake.org/ for complete documentation.
# Original tuxmake command with fragments listed below.
# tuxmake --runtime podman --target-arch x86_64 --toolchain gcc-11
--kconfig defconfig --kconfig-add
https://raw.githubusercontent.com/Linaro/meta-lkft/kirkstone/meta/recipes-kernel/linux/files/lkft.config
--kconfig-add https://raw.githubusercontent.com/Linaro/meta-lkft/kirkstone/meta/recipes-kernel/linux/files/lkft-crypto.config
--kconfig-add https://raw.githubusercontent.com/Linaro/meta-lkft/kirkstone/meta/recipes-kernel/linux/files/distro-overrides.config
--kconfig-add https://raw.githubusercontent.com/Linaro/meta-lkft/kirkstone/meta/recipes-kernel/linux/files/systemd.config
--kconfig-add https://raw.githubusercontent.com/Linaro/meta-lkft/kirkstone/meta/recipes-kernel/linux/files/virtio.config
--kconfig-add CONFIG_IGB=y --kconfig-add
CONFIG_UNWINDER_FRAME_POINTER=y --kconfig-add CONFIG_KASAN=y
--kconfig-add CONFIG_KUNIT=y --kconfig-add CONFIG_KUNIT_ALL_TESTS=y


echo 'Patch series used in this build is available from
https://builds.tuxbuild.com/2HqQsi6ygbnwoCIENR9NB1zm80E/people.linaro.org/~naresh.kamboju-0001-kfence-fixing-kunit-testing.patch'
echo '[WARNING] Build starting with assumption that the required
patches are already applied.'
echo 'Press any key to continue or Ctrl+C to abort.'
read var_name

tuxmake --runtime podman --target-arch x86_64 --toolchain gcc-11
--kconfig https://builds.tuxbuild.com/2HqQsi6ygbnwoCIENR9NB1zm80E/config

- Naresh

[-- Attachment #2: kfence.patch --]
[-- Type: application/x-patch, Size: 505 bytes --]

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #3: kfence-kunit-boot-test-log-on-qemu-x86-linux-next.log --]
[-- Type: text/x-log; charset="US-ASCII";  name="kfence-kunit-boot-test-log-on-qemu-x86-linux-next.log", Size: 490417 bytes --]

[    0.000000] Linux version 6.1.0-rc5-next-20221117 (tuxmake@tuxmake) (x86_64-linux-gnu-gcc (Debian 11.3.0-8) 11.3.0, GNU ld (GNU Binutils for Debian) 2.39) #1 SMP PREEMPT_DYNAMIC @1669010619
[    0.000000] Command line: root=/dev/sda  rootwait console=ttyS0,115200
[    0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
[    0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
[    0.000000] x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
[    0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format.
[    0.000000] signal: max sigframe size: 1776
[    0.000000] BIOS-provided physical RAM map:
[    0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
[    0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
[    0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
[    0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000bffddfff] usable
[    0.000000] BIOS-e820: [mem 0x00000000bffde000-0x00000000bfffffff] reserved
[    0.000000] BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved
[    0.000000] BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved
[    0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable
[    0.000000] NX (Execute Disable) protection: active
[    0.000000] SMBIOS 2.8 present.
[    0.000000] DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[    0.000000] Hypervisor detected: KVM
[    0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00
[    0.000003] kvm-clock: using sched offset of 1358436484 cycles
[    0.000010] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
[    0.000019] tsc: Detected 2099.960 MHz processor
[    0.002804] last_pfn = 0x140000 max_arch_pfn = 0x400000000
[    0.002846] x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WP  UC- WT  
[    0.002896] last_pfn = 0xbffde max_arch_pfn = 0x400000000
[    0.006673] found SMP MP-table at [mem 0x000f5a50-0x000f5a5f]
[    0.006712] Using GB pages for direct mapping
[    0.008738] ACPI: Early table checksum verification disabled
[    0.008749] ACPI: RSDP 0x00000000000F5A10 000014 (v00 BOCHS )
[    0.008764] ACPI: RSDT 0x00000000BFFE13E7 000034 (v01 BOCHS  BXPCRSDT 00000001 BXPC 00000001)
[    0.008781] ACPI: FACP 0x00000000BFFE1283 000074 (v01 BOCHS  BXPCFACP 00000001 BXPC 00000001)
[    0.008801] ACPI: DSDT 0x00000000BFFDFDC0 0014C3 (v01 BOCHS  BXPCDSDT 00000001 BXPC 00000001)
[    0.008814] ACPI: FACS 0x00000000BFFDFD80 000040
[    0.008824] ACPI: APIC 0x00000000BFFE12F7 000090 (v01 BOCHS  BXPCAPIC 00000001 BXPC 00000001)
[    0.008838] ACPI: HPET 0x00000000BFFE1387 000038 (v01 BOCHS  BXPCHPET 00000001 BXPC 00000001)
[    0.008851] ACPI: WAET 0x00000000BFFE13BF 000028 (v01 BOCHS  BXPCWAET 00000001 BXPC 00000001)
[    0.008863] ACPI: Reserving FACP table memory at [mem 0xbffe1283-0xbffe12f6]
[    0.008868] ACPI: Reserving DSDT table memory at [mem 0xbffdfdc0-0xbffe1282]
[    0.008873] ACPI: Reserving FACS table memory at [mem 0xbffdfd80-0xbffdfdbf]
[    0.008878] ACPI: Reserving APIC table memory at [mem 0xbffe12f7-0xbffe1386]
[    0.008882] ACPI: Reserving HPET table memory at [mem 0xbffe1387-0xbffe13be]
[    0.008886] ACPI: Reserving WAET table memory at [mem 0xbffe13bf-0xbffe13e6]
[    0.009882] No NUMA configuration found
[    0.009887] Faking a node at [mem 0x0000000000000000-0x000000013fffffff]
[    0.009900] NODE_DATA(0) allocated [mem 0x13fffa000-0x13fffdfff]
[    0.009948] Zone ranges:
[    0.009950]   DMA      [mem 0x0000000000001000-0x0000000000ffffff]
[    0.009957]   DMA32    [mem 0x0000000001000000-0x00000000ffffffff]
[    0.009962]   Normal   [mem 0x0000000100000000-0x000000013fffffff]
[    0.009968] Movable zone start for each node
[    0.009971] Early memory node ranges
[    0.009973]   node   0: [mem 0x0000000000001000-0x000000000009efff]
[    0.009977]   node   0: [mem 0x0000000000100000-0x00000000bffddfff]
[    0.009982]   node   0: [mem 0x0000000100000000-0x000000013fffffff]
[    0.009987] Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff]
[    0.012770] On node 0, zone DMA: 1 pages in unavailable ranges
[    0.013157] On node 0, zone DMA: 97 pages in unavailable ranges
[    0.218910] On node 0, zone Normal: 34 pages in unavailable ranges
[    0.933744] kasan: KernelAddressSanitizer initialized
[    0.934215] ACPI: PM-Timer IO Port: 0x608
[    0.934233] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
[    0.934272] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
[    0.934280] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
[    0.934286] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
[    0.934291] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
[    0.934296] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
[    0.934300] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
[    0.934313] ACPI: Using ACPI (MADT) for SMP configuration information
[    0.934316] ACPI: HPET id: 0x8086a201 base: 0xfed00000
[    0.934324] TSC deadline timer available
[    0.934330] smpboot: Allowing 4 CPUs, 0 hotplug CPUs
[    0.934356] kvm-guest: KVM setup pv remote TLB flush
[    0.934387] PM: hibernation: Registered nosave memory: [mem 0x00000000-0x00000fff]
[    0.934394] PM: hibernation: Registered nosave memory: [mem 0x0009f000-0x0009ffff]
[    0.934398] PM: hibernation: Registered nosave memory: [mem 0x000a0000-0x000effff]
[    0.934402] PM: hibernation: Registered nosave memory: [mem 0x000f0000-0x000fffff]
[    0.934408] PM: hibernation: Registered nosave memory: [mem 0xbffde000-0xbfffffff]
[    0.934412] PM: hibernation: Registered nosave memory: [mem 0xc0000000-0xfeffbfff]
[    0.934415] PM: hibernation: Registered nosave memory: [mem 0xfeffc000-0xfeffffff]
[    0.934419] PM: hibernation: Registered nosave memory: [mem 0xff000000-0xfffbffff]
[    0.934422] PM: hibernation: Registered nosave memory: [mem 0xfffc0000-0xffffffff]
[    0.934429] [mem 0xc0000000-0xfeffbfff] available for PCI devices
[    0.934433] Booting paravirtualized kernel on KVM
[    0.934439] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns
[    0.934456] setup_percpu: NR_CPUS:64 nr_cpumask_bits:4 nr_cpu_ids:4 nr_node_ids:1
[    0.936669] percpu: Embedded 66 pages/cpu s231848 r8192 d30296 u524288
[    0.936848] Fallback order for Node 0: 0 
[    0.936862] Built 1 zonelists, mobility grouping on.  Total pages: 1031902
[    0.936869] Policy zone: Normal
[    0.936874] Kernel command line: root=/dev/sda  rootwait console=ttyS0,115200
[    0.937098] random: crng init done
[    0.940708] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear)
[    0.942588] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear)
[    0.944313] mem auto-init: stack:off, heap alloc:off, heap free:off
[    0.950421] stackdepot hash table entries: 1048576 (order: 11, 8388608 bytes, linear)
[    0.950444] software IO TLB: area num 4.
[    1.235711] Memory: 3442872K/4193776K available (32768K kernel code, 10290K rwdata, 13284K rodata, 6648K init, 3340K bss, 750648K reserved, 0K cma-reserved)
[    1.236288] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
[    1.236369] ftrace: allocating 57558 entries in 225 pages
[    1.260341] ftrace: allocated 225 pages with 4 groups
[    1.262927] Dynamic Preempt: voluntary
[    1.265228] rcu: Preemptible hierarchical RCU implementation.
[    1.265234] rcu: 	RCU event tracing is enabled.
[    1.265236] rcu: 	RCU restricting CPUs from NR_CPUS=64 to nr_cpu_ids=4.
[    1.265243] 	Trampoline variant of Tasks RCU enabled.
[    1.265246] 	Rude variant of Tasks RCU enabled.
[    1.265249] rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies.
[    1.265253] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4
[    1.296965] NR_IRQS: 4352, nr_irqs: 456, preallocated irqs: 16
[    1.297353] rcu: srcu_init: Setting srcu_struct sizes based on contention.
[    1.297552] kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____)
[    1.306389] Console: colour VGA+ 80x25
[    1.417661] printk: console [ttyS0] enabled
[    1.418414] ACPI: Core revision 20221020
[    1.419591] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns
[    1.421184] APIC: Switch to symmetric I/O mode setup
[    1.422031] kvm-guest: setup PV IPIs
[    1.424214] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
[    1.425238] tsc: Marking TSC unstable due to TSCs unsynchronized
[    1.426262] Calibrating delay loop (skipped) preset value.. 4199.92 BogoMIPS (lpj=2099960)
[    1.427255] pid_max: default: 32768 minimum: 301
[    1.428429] LSM: initializing lsm=capability,integrity,selinux
[    1.429310] SELinux:  Initializing.
[    1.430576] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
[    1.431270] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear)
[    1.434030] Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127
[    1.434257] Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0
[    1.435264] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
[    1.436255] Spectre V2 : Mitigation: Retpolines
[    1.437253] Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch
[    1.438253] Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT
[    1.439253] Spectre V2 : Enabling Speculation Barrier for firmware calls
[    1.440253] RETBleed: Mitigation: untrained return thunk
[    1.441257] Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
[    1.442254] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl
[    1.504393] Freeing SMP alternatives memory: 48K
[    1.505575] smpboot: CPU0: AMD EPYC 7281 16-Core Processor (family: 0x17, model: 0x1, stepping: 0x2)
[    1.507089] cblist_init_generic: Setting adjustable number of callback queues.
[    1.507256] cblist_init_generic: Setting shift to 2 and lim to 1.
[    1.508290] cblist_init_generic: Setting shift to 2 and lim to 1.
[    1.509310] Performance Events: Fam17h+ core perfctr, AMD PMU driver.
[    1.510264] ... version:                0
[    1.510835] ... bit width:              48
[    1.511256] ... generic registers:      6
[    1.511820] ... value mask:             0000ffffffffffff
[    1.512262] ... max period:             00007fffffffffff
[    1.513012] ... fixed-purpose events:   0
[    1.513256] ... event mask:             000000000000003f
[    1.514349] rcu: Hierarchical SRCU implementation.
[    1.515028] rcu: 	Max phase no-delay instances is 400.
[    1.518675] smp: Bringing up secondary CPUs ...
[    1.520709] x86: Booting SMP configuration:
[    1.521259] .... node  #0, CPUs:      #1 #2 #3
[    1.526402] smp: Brought up 1 node, 4 CPUs
[    1.527938] smpboot: Max logical packages: 4
[    1.528257] smpboot: Total of 4 processors activated (16799.68 BogoMIPS)
[    1.531268] devtmpfs: initialized
[    1.539564] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns
[    1.540267] futex hash table entries: 1024 (order: 4, 65536 bytes, linear)
[    1.541744] PM: RTC time: 06:29:52, date: 2022-11-21
[    1.542918] NET: Registered PF_NETLINK/PF_ROUTE protocol family
[    1.544332] audit: initializing netlink subsys (disabled)
[    1.545316] audit: type=2000 audit(1669012193.490:1): state=initialized audit_enabled=0 res=1
[    1.546326] thermal_sys: Registered thermal governor 'step_wise'
[    1.547258] thermal_sys: Registered thermal governor 'user_space'
[    1.548380] cpuidle: using governor menu
[    1.551795] PCI: Using configuration type 1 for base access
[    1.552257] PCI: Using configuration type 1 for extended access
[    1.554350] kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible.
[    1.586377] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages
[    1.587259] HugeTLB: 28 KiB vmemmap can be freed for a 2.00 MiB page
[    1.590436] cryptd: max_cpu_qlen set to 1000
[    1.592635] ACPI: Added _OSI(Module Device)
[    1.593258] ACPI: Added _OSI(Processor Device)
[    1.594270] ACPI: Added _OSI(3.0 _SCP Extensions)
[    1.595258] ACPI: Added _OSI(Processor Aggregator Device)
[    1.627677] ACPI: 1 ACPI AML tables successfully acquired and loaded
[    1.639023] ACPI: Interpreter enabled
[    1.639424] ACPI: PM: (supports S0 S3 S4 S5)
[    1.640140] ACPI: Using IOAPIC for interrupt routing
[    1.641379] PCI: Using host bridge windows from ACPI; if necessary, use \"pci=nocrs\" and report a bug
[    1.642257] PCI: Using E820 reservations for host bridge windows
[    1.646539] ACPI: Enabled 2 GPEs in block 00 to 0F
[    1.716284] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
[    1.717294] acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3]
[    1.719727] PCI host bridge to bus 0000:00
[    1.720265] pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
[    1.721263] pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
[    1.722268] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
[    1.724266] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window]
[    1.725263] pci_bus 0000:00: root bus resource [mem 0x140000000-0x1bfffffff window]
[    1.726264] pci_bus 0000:00: root bus resource [bus 00-ff]
[    1.727576] pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
[    1.730680] pci 0000:00:01.0: [8086:7000] type 00 class 0x060100
[    1.734562] pci 0000:00:01.1: [8086:7010] type 00 class 0x010180
[    1.737805] pci 0000:00:01.1: reg 0x20: [io  0xc0a0-0xc0af]
[    1.740291] pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io  0x01f0-0x01f7]
[    1.741257] pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io  0x03f6]
[    1.742257] pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io  0x0170-0x0177]
[    1.744257] pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io  0x0376]
[    1.745992] pci 0000:00:01.3: [8086:7113] type 00 class 0x068000
[    1.746856] pci 0000:00:01.3: quirk: [io  0x0600-0x063f] claimed by PIIX4 ACPI
[    1.748269] pci 0000:00:01.3: quirk: [io  0x0700-0x070f] claimed by PIIX4 SMB
[    1.749911] pci 0000:00:02.0: [1234:1111] type 00 class 0x030000
[    1.752932] pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref]
[    1.758220] pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff]
[    1.768227] pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref]
[    1.771524] pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff]
[    1.776364] pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000
[    1.780183] pci 0000:00:03.0: reg 0x10: [io  0xc080-0xc09f]
[    1.783263] pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff]
[    1.789266] pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref]
[    1.793258] pci 0000:00:03.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref]
[    1.796850] pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000
[    1.799260] pci 0000:00:04.0: reg 0x10: [io  0xc000-0xc07f]
[    1.801963] pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff]
[    1.807263] pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref]
[    1.820789] ACPI: PCI: Interrupt link LNKA configured for IRQ 10
[    1.824533] ACPI: PCI: Interrupt link LNKB configured for IRQ 10
[    1.827451] ACPI: PCI: Interrupt link LNKC configured for IRQ 11
[    1.830436] ACPI: PCI: Interrupt link LNKD configured for IRQ 11
[    1.833137] ACPI: PCI: Interrupt link LNKS configured for IRQ 9
[    1.839571] iommu: Default domain type: Translated 
[    1.840258] iommu: DMA domain TLB invalidation policy: lazy mode 
[    1.842192] SCSI subsystem initialized
[    1.857517] ACPI: bus type USB registered
[    1.858622] usbcore: registered new interface driver usbfs
[    1.861551] usbcore: registered new interface driver hub
[    1.863471] usbcore: registered new device driver usb
[    1.865573] mc: Linux media interface: v0.10
[    1.866406] videodev: Linux video capture interface: v2.00
[    1.868374] pps_core: LinuxPPS API ver. 1 registered
[    1.869260] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
[    1.871396] PTP clock support registered
[    1.874537] Advanced Linux Sound Architecture Driver Initialized.
[    1.877829] NetLabel: Initializing
[    1.878257] NetLabel:  domain hash size = 128
[    1.878960] NetLabel:  protocols = UNLABELED CIPSOv4 CALIPSO
[    1.880506] NetLabel:  unlabeled traffic allowed by default
[    1.881449] PCI: Using ACPI for IRQ routing
[    1.882613] pci 0000:00:02.0: vgaarb: setting as boot VGA device
[    1.883249] pci 0000:00:02.0: vgaarb: bridge control possible
[    1.883249] pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none
[    1.885262] vgaarb: loaded
[    1.886082] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0
[    1.887257] hpet0: 3 comparators, 64-bit 100.000000 MHz counter
[    2.080060] clocksource: Switched to clocksource kvm-clock
[    2.082589] VFS: Disk quotas dquot_6.6.0
[    2.083365] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
[    2.084886] pnp: PnP ACPI init
[    2.091542] pnp: PnP ACPI: found 6 devices
[    2.125200] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
[    2.127384] NET: Registered PF_INET protocol family
[    2.129009] IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear)
[    2.137713] tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear)
[    2.140800] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
[    2.143510] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear)
[    2.146314] TCP bind hash table entries: 32768 (order: 8, 1048576 bytes, linear)
[    2.149938] TCP: Hash tables configured (established 32768 bind 32768)
[    2.151822] MPTCP token hash table entries: 4096 (order: 4, 98304 bytes, linear)
[    2.153185] UDP hash table entries: 2048 (order: 4, 65536 bytes, linear)
[    2.154387] UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear)
[    2.156015] NET: Registered PF_UNIX/PF_LOCAL protocol family
[    2.158238] RPC: Registered named UNIX socket transport module.
[    2.159198] RPC: Registered udp transport module.
[    2.159951] RPC: Registered tcp transport module.
[    2.160713] RPC: Registered tcp NFSv4.1 backchannel transport module.
[    2.164911] pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
[    2.165958] pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
[    2.166972] pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
[    2.168086] pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window]
[    2.169210] pci_bus 0000:00: resource 8 [mem 0x140000000-0x1bfffffff window]
[    2.170900] pci 0000:00:01.0: PIIX3: Enabling Passive Release
[    2.171864] pci 0000:00:00.0: Limiting direct PCI/PCI transfers
[    2.172973] PCI: CLS 0 bytes, default 64
[    2.174156] PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
[    2.175206] software IO TLB: mapped [mem 0x00000000bbfde000-0x00000000bffde000] (64MB)
[    2.176584] kvm: no hardware support for 'kvm_intel'
[    2.177755] kvm: Nested Virtualization enabled
[    2.178480] SVM: kvm: Nested Paging enabled
[    2.209028] cryptomgr_test (58) used greatest stack depth: 30568 bytes left
[    2.212466] cryptomgr_test (64) used greatest stack depth: 30168 bytes left
[    2.439846] Initialise system trusted keyrings
[    2.442309] workingset: timestamp_bits=40 max_order=20 bucket_order=0
[    2.552997] NFS: Registering the id_resolver key type
[    2.554577] Key type id_resolver registered
[    2.555277] Key type id_legacy registered
[    2.556399] 9p: Installing v9fs 9p2000 file system support
[    2.570771] NET: Registered PF_ALG protocol family
[    2.571611] Key type asymmetric registered
[    2.572308] Asymmetric key parser 'x509' registered
[    2.573210] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 250)
[    2.574462] io scheduler mq-deadline registered
[    2.575197] io scheduler kyber registered
[    2.577406] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
[    2.579319] ACPI: button: Power Button [PWRF]
[    4.709049] ACPI: \_SB_.LNKC: Enabled at IRQ 11
[    6.876017] ACPI: \_SB_.LNKD: Enabled at IRQ 10
[    6.879493] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled
[    6.880996] 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
[    6.886845] Non-volatile memory driver v1.3
[    6.887578] Linux agpgart interface v0.103
[    6.888714] ACPI: bus type drm_connector registered
[    6.913915] loop: module loaded
[    6.914795] virtio_blk virtio1: 4/0/0 default/read/poll queues
[    6.919006] virtio_blk virtio1: [vda] 1048576 512-byte logical blocks (537 MB/512 MiB)
[    6.930102] scsi host0: ata_piix
[    6.932932] scsi host1: ata_piix
[    6.934033] ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0a0 irq 14
[    6.935132] ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0a8 irq 15
[    6.944766] e100: Intel(R) PRO/100 Network Driver
[    6.946471] e100: Copyright(c) 1999-2006 Intel Corporation
[    6.948475] e1000: Intel(R) PRO/1000 Network Driver
[    6.949734] e1000: Copyright (c) 1999-2006 Intel Corporation.
[    6.951353] e1000e: Intel(R) PRO/1000 Network Driver
[    6.952664] e1000e: Copyright(c) 1999 - 2015 Intel Corporation.
[    6.953737] igb: Intel(R) Gigabit Ethernet Network Driver
[    6.954616] igb: Copyright (c) 2007-2014 Intel Corporation.
[    6.955615] sky2: driver version 1.30
[    6.956373] QLogic FastLinQ 4xxxx Core Module qed
[    6.957125] qede init: QLogic FastLinQ 4xxxx Ethernet Driver qede
[    6.958409] usbcore: registered new interface driver asix
[    6.959376] usbcore: registered new interface driver ax88179_178a
[    6.960413] usbcore: registered new interface driver cdc_ether
[    6.961376] usbcore: registered new interface driver net1080
[    6.962314] usbcore: registered new interface driver cdc_subset
[    6.963289] usbcore: registered new interface driver zaurus
[    6.964229] usbcore: registered new interface driver cdc_ncm
[    6.965182] usbcore: registered new interface driver r8153_ecm
[    6.967387] usbcore: registered new interface driver usblp
[    6.968354] usbcore: registered new interface driver usb-storage
[    6.969582] i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
[    6.972044] serio: i8042 KBD port at 0x60,0x64 irq 1
[    6.972905] serio: i8042 AUX port at 0x60,0x64 irq 12
[    6.975436] rtc_cmos 00:05: RTC can wake from S4
[    6.976946] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1
[    6.981599] rtc_cmos 00:05: registered as rtc0
[    6.984026] rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs
[    6.987729] device-mapper: ioctl: 4.47.0-ioctl (2022-07-28) initialised: dm-devel@redhat.com
[    6.992580] kworker/u8:3 (86) used greatest stack depth: 28968 bytes left
[    6.997180] hid: raw HID events driver (C) Jiri Kosina
[    7.000549] usbcore: registered new interface driver usbhid
[    7.001638] usbhid: USB HID core driver
[    7.006659] Initializing XFRM netlink socket
[    7.007815] NET: Registered PF_INET6 protocol family
[    7.011308] Segment Routing with IPv6
[    7.012121] In-situ OAM (IOAM) with IPv6
[    7.014147] sit: IPv6, IPv4 and MPLS over IPv4 tunneling driver
[    7.019057] NET: Registered PF_PACKET protocol family
[    7.021943] 9pnet: Installing 9P2000 support
[    7.023359] Key type dns_resolver registered
[    7.028912] IPI shorthand broadcast: enabled
[    7.030131] AVX2 version of gcm_enc/dec engaged.
[    7.031599] AES CTR mode by8 optimization enabled
[    7.092202] sched_clock: Marking stable (6965373124, 125883994)->(7116733466, -25476348)
[    7.094473] ata2: found unknown device (class 0)
[    7.095443] registered taskstats version 1
[    7.096207] Loading compiled-in X.509 certificates
[    7.096229] ata1: found unknown device (class 0)
[    7.100419] ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100
[    7.101692] ata1.00: ATA-7: QEMU HARDDISK, 2.5+, max UDMA/100
[    7.102648] ata1.00: 8400294 sectors, multi 16: LBA48 
[    7.105877] scsi 0:0:0:0: Direct-Access     ATA      QEMU HARDDISK    2.5+ PQ: 0 ANSI: 5
[    7.111485] sd 0:0:0:0: [sda] 8400294 512-byte logical blocks: (4.30 GB/4.00 GiB)
[    7.111534] sd 0:0:0:0: Attached scsi generic sg0 type 0
[    7.112658] sd 0:0:0:0: [sda] Write Protect is off
[    7.114657] sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
[    7.115358] scsi 1:0:0:0: CD-ROM            QEMU     QEMU DVD-ROM     2.5+ PQ: 0 ANSI: 5
[    7.116331] sd 0:0:0:0: [sda] Preferred minimum I/O size 512 bytes
[    7.127666] sd 0:0:0:0: [sda] Attached SCSI disk
[    7.157855] sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray
[    7.163315] cdrom: Uniform CD-ROM driver Revision: 3.20
[    7.189823] sr 1:0:0:0: Attached scsi generic sg1 type 5
[    7.194306] PM:   Magic number: 14:170:469
[    7.195164] leds input1::capslock: hash matches
[    7.196058] printk: console [netcon0] enabled
[    7.196826] netconsole: network logging started
[    7.199041] cfg80211: Loading compiled-in X.509 certificates for regulatory database
[    7.203309] cfg80211: Loaded X.509 cert 'sforshee: 00b28ddf47aef9cea7'
[    7.204647] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2
[    7.206045] cfg80211: failed to load regulatory.db
[    7.207294] ALSA device list:
[    7.208592]   No soundcards found.
[    7.209891] TAP version 14
[    7.210919] 1..52
[    7.211844]     # Subtest: time_test_cases
[    7.211858]     1..1
[   10.230341]     ok 1 - time64_to_tm_test_date_range
[   10.234099] ok 1 - time_test_cases
[   10.235841]     # Subtest: hw_breakpoint
[   10.235849]     1..9
[   10.237734]     ok 1 - test_one_cpu
[   10.239755]     ok 2 - test_many_cpus
[   10.241144]     ok 3 - test_one_task_on_all_cpus
[   10.243719]     ok 4 - test_two_tasks_on_all_cpus
[   10.245606]     ok 5 - test_one_task_on_one_cpu
[   10.247863]     ok 6 - test_one_task_mixed
[   10.250742]     ok 7 - test_two_tasks_on_one_cpu
[   10.253281]     ok 8 - test_two_tasks_on_one_all_cpus
[   10.255689]     ok 9 - test_task_on_all_and_one_cpu
[   10.257089] # hw_breakpoint: pass:9 fail:0 skip:0 total:9
[   10.258479] # Totals: pass:9 fail:0 skip:0 total:9
[   10.259911] ok 2 - hw_breakpoint
[   10.261968]     # Subtest: resource
[   10.261973]     1..2
[   10.262906]     ok 1 - resource_test_union
[   10.263583]     ok 2 - resource_test_intersection
[   10.264470] # resource: pass:2 fail:0 skip:0 total:2
[   10.265300] # Totals: pass:2 fail:0 skip:0 total:2
[   10.266155] ok 3 - resource
[   10.267554]     # Subtest: sysctl_test
[   10.267559]     1..10
[   10.268524]     ok 1 - sysctl_test_api_dointvec_null_tbl_data
[   10.269234]     ok 2 - sysctl_test_api_dointvec_table_maxlen_unset
[   10.270638]     ok 3 - sysctl_test_api_dointvec_table_len_is_zero
[   10.272000]     ok 4 - sysctl_test_api_dointvec_table_read_but_position_set
[   10.273317]     ok 5 - sysctl_test_dointvec_read_happy_single_positive
[   10.274804]     ok 6 - sysctl_test_dointvec_read_happy_single_negative
[   10.276319]     ok 7 - sysctl_test_dointvec_write_happy_single_positive
[   10.277899]     ok 8 - sysctl_test_dointvec_write_happy_single_negative
[   10.279392]     ok 9 - sysctl_test_api_dointvec_write_single_less_int_min
[   10.280830]     ok 10 - sysctl_test_api_dointvec_write_single_greater_int_max
[   10.281975] # sysctl_test: pass:10 fail:0 skip:0 total:10
[   10.283164] # Totals: pass:10 fail:0 skip:0 total:10
[   10.284080] ok 4 - sysctl_test
[   10.286062]     # Subtest: kasan
[   10.286070]     1..58
[   10.286955] ==================================================================
[   10.288719] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0xd0/0x330
[   10.289761] Write of size 1 at addr ffff888105144473 by task kunit_try_catch/287
[   10.290825] 
[   10.291058] CPU: 3 PID: 287 Comm: kunit_try_catch Tainted: G                 N 6.1.0-rc5-next-20221117 #1
[   10.292443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.293637] Call Trace:
[   10.294003]  <TASK>
[   10.294328]  dump_stack_lvl+0x4d/0x66
[   10.294871]  print_report+0x17a/0x471
[   10.295413]  ? kasan_complete_mode_report_info+0x40/0x210
[   10.296192]  ? kmalloc_oob_right+0xd0/0x330
[   10.297027]  kasan_report+0xb4/0x140
[   10.297740]  ? kmalloc_oob_right+0xd0/0x330
[   10.298580]  __asan_store1+0x69/0x70
[   10.299335]  kmalloc_oob_right+0xd0/0x330
[   10.300150]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.301072]  ? __kasan_check_write+0x18/0x20
[   10.301776]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.302455]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.303179]  ? trace_preempt_on+0x2e/0xf0
[   10.303794]  ? __kthread_parkme+0x4f/0xd0
[   10.304398]  kunit_try_run_case+0x95/0xd0
[   10.304988]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.305671]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.306547]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.307327]  kthread+0x17d/0x1b0
[   10.307803]  ? __pfx_kthread+0x10/0x10
[   10.308363]  ret_from_fork+0x2c/0x50
[   10.308893]  </TASK>
[   10.309220] 
[   10.309451] Allocated by task 287:
[   10.309949]  kasan_save_stack+0x2a/0x60
[   10.310513]  kasan_set_track+0x29/0x40
[   10.311064]  kasan_save_alloc_info+0x22/0x30
[   10.311689]  __kasan_kmalloc+0xb8/0xc0
[   10.312238]  kmalloc_trace+0x4e/0xb0
[   10.312780]  kmalloc_oob_right+0x9f/0x330
[   10.313368]  kunit_try_run_case+0x95/0xd0
[   10.313960]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.314748]  kthread+0x17d/0x1b0
[   10.315227]  ret_from_fork+0x2c/0x50
[   10.315758] 
[   10.315990] The buggy address belongs to the object at ffff888105144400
[   10.315990]  which belongs to the cache kmalloc-128 of size 128
[   10.317973] The buggy address is located 115 bytes inside of
[   10.317973]  128-byte region [ffff888105144400, ffff888105144480)
[   10.319844] 
[   10.320094] The buggy address belongs to the physical page:
[   10.320985] page:00000000f40eef31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105144
[   10.322444] flags: 0x200000000000200(slab|node=0|zone=2)
[   10.323282] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   10.324493] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   10.325692] page dumped because: kasan: bad access detected
[   10.326556] 
[   10.326804] Memory state around the buggy address:
[   10.327555]  ffff888105144300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.328710]  ffff888105144380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.329832] >ffff888105144400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.330952]                                                              ^
[   10.332021]  ffff888105144480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.333161]  ffff888105144500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.334276] ==================================================================
[   10.335491] Disabling lock debugging due to kernel taint
[   10.336575] ==================================================================
[   10.337966] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x10c/0x330
[   10.339299] Write of size 1 at addr ffff888105144478 by task kunit_try_catch/287
[   10.340729] 
[   10.341051] CPU: 3 PID: 287 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.342789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.344079] Call Trace:
[   10.344485]  <TASK>
[   10.344826]  dump_stack_lvl+0x4d/0x66
[   10.345407]  print_report+0x17a/0x471
[   10.345990]  ? kasan_complete_mode_report_info+0x40/0x210
[   10.346834]  ? kmalloc_oob_right+0x10c/0x330
[   10.347506]  kasan_report+0xb4/0x140
[   10.348075]  ? kmalloc_oob_right+0x10c/0x330
[   10.348789]  __asan_store1+0x69/0x70
[   10.349361]  kmalloc_oob_right+0x10c/0x330
[   10.350011]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.350739]  ? __kasan_check_write+0x18/0x20
[   10.351413]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.352142]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.352974]  ? trace_preempt_on+0x2e/0xf0
[   10.353571]  ? __kthread_parkme+0x4f/0xd0
[   10.354161]  kunit_try_run_case+0x95/0xd0
[   10.354756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.355448]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.356349]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.357136]  kthread+0x17d/0x1b0
[   10.357616]  ? __pfx_kthread+0x10/0x10
[   10.358168]  ret_from_fork+0x2c/0x50
[   10.358701]  </TASK>
[   10.359033] 
[   10.359265] Allocated by task 287:
[   10.359767]  kasan_save_stack+0x2a/0x60
[   10.360380]  kasan_set_track+0x29/0x40
[   10.360933]  kasan_save_alloc_info+0x22/0x30
[   10.361768]  __kasan_kmalloc+0xb8/0xc0
[   10.362644]  kmalloc_trace+0x4e/0xb0
[   10.363468]  kmalloc_oob_right+0x9f/0x330
[   10.364408]  kunit_try_run_case+0x95/0xd0
[   10.365335]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.366559]  kthread+0x17d/0x1b0
[   10.367304]  ret_from_fork+0x2c/0x50
[   10.368129] 
[   10.368635] The buggy address belongs to the object at ffff888105144400
[   10.368635]  which belongs to the cache kmalloc-128 of size 128
[   10.370960] The buggy address is located 120 bytes inside of
[   10.370960]  128-byte region [ffff888105144400, ffff888105144480)
[   10.372856] 
[   10.373111] The buggy address belongs to the physical page:
[   10.373998] page:00000000f40eef31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105144
[   10.375476] flags: 0x200000000000200(slab|node=0|zone=2)
[   10.376338] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   10.377556] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   10.378775] page dumped because: kasan: bad access detected
[   10.379657] 
[   10.379909] Memory state around the buggy address:
[   10.380703]  ffff888105144300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   10.381842]  ffff888105144380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.382981] >ffff888105144400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.384115]                                                                 ^
[   10.385354]  ffff888105144480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.386621]  ffff888105144500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.387735] ==================================================================
[   10.388909] ==================================================================
[   10.390033] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x14b/0x330
[   10.391113] Read of size 1 at addr ffff888105144480 by task kunit_try_catch/287
[   10.392245] 
[   10.392534] CPU: 3 PID: 287 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.394009] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.395304] Call Trace:
[   10.395699]  <TASK>
[   10.396042]  dump_stack_lvl+0x4d/0x66
[   10.396616]  print_report+0x17a/0x471
[   10.397163]  ? kasan_complete_mode_report_info+0x40/0x210
[   10.397953]  ? kmalloc_oob_right+0x14b/0x330
[   10.398581]  kasan_report+0xb4/0x140
[   10.399113]  ? kmalloc_oob_right+0x14b/0x330
[   10.399742]  __asan_load1+0x66/0x70
[   10.400260]  kmalloc_oob_right+0x14b/0x330
[   10.400914]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   10.401591]  ? __kasan_check_write+0x18/0x20
[   10.402217]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.402896]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.403623]  ? trace_preempt_on+0x2e/0xf0
[   10.404213]  ? __kthread_parkme+0x4f/0xd0
[   10.404823]  kunit_try_run_case+0x95/0xd0
[   10.405416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.406107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.406992]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.407779]  kthread+0x17d/0x1b0
[   10.408259]  ? __pfx_kthread+0x10/0x10
[   10.408829]  ret_from_fork+0x2c/0x50
[   10.409362]  </TASK>
[   10.409691] 
[   10.409922] Allocated by task 287:
[   10.410424]  kasan_save_stack+0x2a/0x60
[   10.410989]  kasan_set_track+0x29/0x40
[   10.411554]  kasan_save_alloc_info+0x22/0x30
[   10.412197]  __kasan_kmalloc+0xb8/0xc0
[   10.412914]  kmalloc_trace+0x4e/0xb0
[   10.413659]  kmalloc_oob_right+0x9f/0x330
[   10.414456]  kunit_try_run_case+0x95/0xd0
[   10.415252]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.416434]  kthread+0x17d/0x1b0
[   10.416962]  ret_from_fork+0x2c/0x50
[   10.417543] 
[   10.417797] The buggy address belongs to the object at ffff888105144400
[   10.417797]  which belongs to the cache kmalloc-128 of size 128
[   10.419750] The buggy address is located 0 bytes to the right of
[   10.419750]  128-byte region [ffff888105144400, ffff888105144480)
[   10.421649] 
[   10.421902] The buggy address belongs to the physical page:
[   10.422789] page:00000000f40eef31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105144
[   10.424259] flags: 0x200000000000200(slab|node=0|zone=2)
[   10.425131] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   10.426375] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   10.427602] page dumped because: kasan: bad access detected
[   10.428505] 
[   10.428759] Memory state around the buggy address:
[   10.429527]  ffff888105144380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.430679]  ffff888105144400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   10.431795] >ffff888105144480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.432920]                    ^
[   10.433427]  ffff888105144500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.434535]  ffff888105144580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.435643] ==================================================================
[   10.436891]     ok 1 - kmalloc_oob_right
[   10.436935] kunit_try_catch (287) used greatest stack depth: 28456 bytes left
[   10.437325] ==================================================================
[   10.442529] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0xd0/0x1f0
[   10.444885] Read of size 1 at addr ffff8881042165bf by task kunit_try_catch/288
[   10.446784] 
[   10.447163] CPU: 2 PID: 288 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.449391] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.451323] Call Trace:
[   10.451912]  <TASK>
[   10.452479]  dump_stack_lvl+0x4d/0x66
[   10.453441]  print_report+0x17a/0x471
[   10.454070]  ? kasan_complete_mode_report_info+0x80/0x210
[   10.454887]  ? kmalloc_oob_left+0xd0/0x1f0
[   10.455519]  kasan_report+0xb4/0x140
[   10.456095]  ? kmalloc_oob_left+0xd0/0x1f0
[   10.456773]  __asan_load1+0x66/0x70
[   10.457337]  kmalloc_oob_left+0xd0/0x1f0
[   10.457922]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   10.458637]  ? __kasan_check_write+0x18/0x20
[   10.459320]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.460003]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.460819]  ? trace_preempt_on+0x2e/0xf0
[   10.461458]  ? __kthread_parkme+0x4f/0xd0
[   10.462056]  kunit_try_run_case+0x95/0xd0
[   10.462704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.463444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.464399]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.465246]  kthread+0x17d/0x1b0
[   10.465739]  ? __pfx_kthread+0x10/0x10
[   10.466320]  ret_from_fork+0x2c/0x50
[   10.466900]  </TASK>
[   10.467259] 
[   10.467514] Allocated by task 33:
[   10.468062]  kasan_save_stack+0x2a/0x60
[   10.468720]  kasan_set_track+0x29/0x40
[   10.469322]  kasan_save_alloc_info+0x22/0x30
[   10.469955]  __kasan_kmalloc+0xb8/0xc0
[   10.470521]  __kmalloc_node_track_caller+0x67/0x150
[   10.471240]  kstrdup+0x3b/0x70
[   10.471751]  devtmpfs_work_loop+0x2b9/0x420
[   10.472481]  devtmpfsd+0x32/0x46
[   10.473002]  kthread+0x17d/0x1b0
[   10.473540]  ret_from_fork+0x2c/0x50
[   10.474116] 
[   10.474367] Freed by task 33:
[   10.474811]  kasan_save_stack+0x2a/0x60
[   10.475391]  kasan_set_track+0x29/0x40
[   10.475948]  kasan_save_free_info+0x32/0x50
[   10.476644]  ____kasan_slab_free+0x174/0x1e0
[   10.477325]  __kasan_slab_free+0x16/0x20
[   10.477913]  __kmem_cache_free+0x18e/0x300
[   10.478553]  kfree+0x7d/0x120
[   10.479033]  devtmpfs_work_loop+0x3c2/0x420
[   10.479704]  devtmpfsd+0x32/0x46
[   10.480224]  kthread+0x17d/0x1b0
[   10.480808]  ret_from_fork+0x2c/0x50
[   10.481394] 
[   10.481646] The buggy address belongs to the object at ffff8881042165a0
[   10.481646]  which belongs to the cache kmalloc-16 of size 16
[   10.483562] The buggy address is located 15 bytes to the right of
[   10.483562]  16-byte region [ffff8881042165a0, ffff8881042165b0)
[   10.486607] 
[   10.487122] The buggy address belongs to the physical page:
[   10.488909] page:0000000037be271b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104216
[   10.491867] flags: 0x200000000000200(slab|node=0|zone=2)
[   10.494159] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   10.496951] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   10.498872] page dumped because: kasan: bad access detected
[   10.500247] 
[   10.500653] Memory state around the buggy address:
[   10.501908]  ffff888104216480: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   10.503715]  ffff888104216500: fa fb fc fc fa fb fc fc 00 06 fc fc 00 06 fc fc
[   10.505551] >ffff888104216580: 00 06 fc fc fa fb fc fc 00 07 fc fc fc fc fc fc
[   10.506592]                                         ^
[   10.507370]  ffff888104216600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.508428]  ffff888104216680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.509462] ==================================================================
[   10.510641]     ok 2 - kmalloc_oob_left
[   10.511127] ==================================================================
[   10.512927] input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3
[   10.513271] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0xd5/0x200
[   10.513284] Read of size 1 at addr ffff888101157000 by task kunit_try_catch/289
[   10.516965] 
[   10.517200] CPU: 3 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.518570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.519769] Call Trace:
[   10.520136]  <TASK>
[   10.520461]  dump_stack_lvl+0x4d/0x66
[   10.521004]  print_report+0x17a/0x471
[   10.521548]  ? kasan_complete_mode_report_info+0x40/0x210
[   10.522365]  ? kmalloc_node_oob_right+0xd5/0x200
[   10.523045]  kasan_report+0xb4/0x140
[   10.523628]  ? kmalloc_node_oob_right+0xd5/0x200
[   10.524387]  __asan_load1+0x66/0x70
[   10.525135]  kmalloc_node_oob_right+0xd5/0x200
[   10.525984]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   10.526754]  ? __kasan_check_write+0x18/0x20
[   10.527402]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.528130]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.528936]  ? trace_preempt_on+0x2e/0xf0
[   10.529596]  ? __kthread_parkme+0x4f/0xd0
[   10.530239]  kunit_try_run_case+0x95/0xd0
[   10.530898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.531654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.532619]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.533466]  kthread+0x17d/0x1b0
[   10.534006]  ? __pfx_kthread+0x10/0x10
[   10.534633]  ret_from_fork+0x2c/0x50
[   10.535231]  </TASK>
[   10.535636] 
[   10.535891] Allocated by task 289:
[   10.536481]  kasan_save_stack+0x2a/0x60
[   10.537115]  kasan_set_track+0x29/0x40
[   10.537726]  kasan_save_alloc_info+0x22/0x30
[   10.538412]  __kasan_kmalloc+0xb8/0xc0
[   10.539025]  kmalloc_node_trace+0x49/0xb0
[   10.539678]  kmalloc_node_oob_right+0xa1/0x200
[   10.540399]  kunit_try_run_case+0x95/0xd0
[   10.541038]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.541893]  kthread+0x17d/0x1b0
[   10.542415]  ret_from_fork+0x2c/0x50
[   10.542987] 
[   10.543236] The buggy address belongs to the object at ffff888101156000
[   10.543236]  which belongs to the cache kmalloc-4k of size 4096
[   10.545191] The buggy address is located 0 bytes to the right of
[   10.545191]  4096-byte region [ffff888101156000, ffff888101157000)
[   10.547096] 
[   10.547366] The buggy address belongs to the physical page:
[   10.548237] page:0000000096b548f4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101150
[   10.549747] head:0000000096b548f4 order:3 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   10.551183] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   10.552092] raw: 0200000000010200 ffff888100043040 dead000000000122 0000000000000000
[   10.553338] raw: 0000000000000000 0000000080040004 00000001ffffffff 0000000000000000
[   10.554546] page dumped because: kasan: bad access detected
[   10.555423] 
[   10.555673] Memory state around the buggy address:
[   10.556477]  ffff888101156f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.557627]  ffff888101156f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.558731] >ffff888101157000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.559832]                    ^
[   10.560395]  ffff888101157080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.561510]  ffff888101157100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.562595] ==================================================================
[   10.563885]     ok 3 - kmalloc_node_oob_right
[   10.564351] ==================================================================
[   10.566199] BUG: KASAN: slab-out-of-bounds in kmalloc_pagealloc_oob_right+0xbe/0x1d0
[   10.567417] Write of size 1 at addr ffff88810548e00a by task kunit_try_catch/290
[   10.568540] 
[   10.568794] CPU: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.570320] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.572188] Call Trace:
[   10.572856]  <TASK>
[   10.573756]  dump_stack_lvl+0x4d/0x66
[   10.574995]  print_report+0x17a/0x471
[   10.576294]  ? kasan_addr_to_slab+0x11/0xb0
[   10.577729]  ? kmalloc_pagealloc_oob_right+0xbe/0x1d0
[   10.579475]  kasan_report+0xb4/0x140
[   10.580683]  ? kmalloc_pagealloc_oob_right+0xbe/0x1d0
[   10.582185]  __asan_store1+0x69/0x70
[   10.583096]  kmalloc_pagealloc_oob_right+0xbe/0x1d0
[   10.583863]  ? __pfx_kmalloc_pagealloc_oob_right+0x10/0x10
[   10.584675]  ? __kasan_check_write+0x18/0x20
[   10.585293]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.585959]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.586676]  ? trace_preempt_on+0x2e/0xf0
[   10.587259]  ? __kthread_parkme+0x4f/0xd0
[   10.587842]  kunit_try_run_case+0x95/0xd0
[   10.588436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.589117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.589989]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.590766]  kthread+0x17d/0x1b0
[   10.591239]  ? __pfx_kthread+0x10/0x10
[   10.591785]  ret_from_fork+0x2c/0x50
[   10.592320]  </TASK>
[   10.592647] 
[   10.592877] The buggy address belongs to the physical page:
[   10.593675] page:000000005fa0a0b2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10548c
[   10.595007] head:000000005fa0a0b2 order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   10.596330] flags: 0x200000000010000(head|node=0|zone=2)
[   10.597101] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   10.598209] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   10.599309] page dumped because: kasan: bad access detected
[   10.600103] 
[   10.600343] Memory state around the buggy address:
[   10.601034]  ffff88810548df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.602436]  ffff88810548df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.605003] >ffff88810548e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.607548]                       ^
[   10.608827]  ffff88810548e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.611390]  ffff88810548e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   10.614057] ==================================================================
[   10.615686]     ok 4 - kmalloc_pagealloc_oob_right
[   10.616383] ==================================================================
[   10.620748] BUG: KASAN: use-after-free in kmalloc_pagealloc_uaf+0xbd/0x1b0
[   10.622097] Read of size 1 at addr ffff8881054a4000 by task kunit_try_catch/291
[   10.623957] 
[   10.624380] CPU: 3 PID: 291 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.626764] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.628861] Call Trace:
[   10.629502]  <TASK>
[   10.630049]  dump_stack_lvl+0x4d/0x66
[   10.630992]  print_report+0x17a/0x471
[   10.631938]  ? kasan_addr_to_slab+0x11/0xb0
[   10.633066]  ? kmalloc_pagealloc_uaf+0xbd/0x1b0
[   10.633995]  kasan_report+0xb4/0x140
[   10.634607]  ? kmalloc_pagealloc_uaf+0xbd/0x1b0
[   10.635375]  __asan_load1+0x66/0x70
[   10.635957]  kmalloc_pagealloc_uaf+0xbd/0x1b0
[   10.636734]  ? __pfx_kmalloc_pagealloc_uaf+0x10/0x10
[   10.637570]  ? __kasan_check_write+0x18/0x20
[   10.638284]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.639055]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.639876]  ? trace_preempt_on+0x2e/0xf0
[   10.640588]  ? __kthread_parkme+0x4f/0xd0
[   10.641257]  kunit_try_run_case+0x95/0xd0
[   10.641933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.642719]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.643729]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.644658]  kthread+0x17d/0x1b0
[   10.645199]  ? __pfx_kthread+0x10/0x10
[   10.645843]  ret_from_fork+0x2c/0x50
[   10.646462]  </TASK>
[   10.646834] 
[   10.647094] The buggy address belongs to the physical page:
[   10.648036] page:0000000040e361a3 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1054a4
[   10.649580] flags: 0x200000000000000(node=0|zone=2)
[   10.650380] raw: 0200000000000000 ffffea0004152a08 ffff88811b5bc7b8 0000000000000000
[   10.651630] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   10.653134] page dumped because: kasan: bad access detected
[   10.654369] 
[   10.654722] Memory state around the buggy address:
[   10.655551]  ffff8881054a3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.656663]  ffff8881054a3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.657767] >ffff8881054a4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.658857]                    ^
[   10.659357]  ffff8881054a4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.660453]  ffff8881054a4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.661541] ==================================================================
[   10.662791]     ok 5 - kmalloc_pagealloc_uaf
[   10.663134] ==================================================================
[   10.667500] BUG: KASAN: invalid-free in kfree+0xff/0x120
[   10.668376] Free of addr ffff88810548c001 by task kunit_try_catch/292
[   10.670612] 
[   10.671215] CPU: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.674802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.677733] Call Trace:
[   10.678140]  <TASK>
[   10.678494]  dump_stack_lvl+0x4d/0x66
[   10.679091]  print_report+0x17a/0x471
[   10.679690]  ? kfree+0xff/0x120
[   10.680200]  ? kasan_addr_to_slab+0x11/0xb0
[   10.680889]  ? kfree+0xff/0x120
[   10.681404]  kasan_report_invalid_free+0x85/0x100
[   10.682164]  ? kfree+0xff/0x120
[   10.682678]  ? kfree+0xff/0x120
[   10.683192]  __kasan_kfree_large+0x87/0xe0
[   10.683862]  free_large_kmalloc+0x4a/0xc0
[   10.684526]  kfree+0xff/0x120
[   10.685011]  kmalloc_pagealloc_invalid_free+0xb2/0x1b0
[   10.685836]  ? __pfx_kmalloc_pagealloc_invalid_free+0x10/0x10
[   10.686779]  ? __kasan_check_write+0x18/0x20
[   10.687452]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.688178]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.689008]  ? trace_preempt_on+0x2e/0xf0
[   10.689642]  ? __kthread_parkme+0x4f/0xd0
[   10.690273]  kunit_try_run_case+0x95/0xd0
[   10.690909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.691684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.692764]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.693672]  kthread+0x17d/0x1b0
[   10.694204]  ? __pfx_kthread+0x10/0x10
[   10.694836]  ret_from_fork+0x2c/0x50
[   10.695443]  </TASK>
[   10.695800] 
[   10.696080] The buggy address belongs to the physical page:
[   10.696934] page:000000005fa0a0b2 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10548c
[   10.698439] head:000000005fa0a0b2 order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   10.700011] flags: 0x200000000010000(head|node=0|zone=2)
[   10.700862] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   10.702098] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   10.703285] page dumped because: kasan: bad access detected
[   10.704148] 
[   10.704423] Memory state around the buggy address:
[   10.705119]  ffff88810548bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.706155]  ffff88810548bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.707194] >ffff88810548c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.708232]                    ^
[   10.708724]  ffff88810548c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.709762]  ffff88810548c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.710804] ==================================================================
[   10.711988]     ok 6 - kmalloc_pagealloc_invalid_free
[   10.712116] kunit_try_catch (292) used greatest stack depth: 28400 bytes left
[   10.713315]     ok 7 - pagealloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   10.714527] ==================================================================
[   10.718803] BUG: KASAN: use-after-free in pagealloc_uaf+0xeb/0x1e0
[   10.720243] Read of size 1 at addr ffff8881052e0000 by task kunit_try_catch/294
[   10.721954] 
[   10.722326] CPU: 2 PID: 294 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.724657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.726611] Call Trace:
[   10.727212]  <TASK>
[   10.727782]  dump_stack_lvl+0x4d/0x66
[   10.729003]  print_report+0x17a/0x471
[   10.730263]  ? kasan_addr_to_slab+0x11/0xb0
[   10.731667]  ? pagealloc_uaf+0xeb/0x1e0
[   10.732841]  kasan_report+0xb4/0x140
[   10.733682]  ? pagealloc_uaf+0xeb/0x1e0
[   10.734314]  __asan_load1+0x66/0x70
[   10.734900]  pagealloc_uaf+0xeb/0x1e0
[   10.735509]  ? __pfx_pagealloc_uaf+0x10/0x10
[   10.736211]  ? __kasan_check_write+0x18/0x20
[   10.736928]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.737687]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.738496]  ? trace_preempt_on+0x2e/0xf0
[   10.739154]  ? __kthread_parkme+0x4f/0xd0
[   10.739814]  kunit_try_run_case+0x95/0xd0
[   10.740486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.741255]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.742238]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.743111]  kthread+0x17d/0x1b0
[   10.743652]  ? __pfx_kthread+0x10/0x10
[   10.744289]  ret_from_fork+0x2c/0x50
[   10.744888]  </TASK>
[   10.745255] 
[   10.745513] The buggy address belongs to the physical page:
[   10.746424] page:00000000197e2211 refcount:0 mapcount:-128 mapping:0000000000000000 index:0x0 pfn:0x1052e0
[   10.747978] flags: 0x200000000000000(node=0|zone=2)
[   10.748786] raw: 0200000000000000 ffffea000414a808 ffff88813fffaba8 0000000000000000
[   10.750022] raw: 0000000000000000 0000000000000005 00000000ffffff7f 0000000000000000
[   10.751262] page dumped because: kasan: bad access detected
[   10.752155] 
[   10.752423] Memory state around the buggy address:
[   10.753204]  ffff8881052dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.754370]  ffff8881052dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.755526] >ffff8881052e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.756701]                    ^
[   10.757232]  ffff8881052e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.758388]  ffff8881052e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.759547] ==================================================================
[   10.760812]     ok 8 - pagealloc_uaf
[   10.761205] ==================================================================
[   10.763980] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0xd1/0x1e0
[   10.766543] Write of size 1 at addr ffff888105461f00 by task kunit_try_catch/295
[   10.768893] 
[   10.769260] CPU: 3 PID: 295 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.771647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.773727] Call Trace:
[   10.774359]  <TASK>
[   10.774894]  dump_stack_lvl+0x4d/0x66
[   10.775820]  print_report+0x17a/0x471
[   10.776773]  ? kasan_complete_mode_report_info+0x40/0x210
[   10.778111]  ? kmalloc_large_oob_right+0xd1/0x1e0
[   10.779435]  kasan_report+0xb4/0x140
[   10.780469]  ? kmalloc_large_oob_right+0xd1/0x1e0
[   10.781788]  __asan_store1+0x69/0x70
[   10.782955]  kmalloc_large_oob_right+0xd1/0x1e0
[   10.784228]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   10.785688]  ? __kasan_check_write+0x18/0x20
[   10.786969]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.787954]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.788771]  ? trace_preempt_on+0x2e/0xf0
[   10.789394]  ? __kthread_parkme+0x4f/0xd0
[   10.790016]  kunit_try_run_case+0x95/0xd0
[   10.790633]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.791366]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.792311]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.793134]  kthread+0x17d/0x1b0
[   10.793635]  ? __pfx_kthread+0x10/0x10
[   10.794210]  ret_from_fork+0x2c/0x50
[   10.794765]  </TASK>
[   10.795107] 
[   10.795347] Allocated by task 295:
[   10.795869]  kasan_save_stack+0x2a/0x60
[   10.796472]  kasan_set_track+0x29/0x40
[   10.797051]  kasan_save_alloc_info+0x22/0x30
[   10.797712]  __kasan_kmalloc+0xb8/0xc0
[   10.798323]  kmalloc_trace+0x4e/0xb0
[   10.798919]  kmalloc_large_oob_right+0x9d/0x1e0
[   10.799673]  kunit_try_run_case+0x95/0xd0
[   10.800373]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.801230]  kthread+0x17d/0x1b0
[   10.801799]  ret_from_fork+0x2c/0x50
[   10.802392] 
[   10.802647] The buggy address belongs to the object at ffff888105460000
[   10.802647]  which belongs to the cache kmalloc-8k of size 8192
[   10.804756] The buggy address is located 7936 bytes inside of
[   10.804756]  8192-byte region [ffff888105460000, ffff888105462000)
[   10.807191] 
[   10.807453] The buggy address belongs to the physical page:
[   10.808372] page:00000000154b7ba3 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105460
[   10.809913] head:00000000154b7ba3 order:3 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   10.811434] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   10.812417] raw: 0200000000010200 ffff888100043180 dead000000000122 0000000000000000
[   10.813687] raw: 0000000000000000 0000000080020002 00000001ffffffff 0000000000000000
[   10.814921] page dumped because: kasan: bad access detected
[   10.815810] 
[   10.816066] Memory state around the buggy address:
[   10.816868]  ffff888105461e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.818016]  ffff888105461e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.819164] >ffff888105461f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.820318]                    ^
[   10.820845]  ffff888105461f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.821987]  ffff888105462000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.823130] ==================================================================
[   10.824363]     ok 9 - kmalloc_large_oob_right
[   10.824772] ==================================================================
[   10.827680] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x3a0
[   10.829570] Write of size 1 at addr ffff8881054560eb by task kunit_try_catch/296
[   10.831391] 
[   10.831788] CPU: 2 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.834956] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.837378] Call Trace:
[   10.837871]  <TASK>
[   10.838223]  dump_stack_lvl+0x4d/0x66
[   10.838858]  print_report+0x17a/0x471
[   10.839495]  ? kasan_complete_mode_report_info+0x40/0x210
[   10.840392]  ? krealloc_more_oob_helper+0x180/0x3a0
[   10.841190]  kasan_report+0xb4/0x140
[   10.841803]  ? krealloc_more_oob_helper+0x180/0x3a0
[   10.842613]  __asan_store1+0x69/0x70
[   10.843192]  krealloc_more_oob_helper+0x180/0x3a0
[   10.843949]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.844798]  ? trace_preempt_off+0x2e/0xf0
[   10.845464]  ? __kthread_parkme+0x31/0xd0
[   10.846107]  ? __kasan_check_write+0x18/0x20
[   10.846797]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.847544]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.848363]  ? trace_preempt_on+0x2e/0xf0
[   10.849002]  krealloc_more_oob+0x1c/0x30
[   10.849651]  kunit_try_run_case+0x95/0xd0
[   10.850312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.851062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.852040]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.852917]  kthread+0x17d/0x1b0
[   10.853447]  ? __pfx_kthread+0x10/0x10
[   10.854046]  ret_from_fork+0x2c/0x50
[   10.854632]  </TASK>
[   10.854992] 
[   10.855243] Allocated by task 296:
[   10.855791]  kasan_save_stack+0x2a/0x60
[   10.856455]  kasan_set_track+0x29/0x40
[   10.857053]  kasan_save_alloc_info+0x22/0x30
[   10.857750]  __kasan_krealloc+0x147/0x180
[   10.858412]  krealloc+0x61/0x110
[   10.858933]  krealloc_more_oob_helper+0xec/0x3a0
[   10.859684]  krealloc_more_oob+0x1c/0x30
[   10.860331]  kunit_try_run_case+0x95/0xd0
[   10.860970]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.861826]  kthread+0x17d/0x1b0
[   10.862352]  ret_from_fork+0x2c/0x50
[   10.862928] 
[   10.863178] The buggy address belongs to the object at ffff888105456000
[   10.863178]  which belongs to the cache kmalloc-256 of size 256
[   10.865146] The buggy address is located 235 bytes inside of
[   10.865146]  256-byte region [ffff888105456000, ffff888105456100)
[   10.867015] 
[   10.867271] The buggy address belongs to the physical page:
[   10.868160] page:000000002a94ff7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105456
[   10.869655] head:000000002a94ff7f order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   10.871102] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   10.872017] raw: 0200000000010200 ffff888100042b40 dead000000000122 0000000000000000
[   10.873486] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   10.874999] page dumped because: kasan: bad access detected
[   10.876149] 
[   10.876461] Memory state around the buggy address:
[   10.877600]  ffff888105455f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.879044]  ffff888105456000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.880231] >ffff888105456080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.881430]                                                           ^
[   10.882537]  ffff888105456100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.883721]  ffff888105456180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.884918] ==================================================================
[   10.886141] ==================================================================
[   10.887350] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1c2/0x3a0
[   10.888610] Write of size 1 at addr ffff8881054560f0 by task kunit_try_catch/296
[   10.889836] 
[   10.890104] CPU: 2 PID: 296 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.891676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.893090] Call Trace:
[   10.893512]  <TASK>
[   10.893876]  dump_stack_lvl+0x4d/0x66
[   10.894499]  print_report+0x17a/0x471
[   10.895124]  ? kasan_complete_mode_report_info+0x40/0x210
[   10.896026]  ? krealloc_more_oob_helper+0x1c2/0x3a0
[   10.896867]  kasan_report+0xb4/0x140
[   10.897483]  ? krealloc_more_oob_helper+0x1c2/0x3a0
[   10.898292]  __asan_store1+0x69/0x70
[   10.898975]  krealloc_more_oob_helper+0x1c2/0x3a0
[   10.899762]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   10.900651]  ? trace_preempt_off+0x2e/0xf0
[   10.901330]  ? __kthread_parkme+0x31/0xd0
[   10.901996]  ? __kasan_check_write+0x18/0x20
[   10.902708]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.903477]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.904335]  ? trace_preempt_on+0x2e/0xf0
[   10.905020]  krealloc_more_oob+0x1c/0x30
[   10.905681]  kunit_try_run_case+0x95/0xd0
[   10.906369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.907170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.908198]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.909124]  kthread+0x17d/0x1b0
[   10.909674]  ? __pfx_kthread+0x10/0x10
[   10.910298]  ret_from_fork+0x2c/0x50
[   10.910896]  </TASK>
[   10.911281] 
[   10.911545] Allocated by task 296:
[   10.912131]  kasan_save_stack+0x2a/0x60
[   10.912993]  kasan_set_track+0x29/0x40
[   10.913624]  kasan_save_alloc_info+0x22/0x30
[   10.914341]  __kasan_krealloc+0x147/0x180
[   10.915006]  krealloc+0x61/0x110
[   10.915543]  krealloc_more_oob_helper+0xec/0x3a0
[   10.916330]  krealloc_more_oob+0x1c/0x30
[   10.917189]  kunit_try_run_case+0x95/0xd0
[   10.918060]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.919174]  kthread+0x17d/0x1b0
[   10.919739]  ret_from_fork+0x2c/0x50
[   10.920365] 
[   10.920625] The buggy address belongs to the object at ffff888105456000
[   10.920625]  which belongs to the cache kmalloc-256 of size 256
[   10.922791] The buggy address is located 240 bytes inside of
[   10.922791]  256-byte region [ffff888105456000, ffff888105456100)
[   10.924802] 
[   10.925071] The buggy address belongs to the physical page:
[   10.926013] page:000000002a94ff7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105456
[   10.927594] head:000000002a94ff7f order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   10.929118] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   10.930075] raw: 0200000000010200 ffff888100042b40 dead000000000122 0000000000000000
[   10.931345] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   10.932643] page dumped because: kasan: bad access detected
[   10.933561] 
[   10.933821] Memory state around the buggy address:
[   10.934632]  ffff888105455f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   10.935832]  ffff888105456000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.937046] >ffff888105456080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc
[   10.938263]                                                              ^
[   10.939403]  ffff888105456100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.940599]  ffff888105456180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.941804] ==================================================================
[   10.943164] kunit_try_catch (296) used greatest stack depth: 28352 bytes left
[   10.943171]     ok 10 - krealloc_more_oob
[   10.944913] ==================================================================
[   10.946872] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x145/0x620
[   10.948125] Write of size 1 at addr ffff888100fa4cc9 by task kunit_try_catch/297
[   10.949367] 
[   10.949633] CPU: 3 PID: 297 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   10.951232] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   10.952703] Call Trace:
[   10.953120]  <TASK>
[   10.953507]  dump_stack_lvl+0x4d/0x66
[   10.954123]  print_report+0x17a/0x471
[   10.954743]  ? kasan_complete_mode_report_info+0x40/0x210
[   10.955655]  ? krealloc_less_oob_helper+0x145/0x620
[   10.956609]  kasan_report+0xb4/0x140
[   10.957422]  ? krealloc_less_oob_helper+0x145/0x620
[   10.958508]  __asan_store1+0x69/0x70
[   10.959177]  krealloc_less_oob_helper+0x145/0x620
[   10.959952]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   10.960901]  ? trace_preempt_off+0x2e/0xf0
[   10.961575]  ? __kthread_parkme+0x31/0xd0
[   10.962241]  ? __kasan_check_write+0x18/0x20
[   10.962959]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   10.963727]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   10.964574]  ? trace_preempt_on+0x2e/0xf0
[   10.965237]  krealloc_less_oob+0x1c/0x30
[   10.965886]  kunit_try_run_case+0x95/0xd0
[   10.966551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   10.967323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   10.968340]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.969228]  kthread+0x17d/0x1b0
[   10.969776]  ? __pfx_kthread+0x10/0x10
[   10.970398]  ret_from_fork+0x2c/0x50
[   10.970998]  </TASK>
[   10.971370] 
[   10.971628] Allocated by task 297:
[   10.972191]  kasan_save_stack+0x2a/0x60
[   10.975512]  kasan_set_track+0x29/0x40
[   10.976137]  kasan_save_alloc_info+0x22/0x30
[   10.976851]  __kasan_krealloc+0x147/0x180
[   10.977505]  krealloc+0x61/0x110
[   10.978044]  krealloc_less_oob_helper+0xec/0x620
[   10.978799]  krealloc_less_oob+0x1c/0x30
[   10.979440]  kunit_try_run_case+0x95/0xd0
[   10.980099]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   10.980995]  kthread+0x17d/0x1b0
[   10.981534]  ret_from_fork+0x2c/0x50
[   10.982120] 
[   10.982376] The buggy address belongs to the object at ffff888100fa4c00
[   10.982376]  which belongs to the cache kmalloc-256 of size 256
[   10.984371] The buggy address is located 201 bytes inside of
[   10.984371]  256-byte region [ffff888100fa4c00, ffff888100fa4d00)
[   10.986238] 
[   10.986497] The buggy address belongs to the physical page:
[   10.987409] page:00000000adbefe05 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa4
[   10.988950] head:00000000adbefe05 order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   10.990459] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   10.991406] raw: 0200000000010200 ffff888100042b40 dead000000000122 0000000000000000
[   10.992677] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   10.993931] page dumped because: kasan: bad access detected
[   10.994824] 
[   10.995081] Memory state around the buggy address:
[   10.995866]  ffff888100fa4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   10.997039]  ffff888100fa4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   10.998184] >ffff888100fa4c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   10.999326]                                               ^
[   11.000208]  ffff888100fa4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.001409]  ffff888100fa4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.002592] ==================================================================
[   11.003862] ==================================================================
[   11.005077] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x198/0x620
[   11.006294] Write of size 1 at addr ffff888100fa4cd0 by task kunit_try_catch/297
[   11.007504] 
[   11.007762] CPU: 3 PID: 297 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.009326] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.010660] Call Trace:
[   11.011068]  <TASK>
[   11.011421]  dump_stack_lvl+0x4d/0x66
[   11.012031]  print_report+0x17a/0x471
[   11.012665]  ? kasan_complete_mode_report_info+0x40/0x210
[   11.013548]  ? krealloc_less_oob_helper+0x198/0x620
[   11.014345]  kasan_report+0xb4/0x140
[   11.014938]  ? krealloc_less_oob_helper+0x198/0x620
[   11.015739]  __asan_store1+0x69/0x70
[   11.016377]  krealloc_less_oob_helper+0x198/0x620
[   11.017169]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.018033]  ? trace_preempt_off+0x2e/0xf0
[   11.018725]  ? __kthread_parkme+0x31/0xd0
[   11.019387]  ? __kasan_check_write+0x18/0x20
[   11.020087]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.020874]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.021746]  ? trace_preempt_on+0x2e/0xf0
[   11.022426]  krealloc_less_oob+0x1c/0x30
[   11.023097]  kunit_try_run_case+0x95/0xd0
[   11.023776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.024575]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.025588]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.026468]  kthread+0x17d/0x1b0
[   11.027003]  ? __pfx_kthread+0x10/0x10
[   11.027619]  ret_from_fork+0x2c/0x50
[   11.028212]  </TASK>
[   11.028608] 
[   11.028867] Allocated by task 297:
[   11.029433]  kasan_save_stack+0x2a/0x60
[   11.030071]  kasan_set_track+0x29/0x40
[   11.030688]  kasan_save_alloc_info+0x22/0x30
[   11.031409]  __kasan_krealloc+0x147/0x180
[   11.032098]  krealloc+0x61/0x110
[   11.032677]  krealloc_less_oob_helper+0xec/0x620
[   11.033448]  krealloc_less_oob+0x1c/0x30
[   11.034115]  kunit_try_run_case+0x95/0xd0
[   11.034774]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.035659]  kthread+0x17d/0x1b0
[   11.036209]  ret_from_fork+0x2c/0x50
[   11.037009] 
[   11.037370] The buggy address belongs to the object at ffff888100fa4c00
[   11.037370]  which belongs to the cache kmalloc-256 of size 256
[   11.039801] The buggy address is located 208 bytes inside of
[   11.039801]  256-byte region [ffff888100fa4c00, ffff888100fa4d00)
[   11.041611] 
[   11.041857] The buggy address belongs to the physical page:
[   11.042718] page:00000000adbefe05 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa4
[   11.044172] head:00000000adbefe05 order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.045624] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   11.046522] raw: 0200000000010200 ffff888100042b40 dead000000000122 0000000000000000
[   11.047739] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   11.048963] page dumped because: kasan: bad access detected
[   11.049832] 
[   11.050076] Memory state around the buggy address:
[   11.050817]  ffff888100fa4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.051916]  ffff888100fa4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.053041] >ffff888100fa4c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.054158]                                                  ^
[   11.055053]  ffff888100fa4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.056169]  ffff888100fa4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.057299] ==================================================================
[   11.058428] ==================================================================
[   11.059556] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x217/0x620
[   11.060736] Write of size 1 at addr ffff888100fa4cda by task kunit_try_catch/297
[   11.061894] 
[   11.062142] CPU: 3 PID: 297 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.063615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.064944] Call Trace:
[   11.065359]  <TASK>
[   11.065722]  dump_stack_lvl+0x4d/0x66
[   11.066295]  print_report+0x17a/0x471
[   11.066871]  ? kasan_complete_mode_report_info+0x40/0x210
[   11.067699]  ? krealloc_less_oob_helper+0x217/0x620
[   11.068552]  kasan_report+0xb4/0x140
[   11.069108]  ? krealloc_less_oob_helper+0x217/0x620
[   11.069870]  __asan_store1+0x69/0x70
[   11.070446]  krealloc_less_oob_helper+0x217/0x620
[   11.071188]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.072006]  ? trace_preempt_off+0x2e/0xf0
[   11.072627]  ? __kthread_parkme+0x31/0xd0
[   11.073213]  ? __kasan_check_write+0x18/0x20
[   11.073883]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.074610]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.075385]  ? trace_preempt_on+0x2e/0xf0
[   11.076018]  krealloc_less_oob+0x1c/0x30
[   11.076783]  kunit_try_run_case+0x95/0xd0
[   11.077658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.078698]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.079701]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.080548]  kthread+0x17d/0x1b0
[   11.081049]  ? __pfx_kthread+0x10/0x10
[   11.081635]  ret_from_fork+0x2c/0x50
[   11.082193]  </TASK>
[   11.082539] 
[   11.082782] Allocated by task 297:
[   11.083307]  kasan_save_stack+0x2a/0x60
[   11.083901]  kasan_set_track+0x29/0x40
[   11.084497]  kasan_save_alloc_info+0x22/0x30
[   11.085164]  __kasan_krealloc+0x147/0x180
[   11.085792]  krealloc+0x61/0x110
[   11.086300]  krealloc_less_oob_helper+0xec/0x620
[   11.087019]  krealloc_less_oob+0x1c/0x30
[   11.087633]  kunit_try_run_case+0x95/0xd0
[   11.088261]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.089107]  kthread+0x17d/0x1b0
[   11.089616]  ret_from_fork+0x2c/0x50
[   11.090179] 
[   11.090426] The buggy address belongs to the object at ffff888100fa4c00
[   11.090426]  which belongs to the cache kmalloc-256 of size 256
[   11.092375] The buggy address is located 218 bytes inside of
[   11.092375]  256-byte region [ffff888100fa4c00, ffff888100fa4d00)
[   11.094284] 
[   11.094545] The buggy address belongs to the physical page:
[   11.095461] page:00000000adbefe05 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa4
[   11.097006] head:00000000adbefe05 order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.098518] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   11.099471] raw: 0200000000010200 ffff888100042b40 dead000000000122 0000000000000000
[   11.100809] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   11.101997] page dumped because: kasan: bad access detected
[   11.102858] 
[   11.103104] Memory state around the buggy address:
[   11.103846]  ffff888100fa4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.104962]  ffff888100fa4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.106078] >ffff888100fa4c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.107203]                                                     ^
[   11.108158]  ffff888100fa4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.109330]  ffff888100fa4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.110437] ==================================================================
[   11.111566] ==================================================================
[   11.112698] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x255/0x620
[   11.114010] Write of size 1 at addr ffff888100fa4cea by task kunit_try_catch/297
[   11.115136] 
[   11.115381] CPU: 3 PID: 297 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.117060] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.118830] Call Trace:
[   11.119222]  <TASK>
[   11.119562]  dump_stack_lvl+0x4d/0x66
[   11.120138]  print_report+0x17a/0x471
[   11.120735]  ? kasan_complete_mode_report_info+0x40/0x210
[   11.121571]  ? krealloc_less_oob_helper+0x255/0x620
[   11.122328]  kasan_report+0xb4/0x140
[   11.122892]  ? krealloc_less_oob_helper+0x255/0x620
[   11.123646]  __asan_store1+0x69/0x70
[   11.124207]  krealloc_less_oob_helper+0x255/0x620
[   11.124947]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.125755]  ? trace_preempt_off+0x2e/0xf0
[   11.126393]  ? __kthread_parkme+0x31/0xd0
[   11.127021]  ? __kasan_check_write+0x18/0x20
[   11.127687]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.128416]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.129188]  ? trace_preempt_on+0x2e/0xf0
[   11.129817]  krealloc_less_oob+0x1c/0x30
[   11.130434]  kunit_try_run_case+0x95/0xd0
[   11.131064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.131796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.132760]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.133597]  kthread+0x17d/0x1b0
[   11.134104]  ? __pfx_kthread+0x10/0x10
[   11.134688]  ret_from_fork+0x2c/0x50
[   11.135249]  </TASK>
[   11.135597] 
[   11.135841] Allocated by task 297:
[   11.136379]  kasan_save_stack+0x2a/0x60
[   11.136976]  kasan_set_track+0x29/0x40
[   11.137559]  kasan_save_alloc_info+0x22/0x30
[   11.138220]  __kasan_krealloc+0x147/0x180
[   11.138843]  krealloc+0x61/0x110
[   11.139348]  krealloc_less_oob_helper+0xec/0x620
[   11.140062]  krealloc_less_oob+0x1c/0x30
[   11.140686]  kunit_try_run_case+0x95/0xd0
[   11.141315]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.142152]  kthread+0x17d/0x1b0
[   11.142661]  ret_from_fork+0x2c/0x50
[   11.143224] 
[   11.143471] The buggy address belongs to the object at ffff888100fa4c00
[   11.143471]  which belongs to the cache kmalloc-256 of size 256
[   11.145390] The buggy address is located 234 bytes inside of
[   11.145390]  256-byte region [ffff888100fa4c00, ffff888100fa4d00)
[   11.147178] 
[   11.147422] The buggy address belongs to the physical page:
[   11.148272] page:00000000adbefe05 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa4
[   11.149709] head:00000000adbefe05 order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.151107] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   11.151987] raw: 0200000000010200 ffff888100042b40 dead000000000122 0000000000000000
[   11.153176] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   11.154355] page dumped because: kasan: bad access detected
[   11.155209] 
[   11.155453] Memory state around the buggy address:
[   11.156191]  ffff888100fa4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.157350]  ffff888100fa4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.158580] >ffff888100fa4c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.159786]                                                           ^
[   11.160928]  ffff888100fa4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.162115]  ffff888100fa4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.163317] ==================================================================
[   11.164550] ==================================================================
[   11.165753] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x291/0x620
[   11.167003] Write of size 1 at addr ffff888100fa4ceb by task kunit_try_catch/297
[   11.168239] 
[   11.168525] CPU: 3 PID: 297 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.170113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.171485] Call Trace:
[   11.171902]  <TASK>
[   11.172263]  dump_stack_lvl+0x4d/0x66
[   11.172893]  print_report+0x17a/0x471
[   11.173534]  ? kasan_complete_mode_report_info+0x40/0x210
[   11.174440]  ? krealloc_less_oob_helper+0x291/0x620
[   11.175271]  kasan_report+0xb4/0x140
[   11.175887]  ? krealloc_less_oob_helper+0x291/0x620
[   11.176737]  __asan_store1+0x69/0x70
[   11.177343]  krealloc_less_oob_helper+0x291/0x620
[   11.178121]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.178954]  ? trace_preempt_off+0x2e/0xf0
[   11.179620]  ? __kthread_parkme+0x31/0xd0
[   11.180299]  ? __kasan_check_write+0x18/0x20
[   11.181006]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.181792]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.182637]  ? trace_preempt_on+0x2e/0xf0
[   11.183312]  krealloc_less_oob+0x1c/0x30
[   11.183967]  kunit_try_run_case+0x95/0xd0
[   11.184678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.185480]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.186479]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.187330]  kthread+0x17d/0x1b0
[   11.187842]  ? __pfx_kthread+0x10/0x10
[   11.188457]  ret_from_fork+0x2c/0x50
[   11.189069]  </TASK>
[   11.189464] 
[   11.189729] Allocated by task 297:
[   11.190381]  kasan_save_stack+0x2a/0x60
[   11.191020]  kasan_set_track+0x29/0x40
[   11.191661]  kasan_save_alloc_info+0x22/0x30
[   11.192397]  __kasan_krealloc+0x147/0x180
[   11.193276]  krealloc+0x61/0x110
[   11.193998]  krealloc_less_oob_helper+0xec/0x620
[   11.194983]  krealloc_less_oob+0x1c/0x30
[   11.195594]  kunit_try_run_case+0x95/0xd0
[   11.196217]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.197099]  kthread+0x17d/0x1b0
[   11.197612]  ret_from_fork+0x2c/0x50
[   11.198172] 
[   11.198418] The buggy address belongs to the object at ffff888100fa4c00
[   11.198418]  which belongs to the cache kmalloc-256 of size 256
[   11.200365] The buggy address is located 235 bytes inside of
[   11.200365]  256-byte region [ffff888100fa4c00, ffff888100fa4d00)
[   11.202155] 
[   11.202402] The buggy address belongs to the physical page:
[   11.203263] page:00000000adbefe05 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100fa4
[   11.204710] head:00000000adbefe05 order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.206110] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   11.206996] raw: 0200000000010200 ffff888100042b40 dead000000000122 0000000000000000
[   11.208175] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   11.209365] page dumped because: kasan: bad access detected
[   11.210234] 
[   11.210483] Memory state around the buggy address:
[   11.211237]  ffff888100fa4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.212378]  ffff888100fa4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.213514] >ffff888100fa4c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   11.214648]                                                           ^
[   11.215688]  ffff888100fa4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.216831]  ffff888100fa4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.217988] ==================================================================
[   11.219376]     ok 11 - krealloc_less_oob
[   11.219417] kunit_try_catch (297) used greatest stack depth: 28344 bytes left
[   11.219886] ==================================================================
[   11.225341] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x180/0x3a0
[   11.227969] Write of size 1 at addr ffff888104f420eb by task kunit_try_catch/298
[   11.230138] 
[   11.230557] CPU: 2 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.233054] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.234629] Call Trace:
[   11.235052]  <TASK>
[   11.235423]  dump_stack_lvl+0x4d/0x66
[   11.236045]  print_report+0x17a/0x471
[   11.236700]  ? kasan_addr_to_slab+0x11/0xb0
[   11.237425]  ? krealloc_more_oob_helper+0x180/0x3a0
[   11.238234]  kasan_report+0xb4/0x140
[   11.238845]  ? krealloc_more_oob_helper+0x180/0x3a0
[   11.239670]  __asan_store1+0x69/0x70
[   11.240272]  krealloc_more_oob_helper+0x180/0x3a0
[   11.241072]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.241927]  ? trace_preempt_off+0x2e/0xf0
[   11.242603]  ? __kthread_parkme+0x31/0xd0
[   11.243260]  ? __kasan_check_write+0x18/0x20
[   11.243966]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.244761]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.245591]  ? trace_preempt_on+0x2e/0xf0
[   11.246253]  krealloc_pagealloc_more_oob+0x1c/0x30
[   11.247056]  kunit_try_run_case+0x95/0xd0
[   11.247725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.248519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.249535]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.250440]  kthread+0x17d/0x1b0
[   11.250979]  ? __pfx_kthread+0x10/0x10
[   11.251604]  ret_from_fork+0x2c/0x50
[   11.252196]  </TASK>
[   11.252599] 
[   11.252860] The buggy address belongs to the physical page:
[   11.253794] page:00000000bd97887b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104f40
[   11.255326] head:00000000bd97887b order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.256838] flags: 0x200000000010000(head|node=0|zone=2)
[   11.257723] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   11.258978] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.260245] page dumped because: kasan: bad access detected
[   11.261193] 
[   11.261465] Memory state around the buggy address:
[   11.262343]  ffff888104f41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.263532]  ffff888104f42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.264934] >ffff888104f42080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.266473]                                                           ^
[   11.267707]  ffff888104f42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.268821]  ffff888104f42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.269910] ==================================================================
[   11.271038] ==================================================================
[   11.272132] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x1c2/0x3a0
[   11.273285] Write of size 1 at addr ffff888104f420f0 by task kunit_try_catch/298
[   11.274409] 
[   11.274652] CPU: 2 PID: 298 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.276100] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.277377] Call Trace:
[   11.277767]  <TASK>
[   11.278103]  dump_stack_lvl+0x4d/0x66
[   11.278677]  print_report+0x17a/0x471
[   11.279253]  ? kasan_addr_to_slab+0x11/0xb0
[   11.279905]  ? krealloc_more_oob_helper+0x1c2/0x3a0
[   11.280684]  kasan_report+0xb4/0x140
[   11.281246]  ? krealloc_more_oob_helper+0x1c2/0x3a0
[   11.282003]  __asan_store1+0x69/0x70
[   11.282564]  krealloc_more_oob_helper+0x1c2/0x3a0
[   11.283296]  ? __pfx_krealloc_more_oob_helper+0x10/0x10
[   11.284097]  ? trace_preempt_off+0x2e/0xf0
[   11.284741]  ? __kthread_parkme+0x31/0xd0
[   11.285361]  ? __kasan_check_write+0x18/0x20
[   11.286019]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.286731]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.287492]  ? trace_preempt_on+0x2e/0xf0
[   11.288114]  krealloc_pagealloc_more_oob+0x1c/0x30
[   11.288867]  kunit_try_run_case+0x95/0xd0
[   11.289490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.290214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.291150]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.291987]  kthread+0x17d/0x1b0
[   11.292503]  ? __pfx_kthread+0x10/0x10
[   11.293088]  ret_from_fork+0x2c/0x50
[   11.293651]  </TASK>
[   11.293999] 
[   11.294241] The buggy address belongs to the physical page:
[   11.295096] page:00000000bd97887b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104f40
[   11.296599] head:00000000bd97887b order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.298544] flags: 0x200000000010000(head|node=0|zone=2)
[   11.299515] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   11.300726] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.301846] page dumped because: kasan: bad access detected
[   11.302655] 
[   11.302887] Memory state around the buggy address:
[   11.303654]  ffff888104f41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.304822]  ffff888104f42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.305976] >ffff888104f42080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe
[   11.307119]                                                              ^
[   11.308221]  ffff888104f42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.309379]  ffff888104f42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.310518] ==================================================================
[   11.311766]     ok 12 - krealloc_pagealloc_more_oob
[   11.312175] ==================================================================
[   11.314131] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x145/0x620
[   11.315339] Write of size 1 at addr ffff888104f420c9 by task kunit_try_catch/299
[   11.316528] 
[   11.316784] CPU: 2 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.318285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.319593] Call Trace:
[   11.319995]  <TASK>
[   11.320354]  dump_stack_lvl+0x4d/0x66
[   11.320948]  print_report+0x17a/0x471
[   11.321542]  ? kasan_addr_to_slab+0x11/0xb0
[   11.322217]  ? krealloc_less_oob_helper+0x145/0x620
[   11.322997]  kasan_report+0xb4/0x140
[   11.323575]  ? krealloc_less_oob_helper+0x145/0x620
[   11.324377]  __asan_store1+0x69/0x70
[   11.324958]  krealloc_less_oob_helper+0x145/0x620
[   11.325714]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.326594]  ? trace_preempt_off+0x2e/0xf0
[   11.327256]  ? __kthread_parkme+0x31/0xd0
[   11.327905]  ? __kasan_check_write+0x18/0x20
[   11.328606]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.329347]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.330144]  ? trace_preempt_on+0x2e/0xf0
[   11.330792]  krealloc_pagealloc_less_oob+0x1c/0x30
[   11.331562]  kunit_try_run_case+0x95/0xd0
[   11.332212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.333249]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.334519]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.335412]  kthread+0x17d/0x1b0
[   11.335928]  ? __pfx_kthread+0x10/0x10
[   11.336536]  ret_from_fork+0x2c/0x50
[   11.337106]  </TASK>
[   11.337457] 
[   11.337702] The buggy address belongs to the physical page:
[   11.338566] page:00000000bd97887b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104f40
[   11.340004] head:00000000bd97887b order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.341434] flags: 0x200000000010000(head|node=0|zone=2)
[   11.342316] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   11.343544] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.344760] page dumped because: kasan: bad access detected
[   11.345596] 
[   11.345834] Memory state around the buggy address:
[   11.346552]  ffff888104f41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.347632]  ffff888104f42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.348729] >ffff888104f42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.349830]                                               ^
[   11.350704]  ffff888104f42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.351827]  ffff888104f42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.352945] ==================================================================
[   11.354119] ==================================================================
[   11.355244] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x198/0x620
[   11.356401] Write of size 1 at addr ffff888104f420d0 by task kunit_try_catch/299
[   11.357519] 
[   11.357763] CPU: 2 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.359200] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.360473] Call Trace:
[   11.360857]  <TASK>
[   11.361191]  dump_stack_lvl+0x4d/0x66
[   11.361763]  print_report+0x17a/0x471
[   11.362336]  ? kasan_addr_to_slab+0x11/0xb0
[   11.362984]  ? krealloc_less_oob_helper+0x198/0x620
[   11.363738]  kasan_report+0xb4/0x140
[   11.364304]  ? krealloc_less_oob_helper+0x198/0x620
[   11.365060]  __asan_store1+0x69/0x70
[   11.365619]  krealloc_less_oob_helper+0x198/0x620
[   11.366344]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.367148]  ? trace_preempt_off+0x2e/0xf0
[   11.367781]  ? __kthread_parkme+0x31/0xd0
[   11.368505]  ? __kasan_check_write+0x18/0x20
[   11.369435]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.370435]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.371346]  ? trace_preempt_on+0x2e/0xf0
[   11.371987]  krealloc_pagealloc_less_oob+0x1c/0x30
[   11.372769]  kunit_try_run_case+0x95/0xd0
[   11.373394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.374140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.375074]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.375904]  kthread+0x17d/0x1b0
[   11.376475]  ? __pfx_kthread+0x10/0x10
[   11.377324]  ret_from_fork+0x2c/0x50
[   11.378108]  </TASK>
[   11.378596] 
[   11.378946] The buggy address belongs to the physical page:
[   11.379861] page:00000000bd97887b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104f40
[   11.381416] head:00000000bd97887b order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.382930] flags: 0x200000000010000(head|node=0|zone=2)
[   11.383831] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   11.385217] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.386494] page dumped because: kasan: bad access detected
[   11.387410] 
[   11.387666] Memory state around the buggy address:
[   11.388453]  ffff888104f41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.389628]  ffff888104f42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.390802] >ffff888104f42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.391971]                                                  ^
[   11.392948]  ffff888104f42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.394134]  ffff888104f42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.395316] ==================================================================
[   11.396553] ==================================================================
[   11.397748] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x217/0x620
[   11.398970] Write of size 1 at addr ffff888104f420da by task kunit_try_catch/299
[   11.400160] 
[   11.400438] CPU: 2 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.401974] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.403322] Call Trace:
[   11.403732]  <TASK>
[   11.404095]  dump_stack_lvl+0x4d/0x66
[   11.404721]  print_report+0x17a/0x471
[   11.405337]  ? kasan_addr_to_slab+0x11/0xb0
[   11.406023]  ? krealloc_less_oob_helper+0x217/0x620
[   11.406827]  kasan_report+0xb4/0x140
[   11.407427]  ? krealloc_less_oob_helper+0x217/0x620
[   11.408228]  __asan_store1+0x69/0x70
[   11.409019]  krealloc_less_oob_helper+0x217/0x620
[   11.410042]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.411109]  ? trace_preempt_off+0x2e/0xf0
[   11.411803]  ? __kthread_parkme+0x31/0xd0
[   11.412487]  ? __kasan_check_write+0x18/0x20
[   11.413191]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.413967]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.414792]  ? trace_preempt_on+0x2e/0xf0
[   11.415456]  krealloc_pagealloc_less_oob+0x1c/0x30
[   11.416237]  kunit_try_run_case+0x95/0xd0
[   11.417111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.418124]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.419297]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.420179]  kthread+0x17d/0x1b0
[   11.420726]  ? __pfx_kthread+0x10/0x10
[   11.421348]  ret_from_fork+0x2c/0x50
[   11.421947]  </TASK>
[   11.422312] 
[   11.422569] The buggy address belongs to the physical page:
[   11.423488] page:00000000bd97887b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104f40
[   11.425030] head:00000000bd97887b order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.426545] flags: 0x200000000010000(head|node=0|zone=2)
[   11.427439] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   11.428717] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.429982] page dumped because: kasan: bad access detected
[   11.430889] 
[   11.431148] Memory state around the buggy address:
[   11.431947]  ffff888104f41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.433142]  ffff888104f42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.434333] >ffff888104f42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.435517]                                                     ^
[   11.436543]  ffff888104f42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.437724]  ffff888104f42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.438901] ==================================================================
[   11.440108] ==================================================================
[   11.441334] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x255/0x620
[   11.442735] Write of size 1 at addr ffff888104f420ea by task kunit_try_catch/299
[   11.443935] 
[   11.444194] CPU: 2 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.445762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.447127] Call Trace:
[   11.447545]  <TASK>
[   11.447901]  dump_stack_lvl+0x4d/0x66
[   11.448594]  print_report+0x17a/0x471
[   11.449403]  ? kasan_addr_to_slab+0x11/0xb0
[   11.450319]  ? krealloc_less_oob_helper+0x255/0x620
[   11.451282]  kasan_report+0xb4/0x140
[   11.451895]  ? krealloc_less_oob_helper+0x255/0x620
[   11.452728]  __asan_store1+0x69/0x70
[   11.453339]  krealloc_less_oob_helper+0x255/0x620
[   11.454128]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.455009]  ? trace_preempt_off+0x2e/0xf0
[   11.455699]  ? __kthread_parkme+0x31/0xd0
[   11.456413]  ? __kasan_check_write+0x18/0x20
[   11.457132]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.457927]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.458803]  ? trace_preempt_on+0x2e/0xf0
[   11.459474]  krealloc_pagealloc_less_oob+0x1c/0x30
[   11.460263]  kunit_try_run_case+0x95/0xd0
[   11.460945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.461740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.462760]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.463604]  kthread+0x17d/0x1b0
[   11.464119]  ? __pfx_kthread+0x10/0x10
[   11.464778]  ret_from_fork+0x2c/0x50
[   11.465394]  </TASK>
[   11.465773] 
[   11.466042] The buggy address belongs to the physical page:
[   11.466979] page:00000000bd97887b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104f40
[   11.468570] head:00000000bd97887b order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.470067] flags: 0x200000000010000(head|node=0|zone=2)
[   11.470945] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   11.472221] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.473531] page dumped because: kasan: bad access detected
[   11.474440] 
[   11.474697] Memory state around the buggy address:
[   11.475478]  ffff888104f41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.476831]  ffff888104f42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.478017] >ffff888104f42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.479187]                                                           ^
[   11.480270]  ffff888104f42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.481472]  ffff888104f42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.482666] ==================================================================
[   11.483888] ==================================================================
[   11.485090] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0x291/0x620
[   11.486341] Write of size 1 at addr ffff888104f420eb by task kunit_try_catch/299
[   11.487571] 
[   11.487831] CPU: 2 PID: 299 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.489689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.491425] Call Trace:
[   11.491859]  <TASK>
[   11.492230]  dump_stack_lvl+0x4d/0x66
[   11.492947]  print_report+0x17a/0x471
[   11.493588]  ? kasan_addr_to_slab+0x11/0xb0
[   11.494304]  ? krealloc_less_oob_helper+0x291/0x620
[   11.495130]  kasan_report+0xb4/0x140
[   11.495777]  ? krealloc_less_oob_helper+0x291/0x620
[   11.496628]  __asan_store1+0x69/0x70
[   11.497238]  krealloc_less_oob_helper+0x291/0x620
[   11.498060]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   11.498987]  ? trace_preempt_off+0x2e/0xf0
[   11.499696]  ? __kthread_parkme+0x31/0xd0
[   11.500428]  ? __kasan_check_write+0x18/0x20
[   11.501128]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.501905]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.502746]  ? trace_preempt_on+0x2e/0xf0
[   11.503440]  krealloc_pagealloc_less_oob+0x1c/0x30
[   11.504227]  kunit_try_run_case+0x95/0xd0
[   11.504937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.505724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.506739]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.507628]  kthread+0x17d/0x1b0
[   11.508165]  ? __pfx_kthread+0x10/0x10
[   11.508814]  ret_from_fork+0x2c/0x50
[   11.509433]  </TASK>
[   11.509805] 
[   11.510065] The buggy address belongs to the physical page:
[   11.510980] page:00000000bd97887b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104f40
[   11.512530] head:00000000bd97887b order:2 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.514052] flags: 0x200000000010000(head|node=0|zone=2)
[   11.515131] raw: 0200000000010000 0000000000000000 dead000000000122 0000000000000000
[   11.516555] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   11.517830] page dumped because: kasan: bad access detected
[   11.518752] 
[   11.519010] Memory state around the buggy address:
[   11.519804]  ffff888104f41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.520988]  ffff888104f42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   11.522171] >ffff888104f42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe
[   11.523354]                                                           ^
[   11.524441]  ffff888104f42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.525618]  ffff888104f42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   11.526786] ==================================================================
[   11.528047]     ok 13 - krealloc_pagealloc_less_oob
[   11.528523] ==================================================================
[   11.531106] BUG: KASAN: use-after-free in krealloc_uaf+0xf1/0x2e0
[   11.532038] Read of size 1 at addr ffff888105456200 by task kunit_try_catch/300
[   11.533364] 
[   11.533670] CPU: 2 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.535621] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.537210] Call Trace:
[   11.537643]  <TASK>
[   11.538079]  dump_stack_lvl+0x4d/0x66
[   11.538812]  print_report+0x17a/0x471
[   11.539525]  ? kasan_complete_mode_report_info+0x80/0x210
[   11.540449]  ? krealloc_uaf+0xf1/0x2e0
[   11.541067]  kasan_report+0xb4/0x140
[   11.541689]  ? krealloc_uaf+0xf1/0x2e0
[   11.542314]  ? krealloc_uaf+0xf1/0x2e0
[   11.542930]  __kasan_check_byte+0x41/0x50
[   11.543594]  krealloc+0x36/0x110
[   11.544129]  krealloc_uaf+0xf1/0x2e0
[   11.544763]  ? __pfx_krealloc_uaf+0x10/0x10
[   11.545474]  ? trace_preempt_off+0x2e/0xf0
[   11.546153]  ? __kthread_parkme+0x31/0xd0
[   11.546806]  ? __kasan_check_write+0x18/0x20
[   11.547497]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.548254]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.549094]  ? trace_preempt_on+0x2e/0xf0
[   11.549755]  ? __kthread_parkme+0x4f/0xd0
[   11.550414]  kunit_try_run_case+0x95/0xd0
[   11.551074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.551841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.552835]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.553712]  kthread+0x17d/0x1b0
[   11.554245]  ? __pfx_kthread+0x10/0x10
[   11.554863]  ret_from_fork+0x2c/0x50
[   11.555464]  </TASK>
[   11.555850] 
[   11.556114] Allocated by task 300:
[   11.556706]  kasan_save_stack+0x2a/0x60
[   11.557349]  kasan_set_track+0x29/0x40
[   11.557972]  kasan_save_alloc_info+0x22/0x30
[   11.558676]  __kasan_kmalloc+0xb8/0xc0
[   11.559304]  kmalloc_trace+0x4e/0xb0
[   11.559897]  krealloc_uaf+0xb0/0x2e0
[   11.560525]  kunit_try_run_case+0x95/0xd0
[   11.561192]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.562095]  kthread+0x17d/0x1b0
[   11.562673]  ret_from_fork+0x2c/0x50
[   11.563289] 
[   11.563564] Freed by task 300:
[   11.564138]  kasan_save_stack+0x2a/0x60
[   11.564928]  kasan_set_track+0x29/0x40
[   11.565672]  kasan_save_free_info+0x32/0x50
[   11.566372]  ____kasan_slab_free+0x174/0x1e0
[   11.567073]  __kasan_slab_free+0x16/0x20
[   11.567755]  __kmem_cache_free+0x18e/0x300
[   11.568456]  kfree+0x7d/0x120
[   11.568952]  krealloc_uaf+0xd0/0x2e0
[   11.569574]  kunit_try_run_case+0x95/0xd0
[   11.570246]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.571152]  kthread+0x17d/0x1b0
[   11.571710]  ret_from_fork+0x2c/0x50
[   11.572328] 
[   11.572658] The buggy address belongs to the object at ffff888105456200
[   11.572658]  which belongs to the cache kmalloc-256 of size 256
[   11.575272] The buggy address is located 0 bytes inside of
[   11.575272]  256-byte region [ffff888105456200, ffff888105456300)
[   11.577381] 
[   11.577721] The buggy address belongs to the physical page:
[   11.578963] page:000000002a94ff7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105456
[   11.580428] head:000000002a94ff7f order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.581883] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   11.582842] raw: 0200000000010200 ffff888100042b40 dead000000000122 0000000000000000
[   11.584095] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   11.585371] page dumped because: kasan: bad access detected
[   11.586283] 
[   11.586553] Memory state around the buggy address:
[   11.587474]  ffff888105456100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.588682]  ffff888105456180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.589879] >ffff888105456200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.591058]                    ^
[   11.591613]  ffff888105456280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.592813]  ffff888105456300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.594005] ==================================================================
[   11.595277] ==================================================================
[   11.596502] BUG: KASAN: use-after-free in krealloc_uaf+0x131/0x2e0
[   11.597523] Read of size 1 at addr ffff888105456200 by task kunit_try_catch/300
[   11.598706] 
[   11.598964] CPU: 2 PID: 300 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.600535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.601898] Call Trace:
[   11.602328]  <TASK>
[   11.602690]  dump_stack_lvl+0x4d/0x66
[   11.603311]  print_report+0x17a/0x471
[   11.603936]  ? kasan_complete_mode_report_info+0x80/0x210
[   11.604866]  ? krealloc_uaf+0x131/0x2e0
[   11.605524]  kasan_report+0xb4/0x140
[   11.606121]  ? krealloc_uaf+0x131/0x2e0
[   11.606767]  __asan_load1+0x66/0x70
[   11.607372]  krealloc_uaf+0x131/0x2e0
[   11.607983]  ? __pfx_krealloc_uaf+0x10/0x10
[   11.608822]  ? trace_preempt_off+0x2e/0xf0
[   11.609726]  ? __kthread_parkme+0x31/0xd0
[   11.610597]  ? __kasan_check_write+0x18/0x20
[   11.611400]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.612162]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.613012]  ? trace_preempt_on+0x2e/0xf0
[   11.613691]  ? __kthread_parkme+0x4f/0xd0
[   11.614378]  kunit_try_run_case+0x95/0xd0
[   11.615048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.615824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.617024]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.618178]  kthread+0x17d/0x1b0
[   11.618896]  ? __pfx_kthread+0x10/0x10
[   11.619532]  ret_from_fork+0x2c/0x50
[   11.620142]  </TASK>
[   11.620529] 
[   11.620793] Allocated by task 300:
[   11.621387]  kasan_save_stack+0x2a/0x60
[   11.622026]  kasan_set_track+0x29/0x40
[   11.622680]  kasan_save_alloc_info+0x22/0x30
[   11.623399]  __kasan_kmalloc+0xb8/0xc0
[   11.624018]  kmalloc_trace+0x4e/0xb0
[   11.624649]  krealloc_uaf+0xb0/0x2e0
[   11.625255]  kunit_try_run_case+0x95/0xd0
[   11.625921]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.626794]  kthread+0x17d/0x1b0
[   11.627326]  ret_from_fork+0x2c/0x50
[   11.627909] 
[   11.628162] Freed by task 300:
[   11.628681]  kasan_save_stack+0x2a/0x60
[   11.629313]  kasan_set_track+0x29/0x40
[   11.629929]  kasan_save_free_info+0x32/0x50
[   11.630628]  ____kasan_slab_free+0x174/0x1e0
[   11.631324]  __kasan_slab_free+0x16/0x20
[   11.631967]  __kmem_cache_free+0x18e/0x300
[   11.632706]  kfree+0x7d/0x120
[   11.633207]  krealloc_uaf+0xd0/0x2e0
[   11.633801]  kunit_try_run_case+0x95/0xd0
[   11.634475]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.635358]  kthread+0x17d/0x1b0
[   11.635891]  ret_from_fork+0x2c/0x50
[   11.636525] 
[   11.636783] The buggy address belongs to the object at ffff888105456200
[   11.636783]  which belongs to the cache kmalloc-256 of size 256
[   11.638803] The buggy address is located 0 bytes inside of
[   11.638803]  256-byte region [ffff888105456200, ffff888105456300)
[   11.640699] 
[   11.640986] The buggy address belongs to the physical page:
[   11.641886] page:000000002a94ff7f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105456
[   11.643388] head:000000002a94ff7f order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   11.644875] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   11.645808] raw: 0200000000010200 ffff888100042b40 dead000000000122 0000000000000000
[   11.647061] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   11.648332] page dumped because: kasan: bad access detected
[   11.649502] 
[   11.649850] Memory state around the buggy address:
[   11.650848]  ffff888105456100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.652029]  ffff888105456180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.653224] >ffff888105456200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.654413]                    ^
[   11.654971]  ffff888105456280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.656137]  ffff888105456300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.657358] ==================================================================
[   11.658640]     ok 14 - krealloc_uaf
[   11.658664] kunit_try_catch (300) used greatest stack depth: 28320 bytes left
[   11.658948] ==================================================================
[   11.661660] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0xf8/0x260
[   11.662733] Write of size 16 at addr ffff888100dacee0 by task kunit_try_catch/301
[   11.663938] 
[   11.664196] CPU: 3 PID: 301 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.665760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.667113] Call Trace:
[   11.667528]  <TASK>
[   11.667881]  dump_stack_lvl+0x4d/0x66
[   11.668508]  print_report+0x17a/0x471
[   11.669124]  ? kasan_complete_mode_report_info+0x40/0x210
[   11.670053]  ? kmalloc_oob_16+0xf8/0x260
[   11.670753]  kasan_report+0xb4/0x140
[   11.671639]  ? kmalloc_oob_16+0xf8/0x260
[   11.672639]  __asan_store16+0x6c/0xa0
[   11.673537]  kmalloc_oob_16+0xf8/0x260
[   11.674165]  ? __pfx_kmalloc_oob_16+0x10/0x10
[   11.674894]  ? __kasan_check_write+0x18/0x20
[   11.675579]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.676300]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.677108]  ? trace_preempt_on+0x2e/0xf0
[   11.677786]  ? __kthread_parkme+0x4f/0xd0
[   11.678456]  kunit_try_run_case+0x95/0xd0
[   11.679072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.679799]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.681356]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.683057]  kthread+0x17d/0x1b0
[   11.684134]  ? __pfx_kthread+0x10/0x10
[   11.685368]  ret_from_fork+0x2c/0x50
[   11.686527]  </TASK>
[   11.687245] 
[   11.687753] Allocated by task 301:
[   11.688851]  kasan_save_stack+0x2a/0x60
[   11.690051]  kasan_set_track+0x29/0x40
[   11.691259]  kasan_save_alloc_info+0x22/0x30
[   11.692656]  __kasan_kmalloc+0xb8/0xc0
[   11.693753]  kmalloc_trace+0x4e/0xb0
[   11.694410]  kmalloc_oob_16+0x8f/0x260
[   11.695046]  kunit_try_run_case+0x95/0xd0
[   11.695746]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.696664]  kthread+0x17d/0x1b0
[   11.697195]  ret_from_fork+0x2c/0x50
[   11.698030] 
[   11.698337] The buggy address belongs to the object at ffff888100dacee0
[   11.698337]  which belongs to the cache kmalloc-16 of size 16
[   11.700484] The buggy address is located 0 bytes inside of
[   11.700484]  16-byte region [ffff888100dacee0, ffff888100dacef0)
[   11.702378] 
[   11.702635] The buggy address belongs to the physical page:
[   11.703562] page:00000000cc13f8a1 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100dac
[   11.705142] flags: 0x200000000000200(slab|node=0|zone=2)
[   11.706050] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   11.707359] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   11.708533] page dumped because: kasan: bad access detected
[   11.709443] 
[   11.709697] Memory state around the buggy address:
[   11.710469]  ffff888100dacd80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 04 fc fc
[   11.711635]  ffff888100dace00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   11.712813] >ffff888100dace80: 00 06 fc fc 00 06 fc fc 00 06 fc fc 00 05 fc fc
[   11.714000]                                                           ^
[   11.715034]  ffff888100dacf00: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.716154]  ffff888100dacf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.717299] ==================================================================
[   11.718590]     ok 15 - kmalloc_oob_16
[   11.718989] ==================================================================
[   11.720770] BUG: KASAN: use-after-free in kmalloc_uaf_16+0x108/0x250
[   11.721763] Read of size 16 at addr ffff888104216640 by task kunit_try_catch/302
[   11.722907] 
[   11.723156] CPU: 2 PID: 302 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.724646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.725949] Call Trace:
[   11.726353]  <TASK>
[   11.726786]  dump_stack_lvl+0x4d/0x66
[   11.727723]  print_report+0x17a/0x471
[   11.728728]  ? kasan_complete_mode_report_info+0x80/0x210
[   11.729827]  ? kmalloc_uaf_16+0x108/0x250
[   11.730459]  kasan_report+0xb4/0x140
[   11.731013]  ? kmalloc_uaf_16+0x108/0x250
[   11.731674]  __asan_load16+0x69/0x90
[   11.732273]  kmalloc_uaf_16+0x108/0x250
[   11.732941]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   11.733637]  ? __kasan_check_write+0x18/0x20
[   11.734310]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.735030]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.735889]  ? trace_preempt_on+0x2e/0xf0
[   11.736566]  ? __kthread_parkme+0x4f/0xd0
[   11.737280]  kunit_try_run_case+0x95/0xd0
[   11.737953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.738765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.739781]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.740919]  kthread+0x17d/0x1b0
[   11.741770]  ? __pfx_kthread+0x10/0x10
[   11.742900]  ret_from_fork+0x2c/0x50
[   11.744220]  </TASK>
[   11.744879] 
[   11.745306] Allocated by task 302:
[   11.745951]  kasan_save_stack+0x2a/0x60
[   11.746552]  kasan_set_track+0x29/0x40
[   11.747144]  kasan_save_alloc_info+0x22/0x30
[   11.747821]  __kasan_kmalloc+0xb8/0xc0
[   11.748419]  kmalloc_trace+0x4e/0xb0
[   11.748992]  kmalloc_uaf_16+0xc9/0x250
[   11.749577]  kunit_try_run_case+0x95/0xd0
[   11.750217]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.751092]  kthread+0x17d/0x1b0
[   11.751604]  ret_from_fork+0x2c/0x50
[   11.752173] 
[   11.752430] Freed by task 302:
[   11.752921]  kasan_save_stack+0x2a/0x60
[   11.753523]  kasan_set_track+0x29/0x40
[   11.754117]  kasan_save_free_info+0x32/0x50
[   11.754785]  ____kasan_slab_free+0x174/0x1e0
[   11.755452]  __kasan_slab_free+0x16/0x20
[   11.756065]  __kmem_cache_free+0x18e/0x300
[   11.756722]  kfree+0x7d/0x120
[   11.757161]  kmalloc_uaf_16+0xe9/0x250
[   11.757710]  kunit_try_run_case+0x95/0xd0
[   11.758294]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.759069]  kthread+0x17d/0x1b0
[   11.759544]  ret_from_fork+0x2c/0x50
[   11.760066] 
[   11.760308] The buggy address belongs to the object at ffff888104216640
[   11.760308]  which belongs to the cache kmalloc-16 of size 16
[   11.762046] The buggy address is located 0 bytes inside of
[   11.762046]  16-byte region [ffff888104216640, ffff888104216650)
[   11.763663] 
[   11.763892] The buggy address belongs to the physical page:
[   11.764709] page:0000000037be271b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104216
[   11.766045] flags: 0x200000000000200(slab|node=0|zone=2)
[   11.766814] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   11.767929] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   11.769087] page dumped because: kasan: bad access detected
[   11.769884] 
[   11.770114] Memory state around the buggy address:
[   11.770807]  ffff888104216500: fa fb fc fc fa fb fc fc 00 06 fc fc 00 06 fc fc
[   11.771886]  ffff888104216580: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   11.773044] >ffff888104216600: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc
[   11.774233]                                            ^
[   11.775075]  ffff888104216680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.776235]  ffff888104216700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.777359] ==================================================================
[   11.778617]     ok 16 - kmalloc_uaf_16
[   11.778927] ==================================================================
[   11.782946] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0xda/0x1e0
[   11.785381] Write of size 128 at addr ffff888105144500 by task kunit_try_catch/303
[   11.787470] 
[   11.787917] CPU: 3 PID: 303 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.790553] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.792857] Call Trace:
[   11.793560]  <TASK>
[   11.794166]  dump_stack_lvl+0x4d/0x66
[   11.795210]  print_report+0x17a/0x471
[   11.796250]  ? kasan_complete_mode_report_info+0x40/0x210
[   11.797373]  ? kmalloc_oob_in_memset+0xda/0x1e0
[   11.798098]  kasan_report+0xb4/0x140
[   11.798679]  ? kmalloc_oob_in_memset+0xda/0x1e0
[   11.799406]  kasan_check_range+0x3e/0x1d0
[   11.800049]  memset+0x28/0x50
[   11.800552]  kmalloc_oob_in_memset+0xda/0x1e0
[   11.801252]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   11.802046]  ? __kasan_check_write+0x18/0x20
[   11.802737]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.803486]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.804275]  ? trace_preempt_on+0x2e/0xf0
[   11.804939]  ? __kthread_parkme+0x4f/0xd0
[   11.805590]  kunit_try_run_case+0x95/0xd0
[   11.806248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.807011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.807976]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.808861]  kthread+0x17d/0x1b0
[   11.809383]  ? __pfx_kthread+0x10/0x10
[   11.809984]  ret_from_fork+0x2c/0x50
[   11.810566]  </TASK>
[   11.810926] 
[   11.811177] Allocated by task 303:
[   11.811728]  kasan_save_stack+0x2a/0x60
[   11.812354]  kasan_set_track+0x29/0x40
[   11.812958]  kasan_save_alloc_info+0x22/0x30
[   11.813638]  __kasan_kmalloc+0xb8/0xc0
[   11.814237]  kmalloc_trace+0x4e/0xb0
[   11.814817]  kmalloc_oob_in_memset+0x9f/0x1e0
[   11.815528]  kunit_try_run_case+0x95/0xd0
[   11.816182]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.817052]  kthread+0x17d/0x1b0
[   11.817576]  ret_from_fork+0x2c/0x50
[   11.818148] 
[   11.818403] The buggy address belongs to the object at ffff888105144500
[   11.818403]  which belongs to the cache kmalloc-128 of size 128
[   11.820360] The buggy address is located 0 bytes inside of
[   11.820360]  128-byte region [ffff888105144500, ffff888105144580)
[   11.822161] 
[   11.822413] The buggy address belongs to the physical page:
[   11.823290] page:00000000f40eef31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105144
[   11.824780] flags: 0x200000000000200(slab|node=0|zone=2)
[   11.825624] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   11.826836] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   11.828046] page dumped because: kasan: bad access detected
[   11.828944] 
[   11.829194] Memory state around the buggy address:
[   11.829957]  ffff888105144400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.831088]  ffff888105144480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.832222] >ffff888105144500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.833367]                                                                 ^
[   11.834488]  ffff888105144580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.835621]  ffff888105144600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.836762] ==================================================================
[   11.838065]     ok 17 - kmalloc_oob_in_memset
[   11.838513] ==================================================================
[   11.841459] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0xdd/0x1e0
[   11.843220] Write of size 2 at addr ffff88810466e577 by task kunit_try_catch/304
[   11.845067] 
[   11.845469] CPU: 2 PID: 304 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.847815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.850093] Call Trace:
[   11.850832]  <TASK>
[   11.851504]  dump_stack_lvl+0x4d/0x66
[   11.852645]  print_report+0x17a/0x471
[   11.853647]  ? kasan_complete_mode_report_info+0x40/0x210
[   11.854527]  ? kmalloc_oob_memset_2+0xdd/0x1e0
[   11.855219]  kasan_report+0xb4/0x140
[   11.855783]  ? kmalloc_oob_memset_2+0xdd/0x1e0
[   11.856500]  kasan_check_range+0x3e/0x1d0
[   11.857137]  memset+0x28/0x50
[   11.857612]  kmalloc_oob_memset_2+0xdd/0x1e0
[   11.858278]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   11.859042]  ? __kasan_check_write+0x18/0x20
[   11.859705]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.860474]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.861513]  ? trace_preempt_on+0x2e/0xf0
[   11.862361]  ? __kthread_parkme+0x4f/0xd0
[   11.863093]  kunit_try_run_case+0x95/0xd0
[   11.863680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.864381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.865256]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.866034]  kthread+0x17d/0x1b0
[   11.866508]  ? __pfx_kthread+0x10/0x10
[   11.867055]  ret_from_fork+0x2c/0x50
[   11.867582]  </TASK>
[   11.867907] 
[   11.868135] Allocated by task 304:
[   11.868641]  kasan_save_stack+0x2a/0x60
[   11.869282]  kasan_set_track+0x29/0x40
[   11.869890]  kasan_save_alloc_info+0x22/0x30
[   11.870579]  __kasan_kmalloc+0xb8/0xc0
[   11.871183]  kmalloc_trace+0x4e/0xb0
[   11.871765]  kmalloc_oob_memset_2+0x9f/0x1e0
[   11.872467]  kunit_try_run_case+0x95/0xd0
[   11.873115]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.873976]  kthread+0x17d/0x1b0
[   11.874505]  ret_from_fork+0x2c/0x50
[   11.875078] 
[   11.875329] The buggy address belongs to the object at ffff88810466e500
[   11.875329]  which belongs to the cache kmalloc-128 of size 128
[   11.877294] The buggy address is located 119 bytes inside of
[   11.877294]  128-byte region [ffff88810466e500, ffff88810466e580)
[   11.879120] 
[   11.879372] The buggy address belongs to the physical page:
[   11.880251] page:000000000cf4b5c4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10466e
[   11.881731] flags: 0x200000000000200(slab|node=0|zone=2)
[   11.882579] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   11.883792] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   11.885015] page dumped because: kasan: bad access detected
[   11.885894] 
[   11.886145] Memory state around the buggy address:
[   11.886903]  ffff88810466e400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc
[   11.888044]  ffff88810466e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.889200] >ffff88810466e500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.890380]                                                                 ^
[   11.891509]  ffff88810466e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.892647]  ffff88810466e600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.893801] ==================================================================
[   11.895105]     ok 18 - kmalloc_oob_memset_2
[   11.895444] ==================================================================
[   11.899654] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0xdd/0x1e0
[   11.901933] Write of size 4 at addr ffff888105144675 by task kunit_try_catch/305
[   11.903970] 
[   11.904432] CPU: 3 PID: 305 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.907052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.909141] Call Trace:
[   11.909551]  <TASK>
[   11.909899]  dump_stack_lvl+0x4d/0x66
[   11.910501]  print_report+0x17a/0x471
[   11.911102]  ? kasan_complete_mode_report_info+0x40/0x210
[   11.911970]  ? kmalloc_oob_memset_4+0xdd/0x1e0
[   11.912708]  kasan_report+0xb4/0x140
[   11.913295]  ? kmalloc_oob_memset_4+0xdd/0x1e0
[   11.914015]  kasan_check_range+0x3e/0x1d0
[   11.914670]  memset+0x28/0x50
[   11.915157]  kmalloc_oob_memset_4+0xdd/0x1e0
[   11.915845]  ? __pfx_kmalloc_oob_memset_4+0x10/0x10
[   11.916655]  ? __kasan_check_write+0x18/0x20
[   11.917345]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.918089]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.918885]  ? trace_preempt_on+0x2e/0xf0
[   11.919534]  ? __kthread_parkme+0x4f/0xd0
[   11.920181]  kunit_try_run_case+0x95/0xd0
[   11.920864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.921622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.922596]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.923464]  kthread+0x17d/0x1b0
[   11.923993]  ? __pfx_kthread+0x10/0x10
[   11.924617]  ret_from_fork+0x2c/0x50
[   11.925204]  </TASK>
[   11.925565] 
[   11.925817] Allocated by task 305:
[   11.926363]  kasan_save_stack+0x2a/0x60
[   11.926985]  kasan_set_track+0x29/0x40
[   11.927593]  kasan_save_alloc_info+0x22/0x30
[   11.928286]  __kasan_kmalloc+0xb8/0xc0
[   11.928921]  kmalloc_trace+0x4e/0xb0
[   11.929499]  kmalloc_oob_memset_4+0x9f/0x1e0
[   11.930189]  kunit_try_run_case+0x95/0xd0
[   11.930839]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.931703]  kthread+0x17d/0x1b0
[   11.932231]  ret_from_fork+0x2c/0x50
[   11.932832] 
[   11.933085] The buggy address belongs to the object at ffff888105144600
[   11.933085]  which belongs to the cache kmalloc-128 of size 128
[   11.935051] The buggy address is located 117 bytes inside of
[   11.935051]  128-byte region [ffff888105144600, ffff888105144680)
[   11.936915] 
[   11.937170] The buggy address belongs to the physical page:
[   11.938057] page:00000000f40eef31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105144
[   11.939545] flags: 0x200000000000200(slab|node=0|zone=2)
[   11.940717] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   11.943339] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   11.945949] page dumped because: kasan: bad access detected
[   11.947809] 
[   11.948352] Memory state around the buggy address:
[   11.949956]  ffff888105144500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   11.952369]  ffff888105144580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.954765] >ffff888105144600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   11.956999]                                                                 ^
[   11.958128]  ffff888105144680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.959264]  ffff888105144700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   11.960411] ==================================================================
[   11.961754]     ok 19 - kmalloc_oob_memset_4
[   11.962148] ==================================================================
[   11.965429] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0xdd/0x1e0
[   11.968098] Write of size 8 at addr ffff88810466e671 by task kunit_try_catch/306
[   11.970491] 
[   11.970894] CPU: 2 PID: 306 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   11.973287] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   11.975383] Call Trace:
[   11.976023]  <TASK>
[   11.976592]  dump_stack_lvl+0x4d/0x66
[   11.977536]  print_report+0x17a/0x471
[   11.978494]  ? kasan_complete_mode_report_info+0x40/0x210
[   11.979854]  ? kmalloc_oob_memset_8+0xdd/0x1e0
[   11.981026]  kasan_report+0xb4/0x140
[   11.981831]  ? kmalloc_oob_memset_8+0xdd/0x1e0
[   11.982552]  kasan_check_range+0x3e/0x1d0
[   11.983202]  memset+0x28/0x50
[   11.983691]  kmalloc_oob_memset_8+0xdd/0x1e0
[   11.984393]  ? __pfx_kmalloc_oob_memset_8+0x10/0x10
[   11.985173]  ? __kasan_check_write+0x18/0x20
[   11.985860]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   11.986607]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   11.987398]  ? trace_preempt_on+0x2e/0xf0
[   11.988030]  ? __kthread_parkme+0x4f/0xd0
[   11.988676]  kunit_try_run_case+0x95/0xd0
[   11.989308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   11.990044]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   11.990985]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.991823]  kthread+0x17d/0x1b0
[   11.992356]  ? __pfx_kthread+0x10/0x10
[   11.992947]  ret_from_fork+0x2c/0x50
[   11.993513]  </TASK>
[   11.993870] 
[   11.994114] Allocated by task 306:
[   11.994652]  kasan_save_stack+0x2a/0x60
[   11.995253]  kasan_set_track+0x29/0x40
[   11.995842]  kasan_save_alloc_info+0x22/0x30
[   11.996523]  __kasan_kmalloc+0xb8/0xc0
[   11.997114]  kmalloc_trace+0x4e/0xb0
[   11.997676]  kmalloc_oob_memset_8+0x9f/0x1e0
[   11.998346]  kunit_try_run_case+0x95/0xd0
[   11.998973]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   11.999808]  kthread+0x17d/0x1b0
[   12.000327]  ret_from_fork+0x2c/0x50
[   12.000891] 
[   12.001136] The buggy address belongs to the object at ffff88810466e600
[   12.001136]  which belongs to the cache kmalloc-128 of size 128
[   12.003043] The buggy address is located 113 bytes inside of
[   12.003043]  128-byte region [ffff88810466e600, ffff88810466e680)
[   12.004863] 
[   12.005110] The buggy address belongs to the physical page:
[   12.005968] page:000000000cf4b5c4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10466e
[   12.007411] flags: 0x200000000000200(slab|node=0|zone=2)
[   12.008186] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   12.009305] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   12.010412] page dumped because: kasan: bad access detected
[   12.011223] 
[   12.011459] Memory state around the buggy address:
[   12.012168]  ffff88810466e500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.013325]  ffff88810466e580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.014473] >ffff88810466e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.015626]                                                                 ^
[   12.016772]  ffff88810466e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.017913]  ffff88810466e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.019056] ==================================================================
[   12.020443]     ok 20 - kmalloc_oob_memset_8
[   12.020792] ==================================================================
[   12.024702] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0xdd/0x1e0
[   12.026470] Write of size 16 at addr ffff888105144769 by task kunit_try_catch/307
[   12.028257] 
[   12.028650] CPU: 3 PID: 307 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   12.030920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   12.032882] Call Trace:
[   12.033284]  <TASK>
[   12.033633]  dump_stack_lvl+0x4d/0x66
[   12.034229]  print_report+0x17a/0x471
[   12.034830]  ? kasan_complete_mode_report_info+0x40/0x210
[   12.035690]  ? kmalloc_oob_memset_16+0xdd/0x1e0
[   12.036424]  kasan_report+0xb4/0x140
[   12.037004]  ? kmalloc_oob_memset_16+0xdd/0x1e0
[   12.037732]  kasan_check_range+0x3e/0x1d0
[   12.038377]  memset+0x28/0x50
[   12.038861]  kmalloc_oob_memset_16+0xdd/0x1e0
[   12.039561]  ? __pfx_kmalloc_oob_memset_16+0x10/0x10
[   12.040362]  ? __kasan_check_write+0x18/0x20
[   12.041046]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.041787]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   12.042577]  ? trace_preempt_on+0x2e/0xf0
[   12.043222]  ? __kthread_parkme+0x4f/0xd0
[   12.043868]  kunit_try_run_case+0x95/0xd0
[   12.044534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.045290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.046258]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.047120]  kthread+0x17d/0x1b0
[   12.047646]  ? __pfx_kthread+0x10/0x10
[   12.048251]  ret_from_fork+0x2c/0x50
[   12.048847]  </TASK>
[   12.049209] 
[   12.049462] Allocated by task 307:
[   12.050014]  kasan_save_stack+0x2a/0x60
[   12.050633]  kasan_set_track+0x29/0x40
[   12.051236]  kasan_save_alloc_info+0x22/0x30
[   12.051920]  __kasan_kmalloc+0xb8/0xc0
[   12.052531]  kmalloc_trace+0x4e/0xb0
[   12.053110]  kmalloc_oob_memset_16+0x9f/0x1e0
[   12.053809]  kunit_try_run_case+0x95/0xd0
[   12.054454]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.055314]  kthread+0x17d/0x1b0
[   12.055836]  ret_from_fork+0x2c/0x50
[   12.056429] 
[   12.056681] The buggy address belongs to the object at ffff888105144700
[   12.056681]  which belongs to the cache kmalloc-128 of size 128
[   12.058644] The buggy address is located 105 bytes inside of
[   12.058644]  128-byte region [ffff888105144700, ffff888105144780)
[   12.060494] 
[   12.060747] The buggy address belongs to the physical page:
[   12.061631] page:00000000f40eef31 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105144
[   12.063109] flags: 0x200000000000200(slab|node=0|zone=2)
[   12.063964] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   12.065206] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   12.066434] page dumped because: kasan: bad access detected
[   12.067322] 
[   12.067576] Memory state around the buggy address:
[   12.068357]  ffff888105144600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   12.069504]  ffff888105144680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.070647] >ffff888105144700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   12.071786]                                                                 ^
[   12.077131]  ffff888105144780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.078252]  ffff888105144800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.079295] ==================================================================
[   12.080579]     ok 21 - kmalloc_oob_memset_16
[   12.081006] ==================================================================
[   12.082800] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0xec/0x1f0
[   12.083921] Read of size 18446744073709551614 at addr ffff8881044e6904 by task kunit_try_catch/308
[   12.085264] 
[   12.085507] CPU: 2 PID: 308 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   12.086940] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   12.088286] Call Trace:
[   12.088810]  <TASK>
[   12.089258]  dump_stack_lvl+0x4d/0x66
[   12.090008]  print_report+0x17a/0x471
[   12.090742]  ? kasan_complete_mode_report_info+0x40/0x210
[   12.091816]  ? kmalloc_memmove_negative_size+0xec/0x1f0
[   12.092876]  kasan_report+0xb4/0x140
[   12.093618]  ? kmalloc_memmove_negative_size+0xec/0x1f0
[   12.094488]  kasan_check_range+0x3e/0x1d0
[   12.095115]  memmove+0x28/0x70
[   12.095596]  kmalloc_memmove_negative_size+0xec/0x1f0
[   12.096394]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   12.097255]  ? __kasan_check_write+0x18/0x20
[   12.097889]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.098561]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   12.099323]  ? trace_preempt_on+0x2e/0xf0
[   12.099976]  ? __kthread_parkme+0x4f/0xd0
[   12.100644]  kunit_try_run_case+0x95/0xd0
[   12.101294]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.102048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.103037]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.103913]  kthread+0x17d/0x1b0
[   12.104453]  ? __pfx_kthread+0x10/0x10
[   12.105057]  ret_from_fork+0x2c/0x50
[   12.105642]  </TASK>
[   12.106002] 
[   12.106253] Allocated by task 308:
[   12.106802]  kasan_save_stack+0x2a/0x60
[   12.107418]  kasan_set_track+0x29/0x40
[   12.108019]  kasan_save_alloc_info+0x22/0x30
[   12.108726]  __kasan_kmalloc+0xb8/0xc0
[   12.109329]  kmalloc_trace+0x4e/0xb0
[   12.109903]  kmalloc_memmove_negative_size+0x9f/0x1f0
[   12.110706]  kunit_try_run_case+0x95/0xd0
[   12.111350]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.112205]  kthread+0x17d/0x1b0
[   12.112738]  ret_from_fork+0x2c/0x50
[   12.113311] 
[   12.113562] The buggy address belongs to the object at ffff8881044e6900
[   12.113562]  which belongs to the cache kmalloc-64 of size 64
[   12.115493] The buggy address is located 4 bytes inside of
[   12.115493]  64-byte region [ffff8881044e6900, ffff8881044e6940)
[   12.117436] 
[   12.117684] The buggy address belongs to the physical page:
[   12.118545] page:000000001d8cf55a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e6
[   12.119993] flags: 0x200000000000200(slab|node=0|zone=2)
[   12.120842] raw: 0200000000000200 ffff888100042640 dead000000000122 0000000000000000
[   12.122032] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   12.123218] page dumped because: kasan: bad access detected
[   12.124095] 
[   12.124360] Memory state around the buggy address:
[   12.125109]  ffff8881044e6800: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
[   12.126217]  ffff8881044e6880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.127329] >ffff8881044e6900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.128462]                    ^
[   12.128973]  ffff8881044e6980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.130083]  ffff8881044e6a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.131192] ==================================================================
[   12.132564]     ok 22 - kmalloc_memmove_negative_size
[   12.133062] ==================================================================
[   12.137798] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0xeb/0x1f0
[   12.140410] Read of size 64 at addr ffff888105141284 by task kunit_try_catch/309
[   12.141972] 
[   12.142253] CPU: 3 PID: 309 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   12.143836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   12.145204] Call Trace:
[   12.145624]  <TASK>
[   12.145984]  dump_stack_lvl+0x4d/0x66
[   12.146595]  print_report+0x17a/0x471
[   12.147198]  ? kasan_complete_mode_report_info+0x40/0x210
[   12.148071]  ? kmalloc_memmove_invalid_size+0xeb/0x1f0
[   12.148943]  kasan_report+0xb4/0x140
[   12.149540]  ? kmalloc_memmove_invalid_size+0xeb/0x1f0
[   12.150389]  kasan_check_range+0x3e/0x1d0
[   12.151054]  memmove+0x28/0x70
[   12.151563]  kmalloc_memmove_invalid_size+0xeb/0x1f0
[   12.152407]  ? __pfx_kmalloc_memmove_invalid_size+0x10/0x10
[   12.153327]  ? __kasan_check_write+0x18/0x20
[   12.154038]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.154805]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   12.155627]  ? trace_preempt_on+0x2e/0xf0
[   12.156305]  ? __kthread_parkme+0x4f/0xd0
[   12.157009]  kunit_try_run_case+0x95/0xd0
[   12.157693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.158472]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.159465]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.160356]  kthread+0x17d/0x1b0
[   12.160902]  ? __pfx_kthread+0x10/0x10
[   12.161528]  ret_from_fork+0x2c/0x50
[   12.162133]  </TASK>
[   12.162503] 
[   12.162760] Allocated by task 309:
[   12.163321]  kasan_save_stack+0x2a/0x60
[   12.163954]  kasan_set_track+0x29/0x40
[   12.164600]  kasan_save_alloc_info+0x22/0x30
[   12.165317]  __kasan_kmalloc+0xb8/0xc0
[   12.165945]  kmalloc_trace+0x4e/0xb0
[   12.166547]  kmalloc_memmove_invalid_size+0x9f/0x1f0
[   12.167368]  kunit_try_run_case+0x95/0xd0
[   12.168038]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.169092]  kthread+0x17d/0x1b0
[   12.169900]  ret_from_fork+0x2c/0x50
[   12.170696] 
[   12.171009] The buggy address belongs to the object at ffff888105141280
[   12.171009]  which belongs to the cache kmalloc-64 of size 64
[   12.173194] The buggy address is located 4 bytes inside of
[   12.173194]  64-byte region [ffff888105141280, ffff8881051412c0)
[   12.175434] 
[   12.175759] The buggy address belongs to the physical page:
[   12.176843] page:0000000046e20c1e refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105141
[   12.178600] flags: 0x200000000000200(slab|node=0|zone=2)
[   12.179512] raw: 0200000000000200 ffff888100042640 dead000000000122 0000000000000000
[   12.180818] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   12.182113] page dumped because: kasan: bad access detected
[   12.183045] 
[   12.183324] Memory state around the buggy address:
[   12.184128]  ffff888105141180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.185346]  ffff888105141200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.186551] >ffff888105141280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   12.187745]                                            ^
[   12.188675]  ffff888105141300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.189884]  ffff888105141380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.191084] ==================================================================
[   12.192454]     ok 23 - kmalloc_memmove_invalid_size
[   12.192763] ==================================================================
[   12.195906] BUG: KASAN: use-after-free in kmalloc_uaf+0xd1/0x1d0
[   12.197473] Read of size 1 at addr ffff888104216668 by task kunit_try_catch/310
[   12.199300] 
[   12.199705] CPU: 2 PID: 310 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   12.202104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   12.204184] Call Trace:
[   12.204852]  <TASK>
[   12.205407]  dump_stack_lvl+0x4d/0x66
[   12.206074]  print_report+0x17a/0x471
[   12.206675]  ? kasan_complete_mode_report_info+0x80/0x210
[   12.207542]  ? kmalloc_uaf+0xd1/0x1d0
[   12.208137]  kasan_report+0xb4/0x140
[   12.208739]  ? kmalloc_uaf+0xd1/0x1d0
[   12.209338]  __asan_load1+0x66/0x70
[   12.209940]  kmalloc_uaf+0xd1/0x1d0
[   12.210495]  ? __pfx_kmalloc_uaf+0x10/0x10
[   12.211138]  ? __kasan_check_write+0x18/0x20
[   12.211808]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.212536]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   12.213272]  ? trace_preempt_on+0x2e/0xf0
[   12.213866]  ? __kthread_parkme+0x4f/0xd0
[   12.214462]  kunit_try_run_case+0x95/0xd0
[   12.215052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.215742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.216661]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.217476]  kthread+0x17d/0x1b0
[   12.217959]  ? __pfx_kthread+0x10/0x10
[   12.218514]  ret_from_fork+0x2c/0x50
[   12.219046]  </TASK>
[   12.219376] 
[   12.219606] Allocated by task 310:
[   12.220104]  kasan_save_stack+0x2a/0x60
[   12.220703]  kasan_set_track+0x29/0x40
[   12.221256]  kasan_save_alloc_info+0x22/0x30
[   12.221894]  __kasan_kmalloc+0xb8/0xc0
[   12.222498]  kmalloc_trace+0x4e/0xb0
[   12.223149]  kmalloc_uaf+0x9d/0x1d0
[   12.223683]  kunit_try_run_case+0x95/0xd0
[   12.224289]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.225145]  kthread+0x17d/0x1b0
[   12.225640]  ret_from_fork+0x2c/0x50
[   12.226185] 
[   12.226424] Freed by task 310:
[   12.226890]  kasan_save_stack+0x2a/0x60
[   12.227474]  kasan_set_track+0x29/0x40
[   12.228045]  kasan_save_free_info+0x32/0x50
[   12.228694]  ____kasan_slab_free+0x174/0x1e0
[   12.229346]  __kasan_slab_free+0x16/0x20
[   12.229979]  __kmem_cache_free+0x18e/0x300
[   12.230665]  kfree+0x7d/0x120
[   12.231174]  kmalloc_uaf+0xb9/0x1d0
[   12.231755]  kunit_try_run_case+0x95/0xd0
[   12.232455]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.233291]  kthread+0x17d/0x1b0
[   12.233799]  ret_from_fork+0x2c/0x50
[   12.234359] 
[   12.234603] The buggy address belongs to the object at ffff888104216660
[   12.234603]  which belongs to the cache kmalloc-16 of size 16
[   12.236486] The buggy address is located 8 bytes inside of
[   12.236486]  16-byte region [ffff888104216660, ffff888104216670)
[   12.238194] 
[   12.238425] The buggy address belongs to the physical page:
[   12.239229] page:0000000037be271b refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104216
[   12.240691] flags: 0x200000000000200(slab|node=0|zone=2)
[   12.241606] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   12.242821] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   12.244035] page dumped because: kasan: bad access detected
[   12.245151] 
[   12.245516] Memory state around the buggy address:
[   12.246457]  ffff888104216500: fa fb fc fc fa fb fc fc 00 06 fc fc 00 06 fc fc
[   12.247568]  ffff888104216580: 00 06 fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   12.248706] >ffff888104216600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc
[   12.249810]                                                           ^
[   12.250833]  ffff888104216680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.251949]  ffff888104216700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.253089] ==================================================================
[   12.254391]     ok 24 - kmalloc_uaf
[   12.255219] ==================================================================
[   12.260128] BUG: KASAN: use-after-free in kmalloc_uaf_memset+0xd7/0x1d0
[   12.262317] Write of size 33 at addr ffff88810131fa00 by task kunit_try_catch/311
[   12.264189] 
[   12.264617] CPU: 0 PID: 311 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   12.266989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   12.269033] Call Trace:
[   12.269616]  <TASK>
[   12.269955]  dump_stack_lvl+0x4d/0x66
[   12.270529]  print_report+0x17a/0x471
[   12.271106]  ? kasan_complete_mode_report_info+0x80/0x210
[   12.271934]  ? kmalloc_uaf_memset+0xd7/0x1d0
[   12.272667]  kasan_report+0xb4/0x140
[   12.273267]  ? kmalloc_uaf_memset+0xd7/0x1d0
[   12.274002]  kasan_check_range+0x3e/0x1d0
[   12.274688]  memset+0x28/0x50
[   12.275188]  kmalloc_uaf_memset+0xd7/0x1d0
[   12.275872]  ? __pfx_kmalloc_uaf_memset+0x10/0x10
[   12.276685]  ? __kasan_check_write+0x18/0x20
[   12.277407]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.278177]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   12.279002]  ? trace_preempt_on+0x2e/0xf0
[   12.279674]  ? __kthread_parkme+0x4f/0xd0
[   12.280383]  kunit_try_run_case+0x95/0xd0
[   12.281066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.281855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.282875]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.283791]  kthread+0x17d/0x1b0
[   12.284357]  ? __pfx_kthread+0x10/0x10
[   12.284978]  ret_from_fork+0x2c/0x50
[   12.285590]  </TASK>
[   12.285965] 
[   12.286226] Allocated by task 311:
[   12.286792]  kasan_save_stack+0x2a/0x60
[   12.287459]  kasan_set_track+0x29/0x40
[   12.288077]  kasan_save_alloc_info+0x22/0x30
[   12.288785]  __kasan_kmalloc+0xb8/0xc0
[   12.289417]  kmalloc_trace+0x4e/0xb0
[   12.290000]  kmalloc_uaf_memset+0x9d/0x1d0
[   12.290685]  kunit_try_run_case+0x95/0xd0
[   12.291345]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.292249]  kthread+0x17d/0x1b0
[   12.292840]  ret_from_fork+0x2c/0x50
[   12.293445] 
[   12.293710] Freed by task 311:
[   12.294365]  kasan_save_stack+0x2a/0x60
[   12.295214]  kasan_set_track+0x29/0x40
[   12.295934]  kasan_save_free_info+0x32/0x50
[   12.296696]  ____kasan_slab_free+0x174/0x1e0
[   12.297412]  __kasan_slab_free+0x16/0x20
[   12.298073]  __kmem_cache_free+0x18e/0x300
[   12.298755]  kfree+0x7d/0x120
[   12.299250]  kmalloc_uaf_memset+0xb9/0x1d0
[   12.299916]  kunit_try_run_case+0x95/0xd0
[   12.300592]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.301459]  kthread+0x17d/0x1b0
[   12.301960]  ret_from_fork+0x2c/0x50
[   12.302513] 
[   12.302808] The buggy address belongs to the object at ffff88810131fa00
[   12.302808]  which belongs to the cache kmalloc-64 of size 64
[   12.304700] The buggy address is located 0 bytes inside of
[   12.304700]  64-byte region [ffff88810131fa00, ffff88810131fa40)
[   12.307010] 
[   12.307564] The buggy address belongs to the physical page:
[   12.309484] page:000000001c3583aa refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10131f
[   12.312656] flags: 0x200000000000200(slab|node=0|zone=2)
[   12.314473] raw: 0200000000000200 ffff888100042640 dead000000000122 0000000000000000
[   12.316948] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   12.318205] page dumped because: kasan: bad access detected
[   12.319115] 
[   12.319375] Memory state around the buggy address:
[   12.320161]  ffff88810131f900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.321348]  ffff88810131f980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.322531] >ffff88810131fa00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.323713]                    ^
[   12.324240]  ffff88810131fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.325404]  ffff88810131fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.326555] ==================================================================
[   12.327841]     ok 25 - kmalloc_uaf_memset
[   12.328240] ==================================================================
[   12.333549] BUG: KASAN: use-after-free in kmalloc_uaf2+0x122/0x2b0
[   12.336059] Read of size 1 at addr ffff8881044e69a8 by task kunit_try_catch/312
[   12.338355] 
[   12.338680] CPU: 2 PID: 312 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   12.340258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   12.341674] Call Trace:
[   12.342096]  <TASK>
[   12.342456]  dump_stack_lvl+0x4d/0x66
[   12.343076]  print_report+0x17a/0x471
[   12.343696]  ? kasan_complete_mode_report_info+0x80/0x210
[   12.344600]  ? kmalloc_uaf2+0x122/0x2b0
[   12.345396]  kasan_report+0xb4/0x140
[   12.346133]  ? kmalloc_uaf2+0x122/0x2b0
[   12.346918]  __asan_load1+0x66/0x70
[   12.347645]  kmalloc_uaf2+0x122/0x2b0
[   12.349129]  ? __pfx_kmalloc_uaf2+0x10/0x10
[   12.349984]  ? trace_preempt_off+0x2e/0xf0
[   12.350814]  ? __kthread_parkme+0x31/0xd0
[   12.351632]  ? __kasan_check_write+0x18/0x20
[   12.352518]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.353467]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   12.354479]  ? trace_preempt_on+0x2e/0xf0
[   12.355298]  ? __kthread_parkme+0x4f/0xd0
[   12.356123]  kunit_try_run_case+0x95/0xd0
[   12.356966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.357923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.359149]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.360254]  kthread+0x17d/0x1b0
[   12.360941]  ? __pfx_kthread+0x10/0x10
[   12.361709]  ret_from_fork+0x2c/0x50
[   12.362442]  </TASK>
[   12.362896] 
[   12.363211] Allocated by task 312:
[   12.363897]  kasan_save_stack+0x2a/0x60
[   12.364689]  kasan_set_track+0x29/0x40
[   12.365452]  kasan_save_alloc_info+0x22/0x30
[   12.366318]  __kasan_kmalloc+0xb8/0xc0
[   12.367115]  kmalloc_trace+0x4e/0xb0
[   12.367859]  kmalloc_uaf2+0xb0/0x2b0
[   12.368766]  kunit_try_run_case+0x95/0xd0
[   12.369596]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.370718]  kthread+0x17d/0x1b0
[   12.371383]  ret_from_fork+0x2c/0x50
[   12.372123] 
[   12.372475] Freed by task 312:
[   12.373087]  kasan_save_stack+0x2a/0x60
[   12.373871]  kasan_set_track+0x29/0x40
[   12.374476]  kasan_save_free_info+0x32/0x50
[   12.375132]  ____kasan_slab_free+0x174/0x1e0
[   12.375792]  __kasan_slab_free+0x16/0x20
[   12.376461]  __kmem_cache_free+0x18e/0x300
[   12.377089]  kfree+0x7d/0x120
[   12.377553]  kmalloc_uaf2+0xd0/0x2b0
[   12.378261]  kunit_try_run_case+0x95/0xd0
[   12.379063]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.380137]  kthread+0x17d/0x1b0
[   12.380854]  ret_from_fork+0x2c/0x50
[   12.381595] 
[   12.381917] The buggy address belongs to the object at ffff8881044e6980
[   12.381917]  which belongs to the cache kmalloc-64 of size 64
[   12.384316] The buggy address is located 40 bytes inside of
[   12.384316]  64-byte region [ffff8881044e6980, ffff8881044e69c0)
[   12.386212] 
[   12.386470] The buggy address belongs to the physical page:
[   12.387304] page:000000001d8cf55a refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e6
[   12.388779] flags: 0x200000000000200(slab|node=0|zone=2)
[   12.389621] raw: 0200000000000200 ffff888100042640 dead000000000122 0000000000000000
[   12.390784] raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
[   12.391992] page dumped because: kasan: bad access detected
[   12.392895] 
[   12.393145] Memory state around the buggy address:
[   12.393903]  ffff8881044e6880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.394976]  ffff8881044e6900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.396025] >ffff8881044e6980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   12.397081]                                   ^
[   12.397747]  ffff8881044e6a00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc
[   12.398793]  ffff8881044e6a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.399840] ==================================================================
[   12.401107]     ok 26 - kmalloc_uaf2
[   12.401590]     ok 27 - kmalloc_uaf3 # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   12.403604]     ok 28 - kfree_via_page
[   12.406605]     ok 29 - kfree_via_phys
[   12.408376] ==================================================================
[   12.409985] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0xe5/0x220
[   12.411016] Read of size 1 at addr ffff8881052f20c8 by task kunit_try_catch/316
[   12.412374] 
[   12.412738] CPU: 2 PID: 316 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   12.414875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   12.416761] Call Trace:
[   12.417334]  <TASK>
[   12.417899]  dump_stack_lvl+0x4d/0x66
[   12.418815]  print_report+0x17a/0x471
[   12.419667]  ? kasan_complete_mode_report_info+0x40/0x210
[   12.421003]  ? kmem_cache_oob+0xe5/0x220
[   12.421793]  kasan_report+0xb4/0x140
[   12.422336]  ? kmem_cache_oob+0xe5/0x220
[   12.422919]  __asan_load1+0x66/0x70
[   12.423447]  kmem_cache_oob+0xe5/0x220
[   12.424013]  ? __pfx_kmem_cache_oob+0x10/0x10
[   12.424697]  ? __kasan_check_write+0x18/0x20
[   12.425382]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   12.426113]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   12.426847]  ? trace_preempt_on+0x2e/0xf0
[   12.427445]  ? __kthread_parkme+0x4f/0xd0
[   12.428040]  kunit_try_run_case+0x95/0xd0
[   12.428695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   12.429397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   12.430287]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.431078]  kthread+0x17d/0x1b0
[   12.431565]  ? __pfx_kthread+0x10/0x10
[   12.432122]  ret_from_fork+0x2c/0x50
[   12.432678]  </TASK>
[   12.433009] 
[   12.433241] Allocated by task 316:
[   12.433746]  kasan_save_stack+0x2a/0x60
[   12.434315]  kasan_set_track+0x29/0x40
[   12.434874]  kasan_save_alloc_info+0x22/0x30
[   12.435506]  __kasan_slab_alloc+0x94/0xa0
[   12.436214]  kmem_cache_alloc+0x171/0x350
[   12.436840]  kmem_cache_oob+0xbd/0x220
[   12.437400]  kunit_try_run_case+0x95/0xd0
[   12.438029]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   12.438823]  kthread+0x17d/0x1b0
[   12.439307]  ret_from_fork+0x2c/0x50
[   12.439840] 
[   12.440073] The buggy address belongs to the object at ffff8881052f2000
[   12.440073]  which belongs to the cache test_cache of size 200
[   12.441882] The buggy address is located 0 bytes to the right of
[   12.441882]  200-byte region [ffff8881052f2000, ffff8881052f20c8)
[   12.443622] 
[   12.443855] The buggy address belongs to the physical page:
[   12.444677] page:00000000ed9b1acd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f2
[   12.446034] head:00000000ed9b1acd order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   12.447364] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   12.448207] raw: 0200000000010200 ffff8881052f0000 dead000000000122 0000000000000000
[   12.449338] raw: 0000000000000000 00000000801f001f 00000001ffffffff 0000000000000000
[   12.450457] page dumped because: kasan: bad access detected
[   12.451266] 
[   12.451500] Memory state around the buggy address:
[   12.452200]  ffff8881052f1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.453269]  ffff8881052f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   12.454315] >ffff8881052f2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   12.455360]                                               ^
[   12.456171]  ffff8881052f2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.457228]  ffff8881052f2180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   12.458280] ==================================================================
[   12.476876]     ok 30 - kmem_cache_oob
[   13.014736]     ok 31 - kmem_cache_accounted
[   13.032915]     ok 32 - kmem_cache_bulk
[   13.033915] ==================================================================
[   13.035532] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0xa3/0x170
[   13.036628] Read of size 1 at addr ffffffff945525ed by task kunit_try_catch/319
[   13.037675] 
[   13.037909] CPU: 2 PID: 319 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.039272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.040485] Call Trace:
[   13.040851]  <TASK>
[   13.041171]  dump_stack_lvl+0x4d/0x66
[   13.041714]  print_report+0x17a/0x471
[   13.042259]  ? kasan_addr_to_slab+0x11/0xb0
[   13.042873]  ? kasan_global_oob_right+0xa3/0x170
[   13.043549]  kasan_report+0xb4/0x140
[   13.044078]  ? kasan_global_oob_right+0xa3/0x170
[   13.044762]  __asan_load1+0x66/0x70
[   13.045278]  kasan_global_oob_right+0xa3/0x170
[   13.045930]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   13.046669]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.047348]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.048073]  ? trace_preempt_on+0x2e/0xf0
[   13.048676]  ? __kthread_parkme+0x4f/0xd0
[   13.049267]  kunit_try_run_case+0x95/0xd0
[   13.049860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.050552]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.051438]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.052223]  kthread+0x17d/0x1b0
[   13.052724]  ? __pfx_kthread+0x10/0x10
[   13.053397]  ret_from_fork+0x2c/0x50
[   13.054032]  </TASK>
[   13.054366] 
[   13.054597] The buggy address belongs to the variable:
[   13.055458]  global_array+0xd/0x40
[   13.056005] 
[   13.056279] The buggy address belongs to the physical page:
[   13.057437] page:000000009af26c2d refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x62d52
[   13.059231] flags: 0x100000000001000(reserved|node=0|zone=1)
[   13.060125] raw: 0100000000001000 ffffea00018b5488 ffffea00018b5488 0000000000000000
[   13.061355] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   13.062559] page dumped because: kasan: bad access detected
[   13.063455] 
[   13.063705] Memory state around the buggy address:
[   13.064470]  ffffffff94552480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.065593]  ffffffff94552500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.066755] >ffffffff94552580: 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[   13.067866]                                                           ^
[   13.068904]  ffffffff94552600: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
[   13.070012]  ffffffff94552680: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   13.071108] ==================================================================
[   13.072211]     ok 33 - kasan_global_oob_right
[   13.072601]     ok 34 - kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y
[   13.073540] ==================================================================
[   13.075784] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0xb3/0x180
[   13.076782] Read of size 1 at addr ffff8881055b7e62 by task kunit_try_catch/321
[   13.077831] 
[   13.078063] CPU: 2 PID: 321 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.079433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.080648] Call Trace:
[   13.081014]  <TASK>
[   13.081332]  dump_stack_lvl+0x4d/0x66
[   13.081874]  print_report+0x17a/0x471
[   13.082420]  ? kasan_addr_to_slab+0x11/0xb0
[   13.083035]  ? kasan_stack_oob+0xb3/0x180
[   13.083627]  kasan_report+0xb4/0x140
[   13.084156]  ? kasan_stack_oob+0xb3/0x180
[   13.084760]  __asan_load1+0x66/0x70
[   13.085275]  kasan_stack_oob+0xb3/0x180
[   13.085840]  ? __pfx_kasan_stack_oob+0x10/0x10
[   13.086491]  ? trace_preempt_off+0x2e/0xf0
[   13.087096]  ? __kthread_parkme+0x31/0xd0
[   13.087688]  ? __kasan_check_write+0x18/0x20
[   13.088328]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.089169]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.090062]  ? trace_preempt_on+0x2e/0xf0
[   13.090820]  ? __kthread_parkme+0x4f/0xd0
[   13.091614]  kunit_try_run_case+0x95/0xd0
[   13.092357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.093250]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.094264]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.095153]  kthread+0x17d/0x1b0
[   13.095679]  ? __pfx_kthread+0x10/0x10
[   13.096353]  ret_from_fork+0x2c/0x50
[   13.096996]  </TASK>
[   13.097413] 
[   13.097672] The buggy address belongs to stack of task kunit_try_catch/321
[   13.098745]  and is located at offset 138 in frame:
[   13.099509]  kasan_stack_oob+0x0/0x180
[   13.100110] 
[   13.100382] This frame has 4 objects:
[   13.101155]  [48, 49) '__assertion'
[   13.101170]  [64, 72) 'array'
[   13.101902]  [96, 112) '__assertion'
[   13.102532]  [128, 138) 'stack_array'
[   13.103116] 
[   13.103882] The buggy address belongs to the physical page:
[   13.104728] page:000000004309e99d refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055b7
[   13.106082] flags: 0x200000000000000(node=0|zone=2)
[   13.106796] raw: 0200000000000000 ffffea0004156dc8 ffffea0004156dc8 0000000000000000
[   13.107905] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   13.109039] page dumped because: kasan: bad access detected
[   13.109838] 
[   13.110069] Memory state around the buggy address:
[   13.110761]  ffff8881055b7d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.111796]  ffff8881055b7d80: 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 f1
[   13.112846] >ffff8881055b7e00: f1 01 f2 00 f2 f2 f2 00 00 f2 f2 00 02 f3 f3 00
[   13.113884]                                                        ^
[   13.114798]  ffff8881055b7e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.115832]  ffff8881055b7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.116882] ==================================================================
[   13.118078]     ok 35 - kasan_stack_oob
[   13.118377] ==================================================================
[   13.121032] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0xea/0x1d0
[   13.122740] Read of size 1 at addr ffff8881055bfd9f by task kunit_try_catch/322
[   13.124484] 
[   13.124859] CPU: 0 PID: 322 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.127052] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.128997] Call Trace:
[   13.129589]  <TASK>
[   13.129941]  dump_stack_lvl+0x4d/0x66
[   13.130480]  print_report+0x17a/0x471
[   13.131066]  ? kasan_addr_to_slab+0x11/0xb0
[   13.131702]  ? kasan_alloca_oob_left+0xea/0x1d0
[   13.132395]  kasan_report+0xb4/0x140
[   13.133088]  ? kasan_alloca_oob_left+0xea/0x1d0
[   13.133983]  __asan_load1+0x66/0x70
[   13.134689]  kasan_alloca_oob_left+0xea/0x1d0
[   13.135597]  ? __switch_to+0x31d/0x710
[   13.136374]  ? __schedule+0x5f8/0x10f0
[   13.137089]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   13.138048]  ? __kthread_parkme+0x31/0xd0
[   13.138841]  ? __kasan_check_write+0x18/0x20
[   13.139470]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.140172]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.140905]  ? trace_preempt_on+0x2e/0xf0
[   13.141533]  ? __kthread_parkme+0x4f/0xd0
[   13.142180]  kunit_try_run_case+0x95/0xd0
[   13.142830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.143581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.144560]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.145420]  kthread+0x17d/0x1b0
[   13.145947]  ? __pfx_kthread+0x10/0x10
[   13.146554]  ret_from_fork+0x2c/0x50
[   13.147141]  </TASK>
[   13.147504] 
[   13.147758] The buggy address belongs to stack of task kunit_try_catch/322
[   13.148872] 
[   13.149123] The buggy address belongs to the physical page:
[   13.150003] page:00000000b454021a refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055bf
[   13.151470] flags: 0x200000000000000(node=0|zone=2)
[   13.152244] raw: 0200000000000000 ffffea0004156fc8 ffffea0004156fc8 0000000000000000
[   13.153469] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   13.154674] page dumped because: kasan: bad access detected
[   13.155568] 
[   13.155832] Memory state around the buggy address:
[   13.156624]  ffff8881055bfc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.157777]  ffff8881055bfd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.158942] >ffff8881055bfd80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 f1 f1 f1
[   13.160085]                             ^
[   13.160740]  ffff8881055bfe00: f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00
[   13.161879]  ffff8881055bfe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.163012] ==================================================================
[   13.164345] kunit_try_catch (322) used greatest stack depth: 28304 bytes left
[   13.164344]     ok 36 - kasan_alloca_oob_left
[   13.165936] ==================================================================
[   13.170317] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0xf3/0x1d0
[   13.172799] Read of size 1 at addr ffff8881055c7daa by task kunit_try_catch/323
[   13.174653] 
[   13.175067] CPU: 2 PID: 323 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.177953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.180704] Call Trace:
[   13.181374]  <TASK>
[   13.181830]  dump_stack_lvl+0x4d/0x66
[   13.182449]  print_report+0x17a/0x471
[   13.183070]  ? kasan_addr_to_slab+0x11/0xb0
[   13.183770]  ? kasan_alloca_oob_right+0xf3/0x1d0
[   13.184624]  kasan_report+0xb4/0x140
[   13.185236]  ? kasan_alloca_oob_right+0xf3/0x1d0
[   13.186006]  __asan_load1+0x66/0x70
[   13.186585]  kasan_alloca_oob_right+0xf3/0x1d0
[   13.187317]  ? __switch_to+0x31d/0x710
[   13.187946]  ? __schedule+0x5f8/0x10f0
[   13.188587]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   13.189423]  ? __kthread_parkme+0x31/0xd0
[   13.190089]  ? __kasan_check_write+0x18/0x20
[   13.190795]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.191557]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.192402]  ? trace_preempt_on+0x2e/0xf0
[   13.193080]  ? __kthread_parkme+0x4f/0xd0
[   13.193744]  kunit_try_run_case+0x95/0xd0
[   13.194406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.195186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.196188]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.197108]  kthread+0x17d/0x1b0
[   13.197648]  ? __pfx_kthread+0x10/0x10
[   13.198277]  ret_from_fork+0x2c/0x50
[   13.198879]  </TASK>
[   13.199249] 
[   13.199511] The buggy address belongs to stack of task kunit_try_catch/323
[   13.203740] 
[   13.204012] The buggy address belongs to the physical page:
[   13.204952] page:00000000186349a0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055c7
[   13.206515] flags: 0x200000000000000(node=0|zone=2)
[   13.207341] raw: 0200000000000000 ffffea00041571c8 ffffea00041571c8 0000000000000000
[   13.208644] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   13.209949] page dumped because: kasan: bad access detected
[   13.210898] 
[   13.211166] Memory state around the buggy address:
[   13.211954]  ffff8881055c7c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.213411]  ffff8881055c7d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.214959] >ffff8881055c7d80: ca ca ca ca 00 02 cb cb cb cb cb cb 00 f1 f1 f1
[   13.216141]                                   ^
[   13.216907]  ffff8881055c7e00: f1 01 f2 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00
[   13.218068]  ffff8881055c7e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.219224] ==================================================================
[   13.220581]     ok 37 - kasan_alloca_oob_right
[   13.221111] ==================================================================
[   13.222988] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0xec/0x1f0
[   13.224105] Read of size 1 at addr ffff888101327580 by task kunit_try_catch/324
[   13.225167] 
[   13.225398] CPU: 0 PID: 324 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.226751] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.227932] Call Trace:
[   13.228293]  <TASK>
[   13.228619]  dump_stack_lvl+0x4d/0x66
[   13.229155]  print_report+0x17a/0x471
[   13.229694]  ? kasan_complete_mode_report_info+0x40/0x210
[   13.230471]  ? ksize_unpoisons_memory+0xec/0x1f0
[   13.231138]  kasan_report+0xb4/0x140
[   13.231663]  ? ksize_unpoisons_memory+0xec/0x1f0
[   13.232356]  __asan_load1+0x66/0x70
[   13.232873]  ksize_unpoisons_memory+0xec/0x1f0
[   13.233519]  ? __pfx_ksize_unpoisons_memory+0x10/0x10
[   13.234244]  ? __kasan_check_write+0x18/0x20
[   13.234984]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.235700]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.236487]  ? trace_preempt_on+0x2e/0xf0
[   13.237115]  ? __kthread_parkme+0x4f/0xd0
[   13.237816]  kunit_try_run_case+0x95/0xd0
[   13.238449]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.239184]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.240125]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.240985]  kthread+0x17d/0x1b0
[   13.241498]  ? __pfx_kthread+0x10/0x10
[   13.242087]  ret_from_fork+0x2c/0x50
[   13.242654]  </TASK>
[   13.243005] 
[   13.243249] Allocated by task 324:
[   13.243792]  kasan_save_stack+0x2a/0x60
[   13.244425]  kasan_set_track+0x29/0x40
[   13.245025]  kasan_save_alloc_info+0x22/0x30
[   13.245707]  __kasan_kmalloc+0xb8/0xc0
[   13.246366]  kmalloc_trace+0x4e/0xb0
[   13.246951]  ksize_unpoisons_memory+0x9f/0x1f0
[   13.247680]  kunit_try_run_case+0x95/0xd0
[   13.248365]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.249224]  kthread+0x17d/0x1b0
[   13.249746]  ret_from_fork+0x2c/0x50
[   13.250369] 
[   13.250619] The buggy address belongs to the object at ffff888101327500
[   13.250619]  which belongs to the cache kmalloc-128 of size 128
[   13.252639] The buggy address is located 0 bytes to the right of
[   13.252639]  128-byte region [ffff888101327500, ffff888101327580)
[   13.254899] 
[   13.255204] The buggy address belongs to the physical page:
[   13.256276] page:0000000084dfb319 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101327
[   13.258178] flags: 0x200000000000200(slab|node=0|zone=2)
[   13.259052] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   13.260240] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   13.261468] page dumped because: kasan: bad access detected
[   13.262346] 
[   13.262596] Memory state around the buggy address:
[   13.263352]  ffff888101327480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.264498]  ffff888101327500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.265629] >ffff888101327580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.266754]                    ^
[   13.267272]  ffff888101327600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.268436]  ffff888101327680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.269563] ==================================================================
[   13.270893]     ok 38 - ksize_unpoisons_memory
[   13.271367] ==================================================================
[   13.275225] BUG: KASAN: use-after-free in ksize_uaf+0xd4/0x300
[   13.277269] Read of size 1 at addr ffff88810466e700 by task kunit_try_catch/325
[   13.279867] 
[   13.280501] CPU: 2 PID: 325 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.282573] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.283840] Call Trace:
[   13.284227]  <TASK>
[   13.284574]  dump_stack_lvl+0x4d/0x66
[   13.285147]  print_report+0x17a/0x471
[   13.285722]  ? kasan_complete_mode_report_info+0x80/0x210
[   13.286558]  ? ksize_uaf+0xd4/0x300
[   13.287115]  kasan_report+0xb4/0x140
[   13.287684]  ? ksize_uaf+0xd4/0x300
[   13.288242]  ? ksize_uaf+0xd4/0x300
[   13.288805]  __kasan_check_byte+0x41/0x50
[   13.289492]  ksize+0x23/0x70
[   13.289943]  ksize_uaf+0xd4/0x300
[   13.290456]  ? __pfx_ksize_uaf+0x10/0x10
[   13.291061]  ? __kasan_check_write+0x18/0x20
[   13.291713]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.292440]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.293198]  ? trace_preempt_on+0x2e/0xf0
[   13.293814]  ? __kthread_parkme+0x4f/0xd0
[   13.294428]  kunit_try_run_case+0x95/0xd0
[   13.295045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.295767]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.296701]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.297529]  kthread+0x17d/0x1b0
[   13.298034]  ? __pfx_kthread+0x10/0x10
[   13.298617]  ret_from_fork+0x2c/0x50
[   13.299178]  </TASK>
[   13.299525] 
[   13.299768] Allocated by task 325:
[   13.300345]  kasan_save_stack+0x2a/0x60
[   13.300942]  kasan_set_track+0x29/0x40
[   13.301530]  kasan_save_alloc_info+0x22/0x30
[   13.302192]  __kasan_kmalloc+0xb8/0xc0
[   13.302770]  kmalloc_trace+0x4e/0xb0
[   13.303316]  ksize_uaf+0x9d/0x300
[   13.303824]  kunit_try_run_case+0x95/0xd0
[   13.304441]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.305250]  kthread+0x17d/0x1b0
[   13.305813]  ret_from_fork+0x2c/0x50
[   13.306355] 
[   13.306592] Freed by task 325:
[   13.307056]  kasan_save_stack+0x2a/0x60
[   13.307640]  kasan_set_track+0x29/0x40
[   13.308208]  kasan_save_free_info+0x32/0x50
[   13.308849]  ____kasan_slab_free+0x174/0x1e0
[   13.309496]  __kasan_slab_free+0x16/0x20
[   13.310095]  __kmem_cache_free+0x18e/0x300
[   13.310721]  kfree+0x7d/0x120
[   13.311185]  ksize_uaf+0xbd/0x300
[   13.311717]  kunit_try_run_case+0x95/0xd0
[   13.312367]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.313215]  kthread+0x17d/0x1b0
[   13.313754]  ret_from_fork+0x2c/0x50
[   13.314319] 
[   13.314566] The buggy address belongs to the object at ffff88810466e700
[   13.314566]  which belongs to the cache kmalloc-128 of size 128
[   13.316487] The buggy address is located 0 bytes inside of
[   13.316487]  128-byte region [ffff88810466e700, ffff88810466e780)
[   13.318252] 
[   13.318521] The buggy address belongs to the physical page:
[   13.319380] page:000000000cf4b5c4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10466e
[   13.320814] flags: 0x200000000000200(slab|node=0|zone=2)
[   13.321626] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   13.322791] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   13.323965] page dumped because: kasan: bad access detected
[   13.324818] 
[   13.325061] Memory state around the buggy address:
[   13.325793]  ffff88810466e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.326928]  ffff88810466e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.328069] >ffff88810466e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.329179]                    ^
[   13.329675]  ffff88810466e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.330743]  ffff88810466e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.331818] ==================================================================
[   13.332966] ==================================================================
[   13.334056] BUG: KASAN: use-after-free in ksize_uaf+0x108/0x300
[   13.334947] Read of size 1 at addr ffff88810466e700 by task kunit_try_catch/325
[   13.336052] 
[   13.336294] CPU: 2 PID: 325 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.337742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.338982] Call Trace:
[   13.339360]  <TASK>
[   13.339689]  dump_stack_lvl+0x4d/0x66
[   13.340248]  print_report+0x17a/0x471
[   13.340824]  ? kasan_complete_mode_report_info+0x80/0x210
[   13.341639]  ? ksize_uaf+0x108/0x300
[   13.342187]  kasan_report+0xb4/0x140
[   13.342736]  ? ksize_uaf+0x108/0x300
[   13.343283]  __asan_load1+0x66/0x70
[   13.343826]  ksize_uaf+0x108/0x300
[   13.344372]  ? __pfx_ksize_uaf+0x10/0x10
[   13.344970]  ? __kasan_check_write+0x18/0x20
[   13.345615]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.346313]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.347061]  ? trace_preempt_on+0x2e/0xf0
[   13.347670]  ? __kthread_parkme+0x4f/0xd0
[   13.348277]  kunit_try_run_case+0x95/0xd0
[   13.348896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.349606]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.350521]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.351337]  kthread+0x17d/0x1b0
[   13.351835]  ? __pfx_kthread+0x10/0x10
[   13.352423]  ret_from_fork+0x2c/0x50
[   13.352974]  </TASK>
[   13.353316] 
[   13.353555] Allocated by task 325:
[   13.354074]  kasan_save_stack+0x2a/0x60
[   13.354658]  kasan_set_track+0x29/0x40
[   13.355230]  kasan_save_alloc_info+0x22/0x30
[   13.355881]  __kasan_kmalloc+0xb8/0xc0
[   13.356460]  kmalloc_trace+0x4e/0xb0
[   13.357001]  ksize_uaf+0x9d/0x300
[   13.357507]  kunit_try_run_case+0x95/0xd0
[   13.358113]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.358918]  kthread+0x17d/0x1b0
[   13.359407]  ret_from_fork+0x2c/0x50
[   13.359950] 
[   13.360187] Freed by task 325:
[   13.360658]  kasan_save_stack+0x2a/0x60
[   13.361238]  kasan_set_track+0x29/0x40
[   13.361807]  kasan_save_free_info+0x32/0x50
[   13.362440]  ____kasan_slab_free+0x174/0x1e0
[   13.363086]  __kasan_slab_free+0x16/0x20
[   13.363685]  __kmem_cache_free+0x18e/0x300
[   13.364309]  kfree+0x7d/0x120
[   13.364788]  ksize_uaf+0xbd/0x300
[   13.365299]  kunit_try_run_case+0x95/0xd0
[   13.365912]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.366734]  kthread+0x17d/0x1b0
[   13.367228]  ret_from_fork+0x2c/0x50
[   13.367814] 
[   13.368056] The buggy address belongs to the object at ffff88810466e700
[   13.368056]  which belongs to the cache kmalloc-128 of size 128
[   13.370025] The buggy address is located 0 bytes inside of
[   13.370025]  128-byte region [ffff88810466e700, ffff88810466e780)
[   13.371814] 
[   13.372053] The buggy address belongs to the physical page:
[   13.372891] page:000000000cf4b5c4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10466e
[   13.374275] flags: 0x200000000000200(slab|node=0|zone=2)
[   13.375072] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   13.376218] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   13.377382] page dumped because: kasan: bad access detected
[   13.378215] 
[   13.378451] Memory state around the buggy address:
[   13.379170]  ffff88810466e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.380243]  ffff88810466e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.381337] >ffff88810466e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.382462]                    ^
[   13.383005]  ffff88810466e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.384166]  ffff88810466e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.385367] ==================================================================
[   13.386568] ==================================================================
[   13.387748] BUG: KASAN: use-after-free in ksize_uaf+0x140/0x300
[   13.388690] Read of size 1 at addr ffff88810466e778 by task kunit_try_catch/325
[   13.389789] 
[   13.390031] CPU: 2 PID: 325 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.391477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.392752] Call Trace:
[   13.393138]  <TASK>
[   13.393472]  dump_stack_lvl+0x4d/0x66
[   13.394044]  print_report+0x17a/0x471
[   13.394616]  ? kasan_complete_mode_report_info+0x80/0x210
[   13.395444]  ? ksize_uaf+0x140/0x300
[   13.396002]  kasan_report+0xb4/0x140
[   13.396570]  ? ksize_uaf+0x140/0x300
[   13.397126]  __asan_load1+0x66/0x70
[   13.397667]  ksize_uaf+0x140/0x300
[   13.398193]  ? __pfx_ksize_uaf+0x10/0x10
[   13.398798]  ? __kasan_check_write+0x18/0x20
[   13.399452]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.400160]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.400924]  ? trace_preempt_on+0x2e/0xf0
[   13.401540]  ? __kthread_parkme+0x4f/0xd0
[   13.402157]  kunit_try_run_case+0x95/0xd0
[   13.402775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.403496]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.404444]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.405273]  kthread+0x17d/0x1b0
[   13.405784]  ? __pfx_kthread+0x10/0x10
[   13.406367]  ret_from_fork+0x2c/0x50
[   13.406927]  </TASK>
[   13.407273] 
[   13.407515] Allocated by task 325:
[   13.408045]  kasan_save_stack+0x2a/0x60
[   13.408647]  kasan_set_track+0x29/0x40
[   13.409230]  kasan_save_alloc_info+0x22/0x30
[   13.409892]  __kasan_kmalloc+0xb8/0xc0
[   13.410479]  kmalloc_trace+0x4e/0xb0
[   13.411029]  ksize_uaf+0x9d/0x300
[   13.411571]  kunit_try_run_case+0x95/0xd0
[   13.412190]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.413021]  kthread+0x17d/0x1b0
[   13.413519]  ret_from_fork+0x2c/0x50
[   13.414068] 
[   13.414345] Freed by task 325:
[   13.414817]  kasan_save_stack+0x2a/0x60
[   13.415406]  kasan_set_track+0x29/0x40
[   13.415982]  kasan_save_free_info+0x32/0x50
[   13.416632]  ____kasan_slab_free+0x174/0x1e0
[   13.417286]  __kasan_slab_free+0x16/0x20
[   13.417893]  __kmem_cache_free+0x18e/0x300
[   13.418525]  kfree+0x7d/0x120
[   13.418989]  ksize_uaf+0xbd/0x300
[   13.419507]  kunit_try_run_case+0x95/0xd0
[   13.420126]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.420960]  kthread+0x17d/0x1b0
[   13.421465]  ret_from_fork+0x2c/0x50
[   13.422023] 
[   13.422266] The buggy address belongs to the object at ffff88810466e700
[   13.422266]  which belongs to the cache kmalloc-128 of size 128
[   13.424155] The buggy address is located 120 bytes inside of
[   13.424155]  128-byte region [ffff88810466e700, ffff88810466e780)
[   13.425904] 
[   13.426143] The buggy address belongs to the physical page:
[   13.426975] page:000000000cf4b5c4 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10466e
[   13.428373] flags: 0x200000000000200(slab|node=0|zone=2)
[   13.429172] raw: 0200000000000200 ffff8881000428c0 dead000000000122 0000000000000000
[   13.430322] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   13.431480] page dumped because: kasan: bad access detected
[   13.432332] 
[   13.432575] Memory state around the buggy address:
[   13.433301]  ffff88810466e600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.434378]  ffff88810466e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.435456] >ffff88810466e700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.436543]                                                                 ^
[   13.437605]  ffff88810466e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.438673]  ffff88810466e800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.439743] ==================================================================
[   13.440907]     ok 39 - ksize_uaf
[   13.441831] ==================================================================
[   13.445525] BUG: KASAN: double-free in kmem_cache_double_free+0xeb/0x1f0
[   13.447923] Free of addr ffff888100294000 by task kunit_try_catch/326
[   13.449894] 
[   13.450165] CPU: 0 PID: 326 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.451764] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.453127] Call Trace:
[   13.453530]  <TASK>
[   13.453881]  dump_stack_lvl+0x4d/0x66
[   13.454488]  print_report+0x17a/0x471
[   13.455126]  ? kmem_cache_double_free+0xeb/0x1f0
[   13.455908]  ? kasan_complete_mode_report_info+0x80/0x210
[   13.456784]  ? kmem_cache_double_free+0xeb/0x1f0
[   13.457523]  ? kmem_cache_double_free+0xeb/0x1f0
[   13.458261]  kasan_report_invalid_free+0x85/0x100
[   13.459012]  ? kmem_cache_double_free+0xeb/0x1f0
[   13.459752]  ____kasan_slab_free+0x19e/0x1e0
[   13.460556]  ? kmem_cache_double_free+0xeb/0x1f0
[   13.461517]  __kasan_slab_free+0x16/0x20
[   13.462365]  kmem_cache_free+0x1a2/0x4b0
[   13.463118]  kmem_cache_double_free+0xeb/0x1f0
[   13.463817]  ? __pfx_kmem_cache_double_free+0x10/0x10
[   13.464619]  ? __kasan_check_write+0x18/0x20
[   13.465285]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.466013]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.466799]  ? trace_preempt_on+0x2e/0xf0
[   13.467431]  ? __kthread_parkme+0x4f/0xd0
[   13.468062]  kunit_try_run_case+0x95/0xd0
[   13.468690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.469487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.470457]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.471317]  kthread+0x17d/0x1b0
[   13.471842]  ? __pfx_kthread+0x10/0x10
[   13.472460]  ret_from_fork+0x2c/0x50
[   13.473042]  </TASK>
[   13.473407] 
[   13.473659] Allocated by task 326:
[   13.474207]  kasan_save_stack+0x2a/0x60
[   13.474823]  kasan_set_track+0x29/0x40
[   13.475426]  kasan_save_alloc_info+0x22/0x30
[   13.476111]  __kasan_slab_alloc+0x94/0xa0
[   13.476770]  kmem_cache_alloc+0x171/0x350
[   13.477416]  kmem_cache_double_free+0xba/0x1f0
[   13.478132]  kunit_try_run_case+0x95/0xd0
[   13.478777]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.479653]  kthread+0x17d/0x1b0
[   13.480178]  ret_from_fork+0x2c/0x50
[   13.480769] 
[   13.481017] Freed by task 326:
[   13.481500]  kasan_save_stack+0x2a/0x60
[   13.482103]  kasan_set_track+0x29/0x40
[   13.482694]  kasan_save_free_info+0x32/0x50
[   13.483351]  ____kasan_slab_free+0x174/0x1e0
[   13.484023]  __kasan_slab_free+0x16/0x20
[   13.484653]  kmem_cache_free+0x1a2/0x4b0
[   13.485268]  kmem_cache_double_free+0xd1/0x1f0
[   13.485971]  kunit_try_run_case+0x95/0xd0
[   13.486604]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.487444]  kthread+0x17d/0x1b0
[   13.487954]  ret_from_fork+0x2c/0x50
[   13.488538] 
[   13.488789] The buggy address belongs to the object at ffff888100294000
[   13.488789]  which belongs to the cache test_cache of size 200
[   13.490738] The buggy address is located 0 bytes inside of
[   13.490738]  200-byte region [ffff888100294000, ffff8881002940c8)
[   13.492569] 
[   13.492824] The buggy address belongs to the physical page:
[   13.493706] page:000000003bf02619 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100294
[   13.495216] head:000000003bf02619 order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   13.496775] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   13.497695] raw: 0200000000010200 ffff888100292000 dead000000000122 0000000000000000
[   13.499032] raw: 0000000000000000 00000000801f001f 00000001ffffffff 0000000000000000
[   13.500258] page dumped because: kasan: bad access detected
[   13.501167] 
[   13.501427] Memory state around the buggy address:
[   13.502191]  ffff888100293f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.503335]  ffff888100293f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.504486] >ffff888100294000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.505640]                    ^
[   13.506171]  ffff888100294080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   13.507310]  ffff888100294100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.508434] ==================================================================
[   13.524025]     ok 40 - kmem_cache_double_free
[   13.525646] ==================================================================
[   13.530849] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0xe4/0x1f0
[   13.533142] Free of addr ffff8881052f2001 by task kunit_try_catch/327
[   13.534395] 
[   13.534643] CPU: 2 PID: 327 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.536107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.537392] Call Trace:
[   13.537782]  <TASK>
[   13.538122]  dump_stack_lvl+0x4d/0x66
[   13.538707]  print_report+0x17a/0x471
[   13.539296]  ? kmem_cache_invalid_free+0xe4/0x1f0
[   13.540041]  ? kasan_complete_mode_report_info+0x40/0x210
[   13.540959]  ? kmem_cache_invalid_free+0xe4/0x1f0
[   13.541706]  ? kmem_cache_invalid_free+0xe4/0x1f0
[   13.542452]  kasan_report_invalid_free+0x85/0x100
[   13.543203]  ? kmem_cache_invalid_free+0xe4/0x1f0
[   13.543975]  ____kasan_slab_free+0x1c2/0x1e0
[   13.544668]  ? kmem_cache_invalid_free+0xe4/0x1f0
[   13.545404]  __kasan_slab_free+0x16/0x20
[   13.546020]  kmem_cache_free+0x1a2/0x4b0
[   13.546640]  kmem_cache_invalid_free+0xe4/0x1f0
[   13.547350]  ? __pfx_kmem_cache_invalid_free+0x10/0x10
[   13.548151]  ? __kasan_check_write+0x18/0x20
[   13.548823]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.549544]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.550314]  ? trace_preempt_on+0x2e/0xf0
[   13.550945]  ? __kthread_parkme+0x4f/0xd0
[   13.551569]  kunit_try_run_case+0x95/0xd0
[   13.552194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.552938]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.553874]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.554705]  kthread+0x17d/0x1b0
[   13.555218]  ? __pfx_kthread+0x10/0x10
[   13.555808]  ret_from_fork+0x2c/0x50
[   13.556424]  </TASK>
[   13.556857] 
[   13.557104] Allocated by task 327:
[   13.557635]  kasan_save_stack+0x2a/0x60
[   13.558240]  kasan_set_track+0x29/0x40
[   13.558829]  kasan_save_alloc_info+0x22/0x30
[   13.559497]  __kasan_slab_alloc+0x94/0xa0
[   13.560125]  kmem_cache_alloc+0x171/0x350
[   13.560818]  kmem_cache_invalid_free+0xbd/0x1f0
[   13.561527]  kunit_try_run_case+0x95/0xd0
[   13.562152]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.562981]  kthread+0x17d/0x1b0
[   13.563487]  ret_from_fork+0x2c/0x50
[   13.564045] 
[   13.564289] The buggy address belongs to the object at ffff8881052f2000
[   13.564289]  which belongs to the cache test_cache of size 200
[   13.566861] The buggy address is located 1 bytes inside of
[   13.566861]  200-byte region [ffff8881052f2000, ffff8881052f20c8)
[   13.568739] 
[   13.568985] The buggy address belongs to the physical page:
[   13.569841] page:00000000ed9b1acd refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f2
[   13.571293] head:00000000ed9b1acd order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   13.572704] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   13.573592] raw: 0200000000010200 ffff8881052f0280 dead000000000122 0000000000000000
[   13.574782] raw: 0000000000000000 00000000801f001f 00000001ffffffff 0000000000000000
[   13.575979] page dumped because: kasan: bad access detected
[   13.576859] 
[   13.577109] Memory state around the buggy address:
[   13.577865]  ffff8881052f1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.578991]  ffff8881052f1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.580114] >ffff8881052f2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   13.581245]                    ^
[   13.581751]  ffff8881052f2080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   13.582853]  ffff8881052f2100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.583961] ==================================================================
[   13.597555]     ok 41 - kmem_cache_invalid_free
[   13.599916] ==================================================================
[   13.603603] BUG: KASAN: use-after-free in kmem_cache_double_destroy+0xc6/0x1c0
[   13.605427] Read of size 1 at addr ffff888100292140 by task kunit_try_catch/328
[   13.607397] 
[   13.607796] CPU: 0 PID: 328 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.610134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.612184] Call Trace:
[   13.612802]  <TASK>
[   13.613304]  dump_stack_lvl+0x4d/0x66
[   13.613992]  print_report+0x17a/0x471
[   13.614567]  ? kasan_complete_mode_report_info+0x80/0x210
[   13.615347]  ? kmem_cache_double_destroy+0xc6/0x1c0
[   13.616052]  kasan_report+0xb4/0x140
[   13.616620]  ? kmem_cache_double_destroy+0xc6/0x1c0
[   13.617336]  ? kmem_cache_double_destroy+0xc6/0x1c0
[   13.618046]  __kasan_check_byte+0x41/0x50
[   13.618661]  kmem_cache_destroy+0x25/0x170
[   13.619264]  kmem_cache_double_destroy+0xc6/0x1c0
[   13.620101]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   13.620960]  ? __kasan_check_write+0x18/0x20
[   13.621641]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.622393]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.623172]  ? trace_preempt_on+0x2e/0xf0
[   13.623801]  ? __kthread_parkme+0x4f/0xd0
[   13.624445]  kunit_try_run_case+0x95/0xd0
[   13.625074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.625812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.626807]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.627672]  kthread+0x17d/0x1b0
[   13.628203]  ? __pfx_kthread+0x10/0x10
[   13.628819]  ret_from_fork+0x2c/0x50
[   13.629388]  </TASK>
[   13.629738] 
[   13.629983] Allocated by task 328:
[   13.630534]  kasan_save_stack+0x2a/0x60
[   13.631097]  kasan_set_track+0x29/0x40
[   13.631645]  kasan_save_alloc_info+0x22/0x30
[   13.632271]  __kasan_slab_alloc+0x94/0xa0
[   13.632912]  kmem_cache_alloc+0x171/0x350
[   13.633543]  kmem_cache_create_usercopy+0x12e/0x2b0
[   13.634316]  kmem_cache_create+0x1a/0x20
[   13.634945]  kmem_cache_double_destroy+0x97/0x1c0
[   13.635634]  kunit_try_run_case+0x95/0xd0
[   13.636239]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.637141]  kthread+0x17d/0x1b0
[   13.637668]  ret_from_fork+0x2c/0x50
[   13.638247] 
[   13.638512] Freed by task 328:
[   13.639010]  kasan_save_stack+0x2a/0x60
[   13.639631]  kasan_set_track+0x29/0x40
[   13.640237]  kasan_save_free_info+0x32/0x50
[   13.640949]  ____kasan_slab_free+0x174/0x1e0
[   13.641686]  __kasan_slab_free+0x16/0x20
[   13.642322]  kmem_cache_free+0x1a2/0x4b0
[   13.642953]  slab_kmem_cache_release+0x30/0x40
[   13.643669]  kmem_cache_release+0x16/0x20
[   13.644360]  kobject_put+0x100/0x260
[   13.644983]  sysfs_slab_release+0x24/0x30
[   13.645632]  kmem_cache_destroy+0xda/0x170
[   13.646297]  kmem_cache_double_destroy+0xaf/0x1c0
[   13.647052]  kunit_try_run_case+0x95/0xd0
[   13.647702]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.648592]  kthread+0x17d/0x1b0
[   13.649161]  ret_from_fork+0x2c/0x50
[   13.649749] 
[   13.650001] The buggy address belongs to the object at ffff888100292140
[   13.650001]  which belongs to the cache kmem_cache of size 216
[   13.651951] The buggy address is located 0 bytes inside of
[   13.651951]  216-byte region [ffff888100292140, ffff888100292218)
[   13.653771] 
[   13.654021] The buggy address belongs to the physical page:
[   13.654905] page:0000000024794175 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100292
[   13.656379] head:0000000024794175 order:1 compound_mapcount:0 subpages_mapcount:0 compound_pincount:0
[   13.657841] flags: 0x200000000010200(slab|head|node=0|zone=2)
[   13.658789] raw: 0200000000010200 ffff888100042000 dead000000000122 0000000000000000
[   13.659989] raw: 0000000000000000 0000000080190019 00000001ffffffff 0000000000000000
[   13.661202] page dumped because: kasan: bad access detected
[   13.662091] 
[   13.662354] Memory state around the buggy address:
[   13.663049]  ffff888100292000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.664087]  ffff888100292080: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc
[   13.665208] >ffff888100292100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
[   13.666418]                                            ^
[   13.667219]  ffff888100292180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   13.668256]  ffff888100292200: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.669387] ==================================================================
[   13.670666]     ok 42 - kmem_cache_double_destroy
[   13.671022] ==================================================================
[   13.682951] BUG: KASAN: slab-out-of-bounds in memchr+0x27/0x60
[   13.684052] Read of size 1 at addr ffff8881044e1558 by task kunit_try_catch/329
[   13.685268] 
[   13.685534] CPU: 2 PID: 329 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.687118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.688517] Call Trace:
[   13.688941]  <TASK>
[   13.689308]  dump_stack_lvl+0x4d/0x66
[   13.689946]  print_report+0x17a/0x471
[   13.690584]  ? kasan_complete_mode_report_info+0x40/0x210
[   13.691491]  ? memchr+0x27/0x60
[   13.692029]  kasan_report+0xb4/0x140
[   13.692679]  ? memchr+0x27/0x60
[   13.693219]  __asan_load1+0x66/0x70
[   13.693811]  memchr+0x27/0x60
[   13.694311]  kasan_memchr+0xdd/0x1f0
[   13.694908]  ? __pfx_kasan_memchr+0x10/0x10
[   13.695601]  ? __kasan_check_write+0x18/0x20
[   13.696307]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.697090]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.697917]  ? trace_preempt_on+0x2e/0xf0
[   13.698587]  ? __kthread_parkme+0x4f/0xd0
[   13.699257]  kunit_try_run_case+0x95/0xd0
[   13.699937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.700781]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.701781]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.702670]  kthread+0x17d/0x1b0
[   13.703213]  ? __pfx_kthread+0x10/0x10
[   13.703836]  ret_from_fork+0x2c/0x50
[   13.704453]  </TASK>
[   13.704834] 
[   13.705101] Allocated by task 329:
[   13.705679]  kasan_save_stack+0x2a/0x60
[   13.706313]  kasan_set_track+0x29/0x40
[   13.706933]  kasan_save_alloc_info+0x22/0x30
[   13.707646]  __kasan_kmalloc+0xb8/0xc0
[   13.708277]  kmalloc_trace+0x4e/0xb0
[   13.708891]  kasan_memchr+0x9f/0x1f0
[   13.709484]  kunit_try_run_case+0x95/0xd0
[   13.710147]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.711027]  kthread+0x17d/0x1b0
[   13.711563]  ret_from_fork+0x2c/0x50
[   13.712161] 
[   13.712456] The buggy address belongs to the object at ffff8881044e1540
[   13.712456]  which belongs to the cache kmalloc-32 of size 32
[   13.715096] The buggy address is located 24 bytes inside of
[   13.715096]  32-byte region [ffff8881044e1540, ffff8881044e1560)
[   13.716997] 
[   13.717257] The buggy address belongs to the physical page:
[   13.718172] page:00000000e0a1c7c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e1
[   13.719708] flags: 0x200000000000200(slab|node=0|zone=2)
[   13.720681] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   13.722361] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   13.723697] page dumped because: kasan: bad access detected
[   13.724568] 
[   13.724812] Memory state around the buggy address:
[   13.725543]  ffff8881044e1400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   13.726638]  ffff8881044e1480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   13.727730] >ffff8881044e1500: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   13.728835]                                                     ^
[   13.729780]  ffff8881044e1580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.730874]  ffff8881044e1600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.731966] ==================================================================
[   13.733327]     ok 43 - kasan_memchr
[   13.746691] ==================================================================
[   13.750406] BUG: KASAN: slab-out-of-bounds in memcmp+0x3d/0xb0
[   13.752295] Read of size 1 at addr ffff888101326558 by task kunit_try_catch/330
[   13.754877] 
[   13.755397] CPU: 0 PID: 330 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.758101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.759306] Call Trace:
[   13.759672]  <TASK>
[   13.759993]  dump_stack_lvl+0x4d/0x66
[   13.760569]  print_report+0x17a/0x471
[   13.761155]  ? kasan_complete_mode_report_info+0x40/0x210
[   13.762010]  ? memcmp+0x3d/0xb0
[   13.762536]  kasan_report+0xb4/0x140
[   13.763125]  ? memcmp+0x3d/0xb0
[   13.763645]  __asan_load1+0x66/0x70
[   13.764219]  memcmp+0x3d/0xb0
[   13.764723]  kasan_memcmp+0x10d/0x240
[   13.765341]  ? __pfx_kasan_memcmp+0x10/0x10
[   13.766023]  ? trace_preempt_off+0x2e/0xf0
[   13.766692]  ? __kthread_parkme+0x31/0xd0
[   13.767339]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.768078]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.768891]  ? trace_preempt_on+0x2e/0xf0
[   13.769554]  ? __kthread_parkme+0x4f/0xd0
[   13.770188]  kunit_try_run_case+0x95/0xd0
[   13.770819]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.771571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.772548]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.773427]  kthread+0x17d/0x1b0
[   13.773945]  ? __pfx_kthread+0x10/0x10
[   13.774536]  ret_from_fork+0x2c/0x50
[   13.775107]  </TASK>
[   13.775461] 
[   13.775710] Allocated by task 330:
[   13.776245]  kasan_save_stack+0x2a/0x60
[   13.776868]  kasan_set_track+0x29/0x40
[   13.777476]  kasan_save_alloc_info+0x22/0x30
[   13.778151]  __kasan_kmalloc+0xb8/0xc0
[   13.778743]  kmalloc_trace+0x4e/0xb0
[   13.779306]  kasan_memcmp+0xb0/0x240
[   13.779870]  kunit_try_run_case+0x95/0xd0
[   13.780518]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.781376]  kthread+0x17d/0x1b0
[   13.781892]  ret_from_fork+0x2c/0x50
[   13.782459] 
[   13.782706] The buggy address belongs to the object at ffff888101326540
[   13.782706]  which belongs to the cache kmalloc-32 of size 32
[   13.784618] The buggy address is located 24 bytes inside of
[   13.784618]  32-byte region [ffff888101326540, ffff888101326560)
[   13.786336] 
[   13.786569] The buggy address belongs to the physical page:
[   13.787377] page:0000000013396a53 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101326
[   13.788808] flags: 0x200000000000200(slab|node=0|zone=2)
[   13.789636] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   13.790790] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   13.792055] page dumped because: kasan: bad access detected
[   13.792945] 
[   13.793195] Memory state around the buggy address:
[   13.793963]  ffff888101326400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   13.795082]  ffff888101326480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   13.796194] >ffff888101326500: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   13.797395]                                                     ^
[   13.798347]  ffff888101326580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.799477]  ffff888101326600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.800641] ==================================================================
[   13.801860]     ok 44 - kasan_memcmp
[   13.802327] ==================================================================
[   13.804904] BUG: KASAN: use-after-free in strchr+0x18/0x60
[   13.806184] Read of size 1 at addr ffff8881044e1610 by task kunit_try_catch/331
[   13.807863] 
[   13.808234] CPU: 2 PID: 331 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.810177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.811457] Call Trace:
[   13.811849]  <TASK>
[   13.812191]  dump_stack_lvl+0x4d/0x66
[   13.812780]  print_report+0x17a/0x471
[   13.813358]  ? kasan_complete_mode_report_info+0x80/0x210
[   13.814192]  ? strchr+0x18/0x60
[   13.814689]  kasan_report+0xb4/0x140
[   13.815253]  ? strchr+0x18/0x60
[   13.815755]  __asan_load1+0x66/0x70
[   13.816315]  strchr+0x18/0x60
[   13.816815]  kasan_strings+0xdd/0x500
[   13.817400]  ? __pfx_kasan_strings+0x10/0x10
[   13.818081]  ? __kasan_check_write+0x18/0x20
[   13.818761]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.819497]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.820290]  ? trace_preempt_on+0x2e/0xf0
[   13.820945]  ? __kthread_parkme+0x4f/0xd0
[   13.821928]  kunit_try_run_case+0x95/0xd0
[   13.822616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.823418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.824473]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.825387]  kthread+0x17d/0x1b0
[   13.825945]  ? __pfx_kthread+0x10/0x10
[   13.826599]  ret_from_fork+0x2c/0x50
[   13.827233]  </TASK>
[   13.827614] 
[   13.827874] Allocated by task 331:
[   13.828452]  kasan_save_stack+0x2a/0x60
[   13.829091]  kasan_set_track+0x29/0x40
[   13.829720]  kasan_save_alloc_info+0x22/0x30
[   13.830429]  __kasan_kmalloc+0xb8/0xc0
[   13.831058]  kmalloc_trace+0x4e/0xb0
[   13.831656]  kasan_strings+0x9d/0x500
[   13.832266]  kunit_try_run_case+0x95/0xd0
[   13.833132]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.834297]  kthread+0x17d/0x1b0
[   13.835035]  ret_from_fork+0x2c/0x50
[   13.835647] 
[   13.835909] Freed by task 331:
[   13.836505]  kasan_save_stack+0x2a/0x60
[   13.837160]  kasan_set_track+0x29/0x40
[   13.837791]  kasan_save_free_info+0x32/0x50
[   13.838492]  ____kasan_slab_free+0x174/0x1e0
[   13.839210]  __kasan_slab_free+0x16/0x20
[   13.839870]  __kmem_cache_free+0x18e/0x300
[   13.840630]  kfree+0x7d/0x120
[   13.841292]  kasan_strings+0xc1/0x500
[   13.842113]  kunit_try_run_case+0x95/0xd0
[   13.842994]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.843828]  kthread+0x17d/0x1b0
[   13.844355]  ret_from_fork+0x2c/0x50
[   13.844976] 
[   13.845220] The buggy address belongs to the object at ffff8881044e1600
[   13.845220]  which belongs to the cache kmalloc-32 of size 32
[   13.847083] The buggy address is located 16 bytes inside of
[   13.847083]  32-byte region [ffff8881044e1600, ffff8881044e1620)
[   13.848915] 
[   13.849159] The buggy address belongs to the physical page:
[   13.850014] page:00000000e0a1c7c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e1
[   13.851446] flags: 0x200000000000200(slab|node=0|zone=2)
[   13.852274] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   13.853611] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   13.854886] page dumped because: kasan: bad access detected
[   13.855807] 
[   13.856069] Memory state around the buggy address:
[   13.856893]  ffff8881044e1500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   13.858088]  ffff8881044e1580: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   13.859269] >ffff8881044e1600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   13.860458]                          ^
[   13.861082]  ffff8881044e1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.862260]  ffff8881044e1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.863439] ==================================================================
[   13.864820] ==================================================================
[   13.866026] BUG: KASAN: use-after-free in strrchr+0x1e/0x40
[   13.866962] Read of size 1 at addr ffff8881044e1610 by task kunit_try_catch/331
[   13.868199] 
[   13.868483] CPU: 2 PID: 331 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.870056] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.871439] Call Trace:
[   13.871866]  <TASK>
[   13.872236]  dump_stack_lvl+0x4d/0x66
[   13.873026]  print_report+0x17a/0x471
[   13.873842]  ? kasan_complete_mode_report_info+0x80/0x210
[   13.874941]  ? strrchr+0x1e/0x40
[   13.875489]  kasan_report+0xb4/0x140
[   13.876088]  ? strrchr+0x1e/0x40
[   13.876644]  __asan_load1+0x66/0x70
[   13.877231]  strrchr+0x1e/0x40
[   13.877747]  kasan_strings+0x11d/0x500
[   13.878373]  ? __pfx_kasan_strings+0x10/0x10
[   13.879083]  ? __kasan_check_write+0x18/0x20
[   13.879797]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.880654]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.881736]  ? trace_preempt_on+0x2e/0xf0
[   13.882642]  ? __kthread_parkme+0x4f/0xd0
[   13.883361]  kunit_try_run_case+0x95/0xd0
[   13.883995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.884739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.885684]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.886522]  kthread+0x17d/0x1b0
[   13.887033]  ? __pfx_kthread+0x10/0x10
[   13.887624]  ret_from_fork+0x2c/0x50
[   13.888188]  </TASK>
[   13.888543] 
[   13.888787] Allocated by task 331:
[   13.889317]  kasan_save_stack+0x2a/0x60
[   13.889915]  kasan_set_track+0x29/0x40
[   13.890499]  kasan_save_alloc_info+0x22/0x30
[   13.891161]  __kasan_kmalloc+0xb8/0xc0
[   13.891745]  kmalloc_trace+0x4e/0xb0
[   13.892302]  kasan_strings+0x9d/0x500
[   13.892894]  kunit_try_run_case+0x95/0xd0
[   13.893519]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.894349]  kthread+0x17d/0x1b0
[   13.894857]  ret_from_fork+0x2c/0x50
[   13.895420] 
[   13.895665] Freed by task 331:
[   13.896147]  kasan_save_stack+0x2a/0x60
[   13.896816]  kasan_set_track+0x29/0x40
[   13.897453]  kasan_save_free_info+0x32/0x50
[   13.898154]  ____kasan_slab_free+0x174/0x1e0
[   13.898864]  __kasan_slab_free+0x16/0x20
[   13.899518]  __kmem_cache_free+0x18e/0x300
[   13.900201]  kfree+0x7d/0x120
[   13.900726]  kasan_strings+0xc1/0x500
[   13.901353]  kunit_try_run_case+0x95/0xd0
[   13.902035]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.902922]  kthread+0x17d/0x1b0
[   13.903463]  ret_from_fork+0x2c/0x50
[   13.904060] 
[   13.904321] The buggy address belongs to the object at ffff8881044e1600
[   13.904321]  which belongs to the cache kmalloc-32 of size 32
[   13.906338] The buggy address is located 16 bytes inside of
[   13.906338]  32-byte region [ffff8881044e1600, ffff8881044e1620)
[   13.908213] 
[   13.908486] The buggy address belongs to the physical page:
[   13.909402] page:00000000e0a1c7c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e1
[   13.910933] flags: 0x200000000000200(slab|node=0|zone=2)
[   13.911818] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   13.913335] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   13.914992] page dumped because: kasan: bad access detected
[   13.915915] 
[   13.916181] Memory state around the buggy address:
[   13.917053]  ffff8881044e1500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   13.918258]  ffff8881044e1580: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   13.919458] >ffff8881044e1600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   13.920780]                          ^
[   13.921598]  ffff8881044e1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.923125]  ffff8881044e1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.924319] ==================================================================
[   13.925671] ==================================================================
[   13.926878] BUG: KASAN: use-after-free in strcmp+0x26/0x60
[   13.927788] Read of size 1 at addr ffff8881044e1610 by task kunit_try_catch/331
[   13.929011] 
[   13.929275] CPU: 2 PID: 331 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.930839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.932223] Call Trace:
[   13.932658]  <TASK>
[   13.933022]  dump_stack_lvl+0x4d/0x66
[   13.933635]  print_report+0x17a/0x471
[   13.934249]  ? kasan_complete_mode_report_info+0x80/0x210
[   13.935140]  ? strcmp+0x26/0x60
[   13.935676]  kasan_report+0xb4/0x140
[   13.936279]  ? strcmp+0x26/0x60
[   13.936818]  __asan_load1+0x66/0x70
[   13.937401]  strcmp+0x26/0x60
[   13.937877]  kasan_strings+0x15f/0x500
[   13.938503]  ? __pfx_kasan_strings+0x10/0x10
[   13.939219]  ? __kasan_check_write+0x18/0x20
[   13.939932]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.940714]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.941537]  ? trace_preempt_on+0x2e/0xf0
[   13.942210]  ? __kthread_parkme+0x4f/0xd0
[   13.942879]  kunit_try_run_case+0x95/0xd0
[   13.943552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.944344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.945356]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.946259]  kthread+0x17d/0x1b0
[   13.946814]  ? __pfx_kthread+0x10/0x10
[   13.947447]  ret_from_fork+0x2c/0x50
[   13.948048]  </TASK>
[   13.948437] 
[   13.948696] Allocated by task 331:
[   13.949260]  kasan_save_stack+0x2a/0x60
[   13.949897]  kasan_set_track+0x29/0x40
[   13.950520]  kasan_save_alloc_info+0x22/0x30
[   13.951227]  __kasan_kmalloc+0xb8/0xc0
[   13.951850]  kmalloc_trace+0x4e/0xb0
[   13.952481]  kasan_strings+0x9d/0x500
[   13.953285]  kunit_try_run_case+0x95/0xd0
[   13.954169]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.955257]  kthread+0x17d/0x1b0
[   13.955803]  ret_from_fork+0x2c/0x50
[   13.956421] 
[   13.956687] Freed by task 331:
[   13.957298]  kasan_save_stack+0x2a/0x60
[   13.957956]  kasan_set_track+0x29/0x40
[   13.958588]  kasan_save_free_info+0x32/0x50
[   13.959284]  ____kasan_slab_free+0x174/0x1e0
[   13.959999]  __kasan_slab_free+0x16/0x20
[   13.960771]  __kmem_cache_free+0x18e/0x300
[   13.961678]  kfree+0x7d/0x120
[   13.962336]  kasan_strings+0xc1/0x500
[   13.963141]  kunit_try_run_case+0x95/0xd0
[   13.963818]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   13.964705]  kthread+0x17d/0x1b0
[   13.965213]  ret_from_fork+0x2c/0x50
[   13.965769] 
[   13.966014] The buggy address belongs to the object at ffff8881044e1600
[   13.966014]  which belongs to the cache kmalloc-32 of size 32
[   13.967875] The buggy address is located 16 bytes inside of
[   13.967875]  32-byte region [ffff8881044e1600, ffff8881044e1620)
[   13.969564] 
[   13.969800] The buggy address belongs to the physical page:
[   13.970617] page:00000000e0a1c7c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e1
[   13.971980] flags: 0x200000000000200(slab|node=0|zone=2)
[   13.972777] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   13.973902] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   13.975025] page dumped because: kasan: bad access detected
[   13.975841] 
[   13.976074] Memory state around the buggy address:
[   13.976801]  ffff8881044e1500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   13.977852]  ffff8881044e1580: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   13.978948] >ffff8881044e1600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   13.979995]                          ^
[   13.980559]  ffff8881044e1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.981611]  ffff8881044e1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.982660] ==================================================================
[   13.983744] ==================================================================
[   13.984810] BUG: KASAN: use-after-free in strncmp+0x36/0x80
[   13.985629] Read of size 1 at addr ffff8881044e1610 by task kunit_try_catch/331
[   13.986692] 
[   13.986926] CPU: 2 PID: 331 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   13.988315] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   13.990068] Call Trace:
[   13.990596]  <TASK>
[   13.991029]  dump_stack_lvl+0x4d/0x66
[   13.991622]  print_report+0x17a/0x471
[   13.992212]  ? kasan_complete_mode_report_info+0x80/0x210
[   13.993080]  ? strncmp+0x36/0x80
[   13.993601]  kasan_report+0xb4/0x140
[   13.994176]  ? strncmp+0x36/0x80
[   13.994699]  __asan_load1+0x66/0x70
[   13.995265]  strncmp+0x36/0x80
[   13.995761]  kasan_strings+0x1a5/0x500
[   13.996380]  ? __pfx_kasan_strings+0x10/0x10
[   13.997285]  ? __kasan_check_write+0x18/0x20
[   13.998214]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   13.999113]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   13.999846]  ? trace_preempt_on+0x2e/0xf0
[   14.000545]  ? __kthread_parkme+0x4f/0xd0
[   14.001153]  kunit_try_run_case+0x95/0xd0
[   14.001751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.002452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.003342]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.004139]  kthread+0x17d/0x1b0
[   14.004635]  ? __pfx_kthread+0x10/0x10
[   14.005193]  ret_from_fork+0x2c/0x50
[   14.005728]  </TASK>
[   14.006059] 
[   14.006314] Allocated by task 331:
[   14.006843]  kasan_save_stack+0x2a/0x60
[   14.007412]  kasan_set_track+0x29/0x40
[   14.007968]  kasan_save_alloc_info+0x22/0x30
[   14.008613]  __kasan_kmalloc+0xb8/0xc0
[   14.009168]  kmalloc_trace+0x4e/0xb0
[   14.009699]  kasan_strings+0x9d/0x500
[   14.010241]  kunit_try_run_case+0x95/0xd0
[   14.010835]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.011623]  kthread+0x17d/0x1b0
[   14.012103]  ret_from_fork+0x2c/0x50
[   14.012652] 
[   14.012884] Freed by task 331:
[   14.013338]  kasan_save_stack+0x2a/0x60
[   14.013908]  kasan_set_track+0x29/0x40
[   14.014464]  kasan_save_free_info+0x32/0x50
[   14.015083]  ____kasan_slab_free+0x174/0x1e0
[   14.015716]  __kasan_slab_free+0x16/0x20
[   14.016297]  __kmem_cache_free+0x18e/0x300
[   14.016910]  kfree+0x7d/0x120
[   14.017352]  kasan_strings+0xc1/0x500
[   14.017893]  kunit_try_run_case+0x95/0xd0
[   14.018482]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.019268]  kthread+0x17d/0x1b0
[   14.019749]  ret_from_fork+0x2c/0x50
[   14.020277] 
[   14.020526] The buggy address belongs to the object at ffff8881044e1600
[   14.020526]  which belongs to the cache kmalloc-32 of size 32
[   14.022308] The buggy address is located 16 bytes inside of
[   14.022308]  32-byte region [ffff8881044e1600, ffff8881044e1620)
[   14.023977] 
[   14.024210] The buggy address belongs to the physical page:
[   14.025034] page:00000000e0a1c7c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e1
[   14.026394] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.027173] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   14.028294] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   14.029894] page dumped because: kasan: bad access detected
[   14.031023] 
[   14.031277] Memory state around the buggy address:
[   14.032043]  ffff8881044e1500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.033186]  ffff8881044e1580: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   14.034323] >ffff8881044e1600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   14.035451]                          ^
[   14.036049]  ffff8881044e1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.037207]  ffff8881044e1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.038339] ==================================================================
[   14.039503] ==================================================================
[   14.040805] BUG: KASAN: use-after-free in strlen+0x13/0x50
[   14.041964] Read of size 1 at addr ffff8881044e1610 by task kunit_try_catch/331
[   14.043307] 
[   14.043551] CPU: 2 PID: 331 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.044958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.046172] Call Trace:
[   14.046546]  <TASK>
[   14.046869]  dump_stack_lvl+0x4d/0x66
[   14.047417]  print_report+0x17a/0x471
[   14.047965]  ? kasan_complete_mode_report_info+0x80/0x210
[   14.048771]  ? strlen+0x13/0x50
[   14.049245]  kasan_report+0xb4/0x140
[   14.049780]  ? strlen+0x13/0x50
[   14.050254]  __asan_load1+0x66/0x70
[   14.050779]  strlen+0x13/0x50
[   14.051229]  kasan_strings+0x1df/0x500
[   14.051789]  ? __pfx_kasan_strings+0x10/0x10
[   14.052431]  ? __kasan_check_write+0x18/0x20
[   14.053062]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.053752]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.054491]  ? trace_preempt_on+0x2e/0xf0
[   14.055088]  ? __kthread_parkme+0x4f/0xd0
[   14.055683]  kunit_try_run_case+0x95/0xd0
[   14.056279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.056997]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.057895]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.058690]  kthread+0x17d/0x1b0
[   14.059175]  ? __pfx_kthread+0x10/0x10
[   14.059734]  ret_from_fork+0x2c/0x50
[   14.060272]  </TASK>
[   14.060615] 
[   14.060849] Allocated by task 331:
[   14.061354]  kasan_save_stack+0x2a/0x60
[   14.061926]  kasan_set_track+0x29/0x40
[   14.062490]  kasan_save_alloc_info+0x22/0x30
[   14.063126]  __kasan_kmalloc+0xb8/0xc0
[   14.063684]  kmalloc_trace+0x4e/0xb0
[   14.064217]  kasan_strings+0x9d/0x500
[   14.064977]  kunit_try_run_case+0x95/0xd0
[   14.065841]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.066952]  kthread+0x17d/0x1b0
[   14.067474]  ret_from_fork+0x2c/0x50
[   14.068049] 
[   14.068298] Freed by task 331:
[   14.068802]  kasan_save_stack+0x2a/0x60
[   14.069414]  kasan_set_track+0x29/0x40
[   14.070013]  kasan_save_free_info+0x32/0x50
[   14.070684]  ____kasan_slab_free+0x174/0x1e0
[   14.071368]  __kasan_slab_free+0x16/0x20
[   14.071997]  __kmem_cache_free+0x18e/0x300
[   14.072780]  kfree+0x7d/0x120
[   14.073417]  kasan_strings+0xc1/0x500
[   14.074211]  kunit_try_run_case+0x95/0xd0
[   14.075012]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.075814]  kthread+0x17d/0x1b0
[   14.076298]  ret_from_fork+0x2c/0x50
[   14.076846] 
[   14.077080] The buggy address belongs to the object at ffff8881044e1600
[   14.077080]  which belongs to the cache kmalloc-32 of size 32
[   14.078902] The buggy address is located 16 bytes inside of
[   14.078902]  32-byte region [ffff8881044e1600, ffff8881044e1620)
[   14.080604] 
[   14.080841] The buggy address belongs to the physical page:
[   14.081667] page:00000000e0a1c7c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e1
[   14.083038] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.083824] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   14.084967] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   14.086097] page dumped because: kasan: bad access detected
[   14.086916] 
[   14.087151] Memory state around the buggy address:
[   14.087859]  ffff8881044e1500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.088935]  ffff8881044e1580: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   14.089991] >ffff8881044e1600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   14.091048]                          ^
[   14.091607]  ffff8881044e1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.092675]  ffff8881044e1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.093731] ==================================================================
[   14.094831] ==================================================================
[   14.095900] BUG: KASAN: use-after-free in strnlen+0x31/0x50
[   14.096735] Read of size 1 at addr ffff8881044e1610 by task kunit_try_catch/331
[   14.097809] 
[   14.098044] CPU: 2 PID: 331 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.099443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.100827] Call Trace:
[   14.101361]  <TASK>
[   14.101831]  dump_stack_lvl+0x4d/0x66
[   14.102614]  print_report+0x17a/0x471
[   14.103280]  ? kasan_complete_mode_report_info+0x80/0x210
[   14.104141]  ? strnlen+0x31/0x50
[   14.104679]  kasan_report+0xb4/0x140
[   14.105258]  ? strnlen+0x31/0x50
[   14.105811]  __asan_load1+0x66/0x70
[   14.106389]  strnlen+0x31/0x50
[   14.106881]  kasan_strings+0x21e/0x500
[   14.107478]  ? __pfx_kasan_strings+0x10/0x10
[   14.108151]  ? __kasan_check_write+0x18/0x20
[   14.109014]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.110005]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.111036]  ? trace_preempt_on+0x2e/0xf0
[   14.111648]  ? __kthread_parkme+0x4f/0xd0
[   14.112246]  kunit_try_run_case+0x95/0xd0
[   14.112858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.113557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.114453]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.115300]  kthread+0x17d/0x1b0
[   14.115788]  ? __pfx_kthread+0x10/0x10
[   14.116360]  ret_from_fork+0x2c/0x50
[   14.116907]  </TASK>
[   14.117240] 
[   14.117474] Allocated by task 331:
[   14.117982]  kasan_save_stack+0x2a/0x60
[   14.118553]  kasan_set_track+0x29/0x40
[   14.119113]  kasan_save_alloc_info+0x22/0x30
[   14.119750]  __kasan_kmalloc+0xb8/0xc0
[   14.120307]  kmalloc_trace+0x4e/0xb0
[   14.120862]  kasan_strings+0x9d/0x500
[   14.121411]  kunit_try_run_case+0x95/0xd0
[   14.122011]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.122810]  kthread+0x17d/0x1b0
[   14.123297]  ret_from_fork+0x2c/0x50
[   14.123840] 
[   14.124074] Freed by task 331:
[   14.124544]  kasan_save_stack+0x2a/0x60
[   14.125118]  kasan_set_track+0x29/0x40
[   14.125682]  kasan_save_free_info+0x32/0x50
[   14.126309]  ____kasan_slab_free+0x174/0x1e0
[   14.126947]  __kasan_slab_free+0x16/0x20
[   14.127536]  __kmem_cache_free+0x18e/0x300
[   14.128149]  kfree+0x7d/0x120
[   14.128615]  kasan_strings+0xc1/0x500
[   14.129221]  kunit_try_run_case+0x95/0xd0
[   14.129882]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.130734]  kthread+0x17d/0x1b0
[   14.131252]  ret_from_fork+0x2c/0x50
[   14.131825] 
[   14.132075] The buggy address belongs to the object at ffff8881044e1600
[   14.132075]  which belongs to the cache kmalloc-32 of size 32
[   14.134011] The buggy address is located 16 bytes inside of
[   14.134011]  32-byte region [ffff8881044e1600, ffff8881044e1620)
[   14.135811] 
[   14.136062] The buggy address belongs to the physical page:
[   14.136958] page:00000000e0a1c7c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e1
[   14.138424] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.139282] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   14.140565] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   14.142170] page dumped because: kasan: bad access detected
[   14.143243] 
[   14.143496] Memory state around the buggy address:
[   14.144256]  ffff8881044e1500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   14.145417]  ffff8881044e1580: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   14.146561] >ffff8881044e1600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   14.147692]                          ^
[   14.148289]  ffff8881044e1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.149810]  ffff8881044e1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.151196] ==================================================================
[   14.152339]     ok 45 - kasan_strings
[   14.152761] ==================================================================
[   14.156653] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   14.159431] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.161924] 
[   14.162370] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.165002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.167293] Call Trace:
[   14.167996]  <TASK>
[   14.168618]  dump_stack_lvl+0x4d/0x66
[   14.169657]  print_report+0x17a/0x471
[   14.170698]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.172363]  ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   14.173680]  kasan_report+0xb4/0x140
[   14.174259]  ? kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   14.175107]  kasan_check_range+0x3e/0x1d0
[   14.175744]  __kasan_check_write+0x18/0x20
[   14.178215]  kasan_bitops_modify.constprop.0+0x9c/0x5e0
[   14.180117]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.182449]  ? kasan_set_track+0x29/0x40
[   14.183821]  ? kasan_save_alloc_info+0x22/0x30
[   14.185514]  ? __kasan_kmalloc+0xb8/0xc0
[   14.186479]  kasan_bitops_generic+0xa5/0x120
[   14.187491]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.188679]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.189864]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.191061]  ? trace_preempt_on+0x2e/0xf0
[   14.192012]  ? __kthread_parkme+0x4f/0xd0
[   14.193021]  kunit_try_run_case+0x95/0xd0
[   14.194016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.195120]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.196577]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.197826]  kthread+0x17d/0x1b0
[   14.198328]  ? __pfx_kthread+0x10/0x10
[   14.198906]  ret_from_fork+0x2c/0x50
[   14.199490]  </TASK>
[   14.199839] 
[   14.200081] Allocated by task 332:
[   14.200630]  kasan_save_stack+0x2a/0x60
[   14.201226]  kasan_set_track+0x29/0x40
[   14.201820]  kasan_save_alloc_info+0x22/0x30
[   14.202474]  __kasan_kmalloc+0xb8/0xc0
[   14.203046]  kmalloc_trace+0x4e/0xb0
[   14.203595]  kasan_bitops_generic+0x8a/0x120
[   14.204245]  kunit_try_run_case+0x95/0xd0
[   14.204921]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.205785]  kthread+0x17d/0x1b0
[   14.206283]  ret_from_fork+0x2c/0x50
[   14.206831] 
[   14.207071] The buggy address belongs to the object at ffff8881015fe900
[   14.207071]  which belongs to the cache kmalloc-16 of size 16
[   14.208998] The buggy address is located 8 bytes inside of
[   14.208998]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.210836] 
[   14.211075] The buggy address belongs to the physical page:
[   14.211995] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.213581] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.214409] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.215553] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.216734] page dumped because: kasan: bad access detected
[   14.217657] 
[   14.217889] Memory state around the buggy address:
[   14.218588]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.219631]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.220722] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.221881]                       ^
[   14.222445]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.223584]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.224769] ==================================================================
[   14.226051] ==================================================================
[   14.227216] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xda/0x5e0
[   14.228463] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.229657] 
[   14.229916] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.231477] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.232860] Call Trace:
[   14.233284]  <TASK>
[   14.233652]  dump_stack_lvl+0x4d/0x66
[   14.234254]  print_report+0x17a/0x471
[   14.234877]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.235782]  ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[   14.236679]  kasan_report+0xb4/0x140
[   14.237274]  ? kasan_bitops_modify.constprop.0+0xda/0x5e0
[   14.238156]  kasan_check_range+0x3e/0x1d0
[   14.238837]  __kasan_check_write+0x18/0x20
[   14.239513]  kasan_bitops_modify.constprop.0+0xda/0x5e0
[   14.240396]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.241362]  ? kasan_set_track+0x29/0x40
[   14.242005]  ? kasan_save_alloc_info+0x22/0x30
[   14.242743]  ? __kasan_kmalloc+0xb8/0xc0
[   14.243417]  kasan_bitops_generic+0xa5/0x120
[   14.244133]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.244967]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.245740]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.246573]  ? trace_preempt_on+0x2e/0xf0
[   14.247247]  ? __kthread_parkme+0x4f/0xd0
[   14.247872]  kunit_try_run_case+0x95/0xd0
[   14.248528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.249294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.250276]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.251158]  kthread+0x17d/0x1b0
[   14.251696]  ? __pfx_kthread+0x10/0x10
[   14.252338]  ret_from_fork+0x2c/0x50
[   14.252936]  </TASK>
[   14.253307] 
[   14.253564] Allocated by task 332:
[   14.254128]  kasan_save_stack+0x2a/0x60
[   14.254768]  kasan_set_track+0x29/0x40
[   14.255387]  kasan_save_alloc_info+0x22/0x30
[   14.256043]  __kasan_kmalloc+0xb8/0xc0
[   14.256674]  kmalloc_trace+0x4e/0xb0
[   14.257314]  kasan_bitops_generic+0x8a/0x120
[   14.258042]  kunit_try_run_case+0x95/0xd0
[   14.258722]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.259618]  kthread+0x17d/0x1b0
[   14.260158]  ret_from_fork+0x2c/0x50
[   14.260777] 
[   14.261037] The buggy address belongs to the object at ffff8881015fe900
[   14.261037]  which belongs to the cache kmalloc-16 of size 16
[   14.263062] The buggy address is located 8 bytes inside of
[   14.263062]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.264932] 
[   14.265189] The buggy address belongs to the physical page:
[   14.266088] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.267607] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.268533] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.269795] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.271075] page dumped because: kasan: bad access detected
[   14.271993] 
[   14.272254] Memory state around the buggy address:
[   14.273064]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.274237]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.275444] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.276638]                       ^
[   14.277217]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.278393]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.279563] ==================================================================
[   14.280764] ==================================================================
[   14.281971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   14.283327] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.284556] 
[   14.284818] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.286390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.287752] Call Trace:
[   14.288167]  <TASK>
[   14.288542]  dump_stack_lvl+0x4d/0x66
[   14.289148]  print_report+0x17a/0x471
[   14.289774]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.290740]  ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   14.291784]  kasan_report+0xb4/0x140
[   14.292465]  ? kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   14.293359]  kasan_check_range+0x3e/0x1d0
[   14.294034]  __kasan_check_write+0x18/0x20
[   14.294763]  kasan_bitops_modify.constprop.0+0x11c/0x5e0
[   14.295640]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.296607]  ? kasan_set_track+0x29/0x40
[   14.297275]  ? kasan_save_alloc_info+0x22/0x30
[   14.298040]  ? __kasan_kmalloc+0xb8/0xc0
[   14.298753]  kasan_bitops_generic+0xa5/0x120
[   14.299506]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.300324]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.301099]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.301988]  ? trace_preempt_on+0x2e/0xf0
[   14.302670]  ? __kthread_parkme+0x4f/0xd0
[   14.303350]  kunit_try_run_case+0x95/0xd0
[   14.304022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.304826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.305848]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.306732]  kthread+0x17d/0x1b0
[   14.307247]  ? __pfx_kthread+0x10/0x10
[   14.307869]  ret_from_fork+0x2c/0x50
[   14.308490]  </TASK>
[   14.308842] 
[   14.309108] Allocated by task 332:
[   14.309676]  kasan_save_stack+0x2a/0x60
[   14.310312]  kasan_set_track+0x29/0x40
[   14.310942]  kasan_save_alloc_info+0x22/0x30
[   14.311658]  __kasan_kmalloc+0xb8/0xc0
[   14.312284]  kmalloc_trace+0x4e/0xb0
[   14.312897]  kasan_bitops_generic+0x8a/0x120
[   14.313616]  kunit_try_run_case+0x95/0xd0
[   14.314299]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.315190]  kthread+0x17d/0x1b0
[   14.315741]  ret_from_fork+0x2c/0x50
[   14.316369] 
[   14.316635] The buggy address belongs to the object at ffff8881015fe900
[   14.316635]  which belongs to the cache kmalloc-16 of size 16
[   14.318665] The buggy address is located 8 bytes inside of
[   14.318665]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.320553] 
[   14.320819] The buggy address belongs to the physical page:
[   14.321786] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.323299] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.324170] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.325456] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.326691] page dumped because: kasan: bad access detected
[   14.327538] 
[   14.327779] Memory state around the buggy address:
[   14.328592]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.330120]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.331484] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.332692]                       ^
[   14.333268]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.334874]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.336384] ==================================================================
[   14.338128] ==================================================================
[   14.339581] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   14.341255] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.342746] 
[   14.343070] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.345131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.346731] Call Trace:
[   14.347236]  <TASK>
[   14.347590]  dump_stack_lvl+0x4d/0x66
[   14.348172]  print_report+0x17a/0x471
[   14.348773]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.349930]  ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   14.351229]  kasan_report+0xb4/0x140
[   14.351919]  ? kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   14.352830]  kasan_check_range+0x3e/0x1d0
[   14.353463]  __kasan_check_write+0x18/0x20
[   14.354158]  kasan_bitops_modify.constprop.0+0x15a/0x5e0
[   14.355008]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.355940]  ? kasan_set_track+0x29/0x40
[   14.356584]  ? kasan_save_alloc_info+0x22/0x30
[   14.357302]  ? __kasan_kmalloc+0xb8/0xc0
[   14.357938]  kasan_bitops_generic+0xa5/0x120
[   14.358631]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.359411]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.360155]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.361051]  ? trace_preempt_on+0x2e/0xf0
[   14.361743]  ? __kthread_parkme+0x4f/0xd0
[   14.362384]  kunit_try_run_case+0x95/0xd0
[   14.363033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.363794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.364786]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.365649]  kthread+0x17d/0x1b0
[   14.366181]  ? __pfx_kthread+0x10/0x10
[   14.366809]  ret_from_fork+0x2c/0x50
[   14.367391]  </TASK>
[   14.367755] 
[   14.368009] Allocated by task 332:
[   14.368621]  kasan_save_stack+0x2a/0x60
[   14.369371]  kasan_set_track+0x29/0x40
[   14.370110]  kasan_save_alloc_info+0x22/0x30
[   14.371009]  __kasan_kmalloc+0xb8/0xc0
[   14.371766]  kmalloc_trace+0x4e/0xb0
[   14.372530]  kasan_bitops_generic+0x8a/0x120
[   14.373402]  kunit_try_run_case+0x95/0xd0
[   14.374211]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.375286]  kthread+0x17d/0x1b0
[   14.375880]  ret_from_fork+0x2c/0x50
[   14.376508] 
[   14.376771] The buggy address belongs to the object at ffff8881015fe900
[   14.376771]  which belongs to the cache kmalloc-16 of size 16
[   14.379120] The buggy address is located 8 bytes inside of
[   14.379120]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.381642] 
[   14.381953] The buggy address belongs to the physical page:
[   14.383064] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.384946] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.386005] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.387650] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.389231] page dumped because: kasan: bad access detected
[   14.390394] 
[   14.390727] Memory state around the buggy address:
[   14.391639]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.393140]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.394630] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.396128]                       ^
[   14.396867]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.398347]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.399769] ==================================================================
[   14.401280] ==================================================================
[   14.402517] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   14.403965] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.405224] 
[   14.405494] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.407075] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.408506] Call Trace:
[   14.408932]  <TASK>
[   14.409299]  dump_stack_lvl+0x4d/0x66
[   14.409921]  print_report+0x17a/0x471
[   14.410602]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.411526]  ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   14.412496]  kasan_report+0xb4/0x140
[   14.413117]  ? kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   14.414065]  kasan_check_range+0x3e/0x1d0
[   14.414789]  __kasan_check_write+0x18/0x20
[   14.415523]  kasan_bitops_modify.constprop.0+0x19c/0x5e0
[   14.416411]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.417351]  ? kasan_set_track+0x29/0x40
[   14.418009]  ? kasan_save_alloc_info+0x22/0x30
[   14.418780]  ? __kasan_kmalloc+0xb8/0xc0
[   14.419449]  kasan_bitops_generic+0xa5/0x120
[   14.420147]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.421063]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.421832]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.422695]  ? trace_preempt_on+0x2e/0xf0
[   14.423342]  ? __kthread_parkme+0x4f/0xd0
[   14.423990]  kunit_try_run_case+0x95/0xd0
[   14.424662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.425424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.426397]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.427296]  kthread+0x17d/0x1b0
[   14.427828]  ? __pfx_kthread+0x10/0x10
[   14.428445]  ret_from_fork+0x2c/0x50
[   14.428990]  </TASK>
[   14.429324] 
[   14.429557] Allocated by task 332:
[   14.430064]  kasan_save_stack+0x2a/0x60
[   14.430708]  kasan_set_track+0x29/0x40
[   14.431341]  kasan_save_alloc_info+0x22/0x30
[   14.432046]  __kasan_kmalloc+0xb8/0xc0
[   14.432712]  kmalloc_trace+0x4e/0xb0
[   14.433299]  kasan_bitops_generic+0x8a/0x120
[   14.434000]  kunit_try_run_case+0x95/0xd0
[   14.434658]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.435526]  kthread+0x17d/0x1b0
[   14.436075]  ret_from_fork+0x2c/0x50
[   14.436663] 
[   14.436909] The buggy address belongs to the object at ffff8881015fe900
[   14.436909]  which belongs to the cache kmalloc-16 of size 16
[   14.438832] The buggy address is located 8 bytes inside of
[   14.438832]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.440675] 
[   14.440934] The buggy address belongs to the physical page:
[   14.441830] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.443325] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.444185] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.445473] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.446689] page dumped because: kasan: bad access detected
[   14.447587] 
[   14.447847] Memory state around the buggy address:
[   14.448639]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.449797]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.450952] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.452112]                       ^
[   14.452704]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.453888]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.455156] ==================================================================
[   14.456453] ==================================================================
[   14.457750] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   14.459137] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.460298] 
[   14.460574] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.462060] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.463424] Call Trace:
[   14.463836]  <TASK>
[   14.464200]  dump_stack_lvl+0x4d/0x66
[   14.464842]  print_report+0x17a/0x471
[   14.465454]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.466330]  ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   14.467251]  kasan_report+0xb4/0x140
[   14.467860]  ? kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   14.468827]  kasan_check_range+0x3e/0x1d0
[   14.469526]  __kasan_check_write+0x18/0x20
[   14.470240]  kasan_bitops_modify.constprop.0+0x1da/0x5e0
[   14.471161]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.472131]  ? kasan_set_track+0x29/0x40
[   14.472813]  ? kasan_save_alloc_info+0x22/0x30
[   14.473548]  ? __kasan_kmalloc+0xb8/0xc0
[   14.474196]  kasan_bitops_generic+0xa5/0x120
[   14.474928]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.475719]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.476484]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.477273]  ? trace_preempt_on+0x2e/0xf0
[   14.477910]  ? __kthread_parkme+0x4f/0xd0
[   14.478567]  kunit_try_run_case+0x95/0xd0
[   14.479204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.479938]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.480894]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.481777]  kthread+0x17d/0x1b0
[   14.482383]  ? __pfx_kthread+0x10/0x10
[   14.482978]  ret_from_fork+0x2c/0x50
[   14.483547]  </TASK>
[   14.483897] 
[   14.484143] Allocated by task 332:
[   14.484691]  kasan_save_stack+0x2a/0x60
[   14.485298]  kasan_set_track+0x29/0x40
[   14.485914]  kasan_save_alloc_info+0x22/0x30
[   14.486638]  __kasan_kmalloc+0xb8/0xc0
[   14.487241]  kmalloc_trace+0x4e/0xb0
[   14.487815]  kasan_bitops_generic+0x8a/0x120
[   14.488516]  kunit_try_run_case+0x95/0xd0
[   14.489196]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.490113]  kthread+0x17d/0x1b0
[   14.490690]  ret_from_fork+0x2c/0x50
[   14.491285] 
[   14.491546] The buggy address belongs to the object at ffff8881015fe900
[   14.491546]  which belongs to the cache kmalloc-16 of size 16
[   14.493431] The buggy address is located 8 bytes inside of
[   14.493431]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.495476] 
[   14.495759] The buggy address belongs to the physical page:
[   14.496753] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.498365] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.499319] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.500757] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.502089] page dumped because: kasan: bad access detected
[   14.503051] 
[   14.503316] Memory state around the buggy address:
[   14.504116]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.505380]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.506615] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.507791]                       ^
[   14.508395]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.509572]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.510744] ==================================================================
[   14.511979] ==================================================================
[   14.513201] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   14.514575] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.515787] 
[   14.516050] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.517658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.519060] Call Trace:
[   14.519500]  <TASK>
[   14.519866]  dump_stack_lvl+0x4d/0x66
[   14.520526]  print_report+0x17a/0x471
[   14.521157]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.522066]  ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   14.522983]  kasan_report+0xb4/0x140
[   14.523611]  ? kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   14.524542]  kasan_check_range+0x3e/0x1d0
[   14.525222]  __kasan_check_write+0x18/0x20
[   14.525949]  kasan_bitops_modify.constprop.0+0x21c/0x5e0
[   14.526882]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.527855]  ? kasan_set_track+0x29/0x40
[   14.528766]  ? kasan_save_alloc_info+0x22/0x30
[   14.529911]  ? __kasan_kmalloc+0xb8/0xc0
[   14.530921]  kasan_bitops_generic+0xa5/0x120
[   14.532017]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.533276]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.534465]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.535715]  ? trace_preempt_on+0x2e/0xf0
[   14.536777]  ? __kthread_parkme+0x4f/0xd0
[   14.537744]  kunit_try_run_case+0x95/0xd0
[   14.538401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.539172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.540151]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.541030]  kthread+0x17d/0x1b0
[   14.541563]  ? __pfx_kthread+0x10/0x10
[   14.542173]  ret_from_fork+0x2c/0x50
[   14.542767]  </TASK>
[   14.543131] 
[   14.543389] Allocated by task 332:
[   14.543943]  kasan_save_stack+0x2a/0x60
[   14.544698]  kasan_set_track+0x29/0x40
[   14.545485]  kasan_save_alloc_info+0x22/0x30
[   14.546387]  __kasan_kmalloc+0xb8/0xc0
[   14.547079]  kmalloc_trace+0x4e/0xb0
[   14.547650]  kasan_bitops_generic+0x8a/0x120
[   14.548331]  kunit_try_run_case+0x95/0xd0
[   14.549007]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.549861]  kthread+0x17d/0x1b0
[   14.550384]  ret_from_fork+0x2c/0x50
[   14.550960] 
[   14.551213] The buggy address belongs to the object at ffff8881015fe900
[   14.551213]  which belongs to the cache kmalloc-16 of size 16
[   14.553088] The buggy address is located 8 bytes inside of
[   14.553088]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.554741] 
[   14.554976] The buggy address belongs to the physical page:
[   14.555789] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.557158] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.557942] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.559064] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.560183] page dumped because: kasan: bad access detected
[   14.561015] 
[   14.561247] Memory state around the buggy address:
[   14.561953]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.563002]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.564051] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.565111]                       ^
[   14.565629]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.566676]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.567722] ==================================================================
[   14.568848] ==================================================================
[   14.569904] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   14.571094] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.572166] 
[   14.572420] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.573804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.575012] Call Trace:
[   14.575381]  <TASK>
[   14.575703]  dump_stack_lvl+0x4d/0x66
[   14.576250]  print_report+0x17a/0x471
[   14.576818]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.577612]  ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   14.578417]  kasan_report+0xb4/0x140
[   14.578951]  ? kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   14.579757]  kasan_check_range+0x3e/0x1d0
[   14.580368]  __kasan_check_write+0x18/0x20
[   14.581245]  kasan_bitops_modify.constprop.0+0x25a/0x5e0
[   14.582364]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   14.583398]  ? kasan_set_track+0x29/0x40
[   14.583980]  ? kasan_save_alloc_info+0x22/0x30
[   14.584652]  ? __kasan_kmalloc+0xb8/0xc0
[   14.585236]  kasan_bitops_generic+0xa5/0x120
[   14.585880]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.586595]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.587275]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.588002]  ? trace_preempt_on+0x2e/0xf0
[   14.588612]  ? __kthread_parkme+0x4f/0xd0
[   14.589208]  kunit_try_run_case+0x95/0xd0
[   14.589804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.590497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.591388]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.592177]  kthread+0x17d/0x1b0
[   14.592668]  ? __pfx_kthread+0x10/0x10
[   14.593223]  ret_from_fork+0x2c/0x50
[   14.593759]  </TASK>
[   14.594090] 
[   14.594322] Allocated by task 332:
[   14.594824]  kasan_save_stack+0x2a/0x60
[   14.595422]  kasan_set_track+0x29/0x40
[   14.595978]  kasan_save_alloc_info+0x22/0x30
[   14.596631]  __kasan_kmalloc+0xb8/0xc0
[   14.597187]  kmalloc_trace+0x4e/0xb0
[   14.597719]  kasan_bitops_generic+0x8a/0x120
[   14.598352]  kunit_try_run_case+0x95/0xd0
[   14.598946]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.599735]  kthread+0x17d/0x1b0
[   14.600218]  ret_from_fork+0x2c/0x50
[   14.600759] 
[   14.600992] The buggy address belongs to the object at ffff8881015fe900
[   14.600992]  which belongs to the cache kmalloc-16 of size 16
[   14.602766] The buggy address is located 8 bytes inside of
[   14.602766]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.604428] 
[   14.604663] The buggy address belongs to the physical page:
[   14.605474] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.606830] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.607611] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.608747] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.609867] page dumped because: kasan: bad access detected
[   14.610676] 
[   14.610907] Memory state around the buggy address:
[   14.611611]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.612743]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.613907] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.615062]                       ^
[   14.615634]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.617052]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.618551] ==================================================================
[   14.619834] ==================================================================
[   14.620985] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   14.622374] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.623530] 
[   14.623785] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.625234] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.626443] Call Trace:
[   14.626812]  <TASK>
[   14.627133]  dump_stack_lvl+0x4d/0x66
[   14.627679]  print_report+0x17a/0x471
[   14.628227]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.629027]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   14.629930]  kasan_report+0xb4/0x140
[   14.630462]  ? kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   14.631362]  kasan_check_range+0x3e/0x1d0
[   14.631955]  __kasan_check_write+0x18/0x20
[   14.632567]  kasan_bitops_test_and_modify.constprop.0+0x9c/0x6a0
[   14.633442]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.634405]  ? kasan_set_track+0x29/0x40
[   14.634983]  ? kasan_save_alloc_info+0x22/0x30
[   14.635639]  ? __kasan_kmalloc+0xb8/0xc0
[   14.636219]  kasan_bitops_generic+0xb0/0x120
[   14.636868]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.637583]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.638259]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.638985]  ? trace_preempt_on+0x2e/0xf0
[   14.639582]  ? __kthread_parkme+0x4f/0xd0
[   14.640173]  kunit_try_run_case+0x95/0xd0
[   14.640872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.641641]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.642626]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.643499]  kthread+0x17d/0x1b0
[   14.644028]  ? __pfx_kthread+0x10/0x10
[   14.644663]  ret_from_fork+0x2c/0x50
[   14.645253]  </TASK>
[   14.645623] 
[   14.645881] Allocated by task 332:
[   14.646441]  kasan_save_stack+0x2a/0x60
[   14.647071]  kasan_set_track+0x29/0x40
[   14.647686]  kasan_save_alloc_info+0x22/0x30
[   14.648395]  __kasan_kmalloc+0xb8/0xc0
[   14.649009]  kmalloc_trace+0x4e/0xb0
[   14.649599]  kasan_bitops_generic+0x8a/0x120
[   14.650294]  kunit_try_run_case+0x95/0xd0
[   14.650952]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.651821]  kthread+0x17d/0x1b0
[   14.652378]  ret_from_fork+0x2c/0x50
[   14.653162] 
[   14.653489] The buggy address belongs to the object at ffff8881015fe900
[   14.653489]  which belongs to the cache kmalloc-16 of size 16
[   14.655759] The buggy address is located 8 bytes inside of
[   14.655759]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.657568] 
[   14.657819] The buggy address belongs to the physical page:
[   14.658693] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.660159] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.661016] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.662139] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.663261] page dumped because: kasan: bad access detected
[   14.664107] 
[   14.664360] Memory state around the buggy address:
[   14.665064]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.666111]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.667159] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.668208]                       ^
[   14.668736]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.669787]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.670835] ==================================================================
[   14.671917] ==================================================================
[   14.672978] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   14.674265] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.675338] 
[   14.675573] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.676972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.678176] Call Trace:
[   14.678631]  <TASK>
[   14.678937]  dump_stack_lvl+0x4d/0x66
[   14.679516]  print_report+0x17a/0x471
[   14.680080]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.680906]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   14.681850]  kasan_report+0xb4/0x140
[   14.682409]  ? kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   14.683357]  kasan_check_range+0x3e/0x1d0
[   14.683976]  __kasan_check_write+0x18/0x20
[   14.684623]  kasan_bitops_test_and_modify.constprop.0+0xdf/0x6a0
[   14.685540]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.686529]  ? kasan_set_track+0x29/0x40
[   14.687109]  ? kasan_save_alloc_info+0x22/0x30
[   14.687769]  ? __kasan_kmalloc+0xb8/0xc0
[   14.688361]  kasan_bitops_generic+0xb0/0x120
[   14.688994]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.689712]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.690396]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.691125]  ? trace_preempt_on+0x2e/0xf0
[   14.691722]  ? __kthread_parkme+0x4f/0xd0
[   14.692320]  kunit_try_run_case+0x95/0xd0
[   14.693186]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.694178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.695309]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.696100]  kthread+0x17d/0x1b0
[   14.696596]  ? __pfx_kthread+0x10/0x10
[   14.697154]  ret_from_fork+0x2c/0x50
[   14.697690]  </TASK>
[   14.698022] 
[   14.698254] Allocated by task 332:
[   14.698759]  kasan_save_stack+0x2a/0x60
[   14.699332]  kasan_set_track+0x29/0x40
[   14.699889]  kasan_save_alloc_info+0x22/0x30
[   14.700531]  __kasan_kmalloc+0xb8/0xc0
[   14.701089]  kmalloc_trace+0x4e/0xb0
[   14.701621]  kasan_bitops_generic+0x8a/0x120
[   14.702253]  kunit_try_run_case+0x95/0xd0
[   14.702848]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.703638]  kthread+0x17d/0x1b0
[   14.704124]  ret_from_fork+0x2c/0x50
[   14.704674] 
[   14.704908] The buggy address belongs to the object at ffff8881015fe900
[   14.704908]  which belongs to the cache kmalloc-16 of size 16
[   14.706681] The buggy address is located 8 bytes inside of
[   14.706681]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.708332] 
[   14.708576] The buggy address belongs to the physical page:
[   14.709387] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.710747] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.711529] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.712669] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.713792] page dumped because: kasan: bad access detected
[   14.714604] 
[   14.714837] Memory state around the buggy address:
[   14.715542]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.716605]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.717654] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.718701]                       ^
[   14.719217]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.720260]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.721316] ==================================================================
[   14.722393] ==================================================================
[   14.723518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   14.724935] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.726097] 
[   14.726350] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.727839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.729155] Call Trace:
[   14.729552]  <TASK>
[   14.729900]  dump_stack_lvl+0x4d/0x66
[   14.730488]  print_report+0x17a/0x471
[   14.731077]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.731926]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   14.733108]  kasan_report+0xb4/0x140
[   14.733889]  ? kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   14.735125]  kasan_check_range+0x3e/0x1d0
[   14.735723]  __kasan_check_write+0x18/0x20
[   14.736329]  kasan_bitops_test_and_modify.constprop.0+0x121/0x6a0
[   14.737262]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.738235]  ? kasan_set_track+0x29/0x40
[   14.738825]  ? kasan_save_alloc_info+0x22/0x30
[   14.739484]  ? __kasan_kmalloc+0xb8/0xc0
[   14.740068]  kasan_bitops_generic+0xb0/0x120
[   14.740717]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.741440]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.742121]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.742855]  ? trace_preempt_on+0x2e/0xf0
[   14.743458]  ? __kthread_parkme+0x4f/0xd0
[   14.744051]  kunit_try_run_case+0x95/0xd0
[   14.744662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.745356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.746248]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.747039]  kthread+0x17d/0x1b0
[   14.747522]  ? __pfx_kthread+0x10/0x10
[   14.748079]  ret_from_fork+0x2c/0x50
[   14.748623]  </TASK>
[   14.748959] 
[   14.749191] Allocated by task 332:
[   14.749695]  kasan_save_stack+0x2a/0x60
[   14.750264]  kasan_set_track+0x29/0x40
[   14.750821]  kasan_save_alloc_info+0x22/0x30
[   14.751453]  __kasan_kmalloc+0xb8/0xc0
[   14.752011]  kmalloc_trace+0x4e/0xb0
[   14.752553]  kasan_bitops_generic+0x8a/0x120
[   14.753183]  kunit_try_run_case+0x95/0xd0
[   14.753778]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.754567]  kthread+0x17d/0x1b0
[   14.755048]  ret_from_fork+0x2c/0x50
[   14.755581] 
[   14.755814] The buggy address belongs to the object at ffff8881015fe900
[   14.755814]  which belongs to the cache kmalloc-16 of size 16
[   14.757596] The buggy address is located 8 bytes inside of
[   14.757596]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.759239] 
[   14.759471] The buggy address belongs to the physical page:
[   14.760279] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.761642] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.762425] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.763542] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.764674] page dumped because: kasan: bad access detected
[   14.765483] 
[   14.765717] Memory state around the buggy address:
[   14.766420]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.767459]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.768510] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.769552]                       ^
[   14.770065]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.771105]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.772143] ==================================================================
[   14.773633] ==================================================================
[   14.775080] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   14.776407] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.777486] 
[   14.777721] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.779110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.780316] Call Trace:
[   14.780695]  <TASK>
[   14.781016]  dump_stack_lvl+0x4d/0x66
[   14.781562]  print_report+0x17a/0x471
[   14.782109]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.782901]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   14.783820]  kasan_report+0xb4/0x140
[   14.784371]  ? kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   14.785293]  kasan_check_range+0x3e/0x1d0
[   14.785891]  __kasan_check_write+0x18/0x20
[   14.786500]  kasan_bitops_test_and_modify.constprop.0+0x164/0x6a0
[   14.787393]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.788371]  ? kasan_set_track+0x29/0x40
[   14.788955]  ? kasan_save_alloc_info+0x22/0x30
[   14.789613]  ? __kasan_kmalloc+0xb8/0xc0
[   14.790200]  kasan_bitops_generic+0xb0/0x120
[   14.790836]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.791556]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.792239]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.792986]  ? trace_preempt_on+0x2e/0xf0
[   14.793584]  ? __kthread_parkme+0x4f/0xd0
[   14.794182]  kunit_try_run_case+0x95/0xd0
[   14.794781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.795477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.796384]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.797174]  kthread+0x17d/0x1b0
[   14.797656]  ? __pfx_kthread+0x10/0x10
[   14.798212]  ret_from_fork+0x2c/0x50
[   14.798745]  </TASK>
[   14.799080] 
[   14.799312] Allocated by task 332:
[   14.799817]  kasan_save_stack+0x2a/0x60
[   14.800403]  kasan_set_track+0x29/0x40
[   14.800962]  kasan_save_alloc_info+0x22/0x30
[   14.801599]  __kasan_kmalloc+0xb8/0xc0
[   14.802157]  kmalloc_trace+0x4e/0xb0
[   14.802689]  kasan_bitops_generic+0x8a/0x120
[   14.803320]  kunit_try_run_case+0x95/0xd0
[   14.803916]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.804718]  kthread+0x17d/0x1b0
[   14.805200]  ret_from_fork+0x2c/0x50
[   14.805782] 
[   14.806044] The buggy address belongs to the object at ffff8881015fe900
[   14.806044]  which belongs to the cache kmalloc-16 of size 16
[   14.808012] The buggy address is located 8 bytes inside of
[   14.808012]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.809853] 
[   14.810112] The buggy address belongs to the physical page:
[   14.811010] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.812520] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.813390] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.814621] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.815845] page dumped because: kasan: bad access detected
[   14.816899] 
[   14.817222] Memory state around the buggy address:
[   14.818065]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.819151]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.820204] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.821290]                       ^
[   14.821814]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.822864]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.823914] ==================================================================
[   14.825012] ==================================================================
[   14.826069] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   14.827409] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.828493] 
[   14.828728] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.830111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.831322] Call Trace:
[   14.831692]  <TASK>
[   14.832013]  dump_stack_lvl+0x4d/0x66
[   14.832577]  print_report+0x17a/0x471
[   14.833126]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.833917]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   14.834836]  kasan_report+0xb4/0x140
[   14.835372]  ? kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   14.836293]  kasan_check_range+0x3e/0x1d0
[   14.837091]  __kasan_check_write+0x18/0x20
[   14.837942]  kasan_bitops_test_and_modify.constprop.0+0x1a7/0x6a0
[   14.839148]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.840485]  ? kasan_set_track+0x29/0x40
[   14.841164]  ? kasan_save_alloc_info+0x22/0x30
[   14.841859]  ? __kasan_kmalloc+0xb8/0xc0
[   14.842476]  kasan_bitops_generic+0xb0/0x120
[   14.843139]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.843861]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.844557]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.845288]  ? trace_preempt_on+0x2e/0xf0
[   14.845885]  ? __kthread_parkme+0x4f/0xd0
[   14.846484]  kunit_try_run_case+0x95/0xd0
[   14.847083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.847780]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.848685]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.849480]  kthread+0x17d/0x1b0
[   14.849965]  ? __pfx_kthread+0x10/0x10
[   14.850527]  ret_from_fork+0x2c/0x50
[   14.851063]  </TASK>
[   14.851396] 
[   14.851630] Allocated by task 332:
[   14.852137]  kasan_save_stack+0x2a/0x60
[   14.852857]  kasan_set_track+0x29/0x40
[   14.853480]  kasan_save_alloc_info+0x22/0x30
[   14.854186]  __kasan_kmalloc+0xb8/0xc0
[   14.854806]  kmalloc_trace+0x4e/0xb0
[   14.855392]  kasan_bitops_generic+0x8a/0x120
[   14.856091]  kunit_try_run_case+0x95/0xd0
[   14.856766]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.857646]  kthread+0x17d/0x1b0
[   14.858177]  ret_from_fork+0x2c/0x50
[   14.858764] 
[   14.859021] The buggy address belongs to the object at ffff8881015fe900
[   14.859021]  which belongs to the cache kmalloc-16 of size 16
[   14.860994] The buggy address is located 8 bytes inside of
[   14.860994]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.862812] 
[   14.863069] The buggy address belongs to the physical page:
[   14.863965] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.865501] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.866341] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.867541] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.868756] page dumped because: kasan: bad access detected
[   14.869625] 
[   14.869875] Memory state around the buggy address:
[   14.870625]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.871745]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.872878] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.873995]                       ^
[   14.874547]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.875663]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.876789] ==================================================================
[   14.877941] ==================================================================
[   14.879074] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   14.880511] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.881940] 
[   14.882264] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.884119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.885617] Call Trace:
[   14.885990]  <TASK>
[   14.886313]  dump_stack_lvl+0x4d/0x66
[   14.886862]  print_report+0x17a/0x471
[   14.887411]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.888203]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   14.889130]  kasan_report+0xb4/0x140
[   14.889666]  ? kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   14.890586]  kasan_check_range+0x3e/0x1d0
[   14.891233]  __kasan_check_write+0x18/0x20
[   14.891890]  kasan_bitops_test_and_modify.constprop.0+0x1e9/0x6a0
[   14.892837]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.893807]  ? kasan_set_track+0x29/0x40
[   14.894392]  ? kasan_save_alloc_info+0x22/0x30
[   14.895050]  ? __kasan_kmalloc+0xb8/0xc0
[   14.895635]  kasan_bitops_generic+0xb0/0x120
[   14.896270]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.896997]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.897684]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.898412]  ? trace_preempt_on+0x2e/0xf0
[   14.899007]  ? __kthread_parkme+0x4f/0xd0
[   14.899602]  kunit_try_run_case+0x95/0xd0
[   14.900197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.900907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.901796]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.902587]  kthread+0x17d/0x1b0
[   14.903070]  ? __pfx_kthread+0x10/0x10
[   14.903628]  ret_from_fork+0x2c/0x50
[   14.904166]  </TASK>
[   14.904514] 
[   14.904748] Allocated by task 332:
[   14.905255]  kasan_save_stack+0x2a/0x60
[   14.905825]  kasan_set_track+0x29/0x40
[   14.906382]  kasan_save_alloc_info+0x22/0x30
[   14.907012]  __kasan_kmalloc+0xb8/0xc0
[   14.907570]  kmalloc_trace+0x4e/0xb0
[   14.908100]  kasan_bitops_generic+0x8a/0x120
[   14.908742]  kunit_try_run_case+0x95/0xd0
[   14.909335]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.910124]  kthread+0x17d/0x1b0
[   14.910604]  ret_from_fork+0x2c/0x50
[   14.911135] 
[   14.911372] The buggy address belongs to the object at ffff8881015fe900
[   14.911372]  which belongs to the cache kmalloc-16 of size 16
[   14.913154] The buggy address is located 8 bytes inside of
[   14.913154]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.914805] 
[   14.915038] The buggy address belongs to the physical page:
[   14.915849] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.917528] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.918593] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.920165] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.921303] page dumped because: kasan: bad access detected
[   14.922123] 
[   14.922357] Memory state around the buggy address:
[   14.923062]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.924109]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.925165] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.926238]                       ^
[   14.926759]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.927811]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.928876] ==================================================================
[   14.929971] ==================================================================
[   14.931032] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   14.932326] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.933413] 
[   14.933647] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.935025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.936232] Call Trace:
[   14.936670]  <TASK>
[   14.937029]  dump_stack_lvl+0x4d/0x66
[   14.937642]  print_report+0x17a/0x471
[   14.938245]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.939125]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   14.940136]  kasan_report+0xb4/0x140
[   14.940745]  ? kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   14.941764]  kasan_check_range+0x3e/0x1d0
[   14.942437]  __kasan_check_write+0x18/0x20
[   14.943104]  kasan_bitops_test_and_modify.constprop.0+0x22c/0x6a0
[   14.944094]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   14.945186]  ? kasan_set_track+0x29/0x40
[   14.945834]  ? kasan_save_alloc_info+0x22/0x30
[   14.946564]  ? __kasan_kmalloc+0xb8/0xc0
[   14.947212]  kasan_bitops_generic+0xb0/0x120
[   14.947909]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   14.948729]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   14.949490]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   14.950298]  ? trace_preempt_on+0x2e/0xf0
[   14.950964]  ? __kthread_parkme+0x4f/0xd0
[   14.951625]  kunit_try_run_case+0x95/0xd0
[   14.952283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.953063]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.954051]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.954929]  kthread+0x17d/0x1b0
[   14.955464]  ? __pfx_kthread+0x10/0x10
[   14.956077]  ret_from_fork+0x2c/0x50
[   14.956780]  </TASK>
[   14.957192] 
[   14.957481] Allocated by task 332:
[   14.958109]  kasan_save_stack+0x2a/0x60
[   14.958855]  kasan_set_track+0x29/0x40
[   14.959548]  kasan_save_alloc_info+0x22/0x30
[   14.960365]  __kasan_kmalloc+0xb8/0xc0
[   14.961119]  kmalloc_trace+0x4e/0xb0
[   14.961807]  kasan_bitops_generic+0x8a/0x120
[   14.962654]  kunit_try_run_case+0x95/0xd0
[   14.963464]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   14.964550]  kthread+0x17d/0x1b0
[   14.965092]  ret_from_fork+0x2c/0x50
[   14.965722] 
[   14.966042] The buggy address belongs to the object at ffff8881015fe900
[   14.966042]  which belongs to the cache kmalloc-16 of size 16
[   14.968075] The buggy address is located 8 bytes inside of
[   14.968075]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   14.970453] 
[   14.970812] The buggy address belongs to the physical page:
[   14.971709] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   14.973205] flags: 0x200000000000200(slab|node=0|zone=2)
[   14.974052] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   14.975276] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   14.976517] page dumped because: kasan: bad access detected
[   14.977399] 
[   14.977653] Memory state around the buggy address:
[   14.978412]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   14.979551]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   14.980706] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.981842]                       ^
[   14.982402]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.983542]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.984710] ==================================================================
[   14.985889] ==================================================================
[   14.987032] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   14.988451] Read of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   14.989608] 
[   14.989861] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   14.991365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   14.992697] Call Trace:
[   14.993098]  <TASK>
[   14.993445]  dump_stack_lvl+0x4d/0x66
[   14.994033]  print_report+0x17a/0x471
[   14.994718]  ? kasan_complete_mode_report_info+0x40/0x210
[   14.995628]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   14.996733]  kasan_report+0xb4/0x140
[   14.997353]  ? kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   14.998358]  kasan_check_range+0x3e/0x1d0
[   14.999008]  __kasan_check_read+0x15/0x20
[   14.999698]  kasan_bitops_test_and_modify.constprop.0+0x26e/0x6a0
[   15.000683]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.001728]  ? kasan_set_track+0x29/0x40
[   15.002357]  ? kasan_save_alloc_info+0x22/0x30
[   15.003064]  ? __kasan_kmalloc+0xb8/0xc0
[   15.003695]  kasan_bitops_generic+0xb0/0x120
[   15.004412]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.005192]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.005932]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   15.006720]  ? trace_preempt_on+0x2e/0xf0
[   15.007363]  ? __kthread_parkme+0x4f/0xd0
[   15.008006]  kunit_try_run_case+0x95/0xd0
[   15.008848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.009627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.010634]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.011515]  kthread+0x17d/0x1b0
[   15.012052]  ? __pfx_kthread+0x10/0x10
[   15.012688]  ret_from_fork+0x2c/0x50
[   15.013291]  </TASK>
[   15.013661] 
[   15.013919] Allocated by task 332:
[   15.014492]  kasan_save_stack+0x2a/0x60
[   15.015127]  kasan_set_track+0x29/0x40
[   15.015755]  kasan_save_alloc_info+0x22/0x30
[   15.016480]  __kasan_kmalloc+0xb8/0xc0
[   15.017100]  kmalloc_trace+0x4e/0xb0
[   15.017691]  kasan_bitops_generic+0x8a/0x120
[   15.018393]  kunit_try_run_case+0x95/0xd0
[   15.019049]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.019929]  kthread+0x17d/0x1b0
[   15.020479]  ret_from_fork+0x2c/0x50
[   15.021067] 
[   15.021325] The buggy address belongs to the object at ffff8881015fe900
[   15.021325]  which belongs to the cache kmalloc-16 of size 16
[   15.023278] The buggy address is located 8 bytes inside of
[   15.023278]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   15.025114] 
[   15.025373] The buggy address belongs to the physical page:
[   15.026265] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   15.027758] flags: 0x200000000000200(slab|node=0|zone=2)
[   15.028639] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   15.029879] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   15.031117] page dumped because: kasan: bad access detected
[   15.032013] 
[   15.032269] Memory state around the buggy address:
[   15.033053]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   15.034222]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   15.035379] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.036554]                       ^
[   15.037126]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.038279]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039434] ==================================================================
[   15.040645] ==================================================================
[   15.041817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   15.043248] Read of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   15.044434] 
[   15.044694] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   15.046219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   15.047556] Call Trace:
[   15.047962]  <TASK>
[   15.048315]  dump_stack_lvl+0x4d/0x66
[   15.048931]  print_report+0x17a/0x471
[   15.049536]  ? kasan_complete_mode_report_info+0x40/0x210
[   15.050407]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   15.051428]  kasan_report+0xb4/0x140
[   15.052019]  ? kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   15.053057]  __asan_load8+0x82/0xb0
[   15.053636]  kasan_bitops_test_and_modify.constprop.0+0x276/0x6a0
[   15.054620]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.055686]  ? kasan_set_track+0x29/0x40
[   15.056330]  ? kasan_save_alloc_info+0x22/0x30
[   15.057070]  ? __kasan_kmalloc+0xb8/0xc0
[   15.057713]  kasan_bitops_generic+0xb0/0x120
[   15.058408]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.059197]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.059951]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   15.060779]  ? trace_preempt_on+0x2e/0xf0
[   15.061438]  ? __kthread_parkme+0x4f/0xd0
[   15.062093]  kunit_try_run_case+0x95/0xd0
[   15.062758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.063529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.064524]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.065399]  kthread+0x17d/0x1b0
[   15.065932]  ? __pfx_kthread+0x10/0x10
[   15.066555]  ret_from_fork+0x2c/0x50
[   15.067146]  </TASK>
[   15.067511] 
[   15.067766] Allocated by task 332:
[   15.068320]  kasan_save_stack+0x2a/0x60
[   15.068965]  kasan_set_track+0x29/0x40
[   15.069583]  kasan_save_alloc_info+0x22/0x30
[   15.070277]  __kasan_kmalloc+0xb8/0xc0
[   15.070897]  kmalloc_trace+0x4e/0xb0
[   15.071484]  kasan_bitops_generic+0x8a/0x120
[   15.072178]  kunit_try_run_case+0x95/0xd0
[   15.072855]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.073729]  kthread+0x17d/0x1b0
[   15.074259]  ret_from_fork+0x2c/0x50
[   15.074846] 
[   15.075103] The buggy address belongs to the object at ffff8881015fe900
[   15.075103]  which belongs to the cache kmalloc-16 of size 16
[   15.077064] The buggy address is located 8 bytes inside of
[   15.077064]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   15.078866] 
[   15.079123] The buggy address belongs to the physical page:
[   15.080016] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   15.081535] flags: 0x200000000000200(slab|node=0|zone=2)
[   15.082402] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   15.083639] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   15.084897] page dumped because: kasan: bad access detected
[   15.085786] 
[   15.086041] Memory state around the buggy address:
[   15.086811]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   15.087963]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   15.089128] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.090280]                       ^
[   15.090851]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.092005]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.093179] ==================================================================
[   15.094381] ==================================================================
[   15.095541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   15.096979] Write of size 8 at addr ffff8881015fe908 by task kunit_try_catch/332
[   15.098156] 
[   15.098413] CPU: 0 PID: 332 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   15.099929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   15.101259] Call Trace:
[   15.101663]  <TASK>
[   15.102012]  dump_stack_lvl+0x4d/0x66
[   15.102612]  print_report+0x17a/0x471
[   15.103212]  ? kasan_complete_mode_report_info+0x40/0x210
[   15.104084]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   15.105117]  kasan_report+0xb4/0x140
[   15.105708]  ? kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   15.106719]  kasan_check_range+0x3e/0x1d0
[   15.107379]  __kasan_check_write+0x18/0x20
[   15.108041]  kasan_bitops_test_and_modify.constprop.0+0x2c0/0x6a0
[   15.109029]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   15.110089]  ? kasan_set_track+0x29/0x40
[   15.110726]  ? kasan_save_alloc_info+0x22/0x30
[   15.111451]  ? __kasan_kmalloc+0xb8/0xc0
[   15.112097]  kasan_bitops_generic+0xb0/0x120
[   15.112813]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   15.113610]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.114393]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   15.115204]  ? trace_preempt_on+0x2e/0xf0
[   15.115876]  ? __kthread_parkme+0x4f/0xd0
[   15.116548]  kunit_try_run_case+0x95/0xd0
[   15.117200]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.117959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.118942]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.119818]  kthread+0x17d/0x1b0
[   15.120368]  ? __pfx_kthread+0x10/0x10
[   15.120991]  ret_from_fork+0x2c/0x50
[   15.121578]  </TASK>
[   15.121946] 
[   15.122200] Allocated by task 332:
[   15.122756]  kasan_save_stack+0x2a/0x60
[   15.123379]  kasan_set_track+0x29/0x40
[   15.123992]  kasan_save_alloc_info+0x22/0x30
[   15.124702]  __kasan_kmalloc+0xb8/0xc0
[   15.125314]  kmalloc_trace+0x4e/0xb0
[   15.125897]  kasan_bitops_generic+0x8a/0x120
[   15.126593]  kunit_try_run_case+0x95/0xd0
[   15.127248]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.128118]  kthread+0x17d/0x1b0
[   15.128662]  ret_from_fork+0x2c/0x50
[   15.129245] 
[   15.129500] The buggy address belongs to the object at ffff8881015fe900
[   15.129500]  which belongs to the cache kmalloc-16 of size 16
[   15.131454] The buggy address is located 8 bytes inside of
[   15.131454]  16-byte region [ffff8881015fe900, ffff8881015fe910)
[   15.133292] 
[   15.133549] The buggy address belongs to the physical page:
[   15.134442] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   15.135935] flags: 0x200000000000200(slab|node=0|zone=2)
[   15.136817] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   15.138061] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   15.139302] page dumped because: kasan: bad access detected
[   15.140198] 
[   15.140473] Memory state around the buggy address:
[   15.141248]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   15.142413]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   15.143571] >ffff8881015fe900: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.144747]                       ^
[   15.145322]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.146491]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.147639] ==================================================================
[   15.148890]     ok 46 - kasan_bitops_generic
[   15.148976] kunit_try_catch (332) used greatest stack depth: 28272 bytes left
[   15.149493]     ok 47 - kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.153109] ==================================================================
[   15.155577] BUG: KASAN: use-after-free in kfree_sensitive+0x17/0x50
[   15.156611] Read of size 1 at addr ffff8881015fe920 by task kunit_try_catch/334
[   15.157784] 
[   15.158041] CPU: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   15.159558] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   15.160913] Call Trace:
[   15.161319]  <TASK>
[   15.161687]  dump_stack_lvl+0x4d/0x66
[   15.162633]  print_report+0x17a/0x471
[   15.163586]  ? kasan_complete_mode_report_info+0x80/0x210
[   15.164964]  ? kfree_sensitive+0x17/0x50
[   15.165965]  kasan_report+0xb4/0x140
[   15.166883]  ? kfree_sensitive+0x17/0x50
[   15.167881]  ? kfree_sensitive+0x17/0x50
[   15.168909]  __kasan_check_byte+0x41/0x50
[   15.169828]  ksize+0x23/0x70
[   15.170304]  kfree_sensitive+0x17/0x50
[   15.170914]  kmalloc_double_kzfree+0xcc/0x1c0
[   15.171622]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   15.172438]  ? __kasan_check_write+0x18/0x20
[   15.173127]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.173868]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   15.174670]  ? trace_preempt_on+0x2e/0xf0
[   15.175324]  ? __kthread_parkme+0x4f/0xd0
[   15.175974]  kunit_try_run_case+0x95/0xd0
[   15.176639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.177398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.178372]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.179236]  kthread+0x17d/0x1b0
[   15.179768]  ? __pfx_kthread+0x10/0x10
[   15.180398]  ret_from_fork+0x2c/0x50
[   15.180988]  </TASK>
[   15.181356] 
[   15.181610] Allocated by task 334:
[   15.182160]  kasan_save_stack+0x2a/0x60
[   15.182780]  kasan_set_track+0x29/0x40
[   15.183388]  kasan_save_alloc_info+0x22/0x30
[   15.184078]  __kasan_kmalloc+0xb8/0xc0
[   15.184696]  kmalloc_trace+0x4e/0xb0
[   15.185278]  kmalloc_double_kzfree+0x9d/0x1c0
[   15.185985]  kunit_try_run_case+0x95/0xd0
[   15.186637]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.187502]  kthread+0x17d/0x1b0
[   15.188032]  ret_from_fork+0x2c/0x50
[   15.188640] 
[   15.188895] Freed by task 334:
[   15.189400]  kasan_save_stack+0x2a/0x60
[   15.190026]  kasan_set_track+0x29/0x40
[   15.190636]  kasan_save_free_info+0x32/0x50
[   15.191316]  ____kasan_slab_free+0x174/0x1e0
[   15.192009]  __kasan_slab_free+0x16/0x20
[   15.192656]  __kmem_cache_free+0x18e/0x300
[   15.193323]  kfree+0x7d/0x120
[   15.193810]  kfree_sensitive+0x43/0x50
[   15.194413]  kmalloc_double_kzfree+0xb5/0x1c0
[   15.195118]  kunit_try_run_case+0x95/0xd0
[   15.195769]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.196656]  kthread+0x17d/0x1b0
[   15.197183]  ret_from_fork+0x2c/0x50
[   15.197763] 
[   15.198017] The buggy address belongs to the object at ffff8881015fe920
[   15.198017]  which belongs to the cache kmalloc-16 of size 16
[   15.199959] The buggy address is located 0 bytes inside of
[   15.199959]  16-byte region [ffff8881015fe920, ffff8881015fe930)
[   15.201772] 
[   15.202024] The buggy address belongs to the physical page:
[   15.202913] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   15.204421] flags: 0x200000000000200(slab|node=0|zone=2)
[   15.205282] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   15.206509] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   15.207733] page dumped because: kasan: bad access detected
[   15.208637] 
[   15.208890] Memory state around the buggy address:
[   15.209654]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   15.210800]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   15.211943] >ffff8881015fe900: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   15.213101]                                ^
[   15.213793]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214939]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.216081] ==================================================================
[   15.217290] ==================================================================
[   15.218453] BUG: KASAN: double-free in kfree+0x7d/0x120
[   15.219293] Free of addr ffff8881015fe920 by task kunit_try_catch/334
[   15.220325] 
[   15.220598] CPU: 0 PID: 334 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   15.222108] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   15.223433] Call Trace:
[   15.223837]  <TASK>
[   15.224186]  dump_stack_lvl+0x4d/0x66
[   15.224793]  print_report+0x17a/0x471
[   15.225392]  ? kfree+0x7d/0x120
[   15.225905]  ? kasan_complete_mode_report_info+0x80/0x210
[   15.226771]  ? kfree+0x7d/0x120
[   15.227287]  ? kfree+0x7d/0x120
[   15.227802]  kasan_report_invalid_free+0x85/0x100
[   15.228589]  ? kfree+0x7d/0x120
[   15.229105]  ____kasan_slab_free+0x19e/0x1e0
[   15.229794]  ? kfree_sensitive+0x24/0x50
[   15.230432]  __kasan_slab_free+0x16/0x20
[   15.231075]  __kmem_cache_free+0x18e/0x300
[   15.231746]  kfree+0x7d/0x120
[   15.232237]  kfree_sensitive+0x24/0x50
[   15.232866]  kmalloc_double_kzfree+0xcc/0x1c0
[   15.233577]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   15.234379]  ? __kasan_check_write+0x18/0x20
[   15.235074]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.235827]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   15.236643]  ? trace_preempt_on+0x2e/0xf0
[   15.237300]  ? __kthread_parkme+0x4f/0xd0
[   15.237955]  kunit_try_run_case+0x95/0xd0
[   15.238614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.239381]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.240384]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.241255]  kthread+0x17d/0x1b0
[   15.241785]  ? __pfx_kthread+0x10/0x10
[   15.242396]  ret_from_fork+0x2c/0x50
[   15.242982]  </TASK>
[   15.243345] 
[   15.243598] Allocated by task 334:
[   15.244151]  kasan_save_stack+0x2a/0x60
[   15.244790]  kasan_set_track+0x29/0x40
[   15.245399]  kasan_save_alloc_info+0x22/0x30
[   15.246097]  __kasan_kmalloc+0xb8/0xc0
[   15.246709]  kmalloc_trace+0x4e/0xb0
[   15.247292]  kmalloc_double_kzfree+0x9d/0x1c0
[   15.248000]  kunit_try_run_case+0x95/0xd0
[   15.248672]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.249541]  kthread+0x17d/0x1b0
[   15.250074]  ret_from_fork+0x2c/0x50
[   15.250658] 
[   15.250912] Freed by task 334:
[   15.251413]  kasan_save_stack+0x2a/0x60
[   15.252041]  kasan_set_track+0x29/0x40
[   15.252670]  kasan_save_free_info+0x32/0x50
[   15.253355]  ____kasan_slab_free+0x174/0x1e0
[   15.254047]  __kasan_slab_free+0x16/0x20
[   15.254696]  __kmem_cache_free+0x18e/0x300
[   15.255362]  kfree+0x7d/0x120
[   15.255850]  kfree_sensitive+0x43/0x50
[   15.256470]  kmalloc_double_kzfree+0xb5/0x1c0
[   15.257176]  kunit_try_run_case+0x95/0xd0
[   15.257830]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.258694]  kthread+0x17d/0x1b0
[   15.259228]  ret_from_fork+0x2c/0x50
[   15.259818] 
[   15.260074] The buggy address belongs to the object at ffff8881015fe920
[   15.260074]  which belongs to the cache kmalloc-16 of size 16
[   15.262069] The buggy address is located 0 bytes inside of
[   15.262069]  16-byte region [ffff8881015fe920, ffff8881015fe930)
[   15.263892] 
[   15.264152] The buggy address belongs to the physical page:
[   15.265062] page:000000002875cf57 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1015fe
[   15.266552] flags: 0x200000000000200(slab|node=0|zone=2)
[   15.267411] raw: 0200000000000200 ffff8881000423c0 dead000000000122 0000000000000000
[   15.268661] raw: 0000000000000000 0000000080800080 00000001ffffffff 0000000000000000
[   15.269898] page dumped because: kasan: bad access detected
[   15.270791] 
[   15.271045] Memory state around the buggy address:
[   15.271821]  ffff8881015fe800: 00 04 fc fc 00 04 fc fc 00 00 fc fc 00 00 fc fc
[   15.273000]  ffff8881015fe880: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc
[   15.274163] >ffff8881015fe900: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   15.275326]                                ^
[   15.276021]  ffff8881015fe980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.277191]  ffff8881015fea00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.278345] ==================================================================
[   15.279635]     ok 48 - kmalloc_double_kzfree
[   15.289409] ==================================================================
[   15.293861] BUG: KASAN: use-after-free in rcu_uaf_reclaim+0x27/0x40
[   15.295847] Read of size 4 at addr ffff888101318100 by task swapper/3/0
[   15.298009] 
[   15.298579] CPU: 3 PID: 0 Comm: swapper/3 Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   15.301105] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   15.303237] Call Trace:
[   15.303877]  <IRQ>
[   15.304463]  dump_stack_lvl+0x4d/0x66
[   15.305350]  print_report+0x17a/0x471
[   15.306045]  ? kasan_complete_mode_report_info+0x80/0x210
[   15.306933]  ? rcu_uaf_reclaim+0x27/0x40
[   15.307572]  kasan_report+0xb4/0x140
[   15.308160]  ? rcu_uaf_reclaim+0x27/0x40
[   15.308823]  __asan_load4+0x84/0xa0
[   15.309399]  rcu_uaf_reclaim+0x27/0x40
[   15.310009]  rcu_core+0x468/0xfb0
[   15.310556]  ? __pfx_rcu_core+0x10/0x10
[   15.311179]  ? __pfx_lapic_next_deadline+0x10/0x10
[   15.311950]  ? clockevents_program_event+0x103/0x170
[   15.312760]  ? __do_softirq+0xda/0x4f6
[   15.313368]  ? __irq_exit_rcu+0xf6/0x140
[   15.314005]  rcu_core_si+0x12/0x20
[   15.314561]  __do_softirq+0x152/0x4f6
[   15.315159]  __irq_exit_rcu+0xf6/0x140
[   15.315770]  irq_exit_rcu+0x12/0x30
[   15.316337]  sysvec_apic_timer_interrupt+0xa5/0xc0
[   15.317136]  </IRQ>
[   15.317482]  <TASK>
[   15.317875]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   15.318686] RIP: 0010:default_idle+0x18/0x20
[   15.319361] Code: cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 55 48 89 e5 eb 07 0f 00 2d aa 8e 2f 00 fb f4 <5d> e9 06 38 00 00 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90
[   15.322258] RSP: 0018:ffff8881003dfdc8 EFLAGS: 00000216
[   15.323088] RAX: ffffffff9235f7a0 RBX: ffff888100374400 RCX: ffffffff9234e84a
[   15.324230] RDX: ffffed10236b67e1 RSI: ffffffff9283fd20 RDI: 000000000190a40c
[   15.325416] RBP: ffff8881003dfdc8 R08: 0000000000000001 R09: ffff88811b5b3f03
[   15.326565] R10: ffffed10236b67e0 R11: 0000000000000001 R12: 0000000000000003
[   15.327728] R13: ffffffff93e00750 R14: 0000000000000000 R15: 0000000000000000
[   15.328883]  ? __pfx_default_idle+0x10/0x10
[   15.329580]  ? ct_kernel_exit.constprop.0+0xda/0x100
[   15.330393]  arch_cpu_idle+0x19/0x20
[   15.330982]  default_idle_call+0x77/0x1a0
[   15.331632]  do_idle+0x35b/0x410
[   15.332168]  ? trace_hardirqs_on+0x3c/0x130
[   15.333005]  ? __pfx_do_idle+0x10/0x10
[   15.333780]  ? _raw_spin_unlock_irqrestore+0x37/0x60
[   15.334819]  ? complete+0xb1/0xc0
[   15.335527]  cpu_startup_entry+0x24/0x30
[   15.336334]  start_secondary+0x1be/0x1e0
[   15.337185]  ? __pfx_start_secondary+0x10/0x10
[   15.338032]  secondary_startup_64_no_verify+0xe0/0xeb
[   15.338909]  </TASK>
[   15.339299] 
[   15.339585] Allocated by task 335:
[   15.340195]  kasan_save_stack+0x2a/0x60
[   15.340961]  kasan_set_track+0x29/0x40
[   15.341636]  kasan_save_alloc_info+0x22/0x30
[   15.342406]  __kasan_kmalloc+0xb8/0xc0
[   15.343079]  kmalloc_trace+0x4e/0xb0
[   15.343721]  rcu_uaf+0x9d/0x1e0
[   15.344284]  kunit_try_run_case+0x95/0xd0
[   15.345016]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.345967]  kthread+0x17d/0x1b0
[   15.346563]  ret_from_fork+0x2c/0x50
[   15.347200] 
[   15.347479] Freed by task 0:
[   15.348004]  kasan_save_stack+0x2a/0x60
[   15.348692]  kasan_set_track+0x29/0x40
[   15.349313]  kasan_save_free_info+0x32/0x50
[   15.350010]  ____kasan_slab_free+0x174/0x1e0
[   15.350727]  __kasan_slab_free+0x16/0x20
[   15.351374]  __kmem_cache_free+0x18e/0x300
[   15.352071]  kfree+0x7d/0x120
[   15.352613]  rcu_uaf_reclaim+0x1f/0x40
[   15.353237]  rcu_core+0x468/0xfb0
[   15.353791]  rcu_core_si+0x12/0x20
[   15.354369]  __do_softirq+0x152/0x4f6
[   15.354993] 
[   15.355260] Last potentially related work creation:
[   15.356085]  kasan_save_stack+0x2a/0x60
[   15.356756]  __kasan_record_aux_stack+0xb6/0xd0
[   15.357542]  kasan_record_aux_stack_noalloc+0xf/0x20
[   15.358406]  __call_rcu_common.constprop.0+0x4e/0x5a0
[   15.359268]  call_rcu+0x12/0x20
[   15.359808]  rcu_uaf+0xe2/0x1e0
[   15.360358]  kunit_try_run_case+0x95/0xd0
[   15.361041]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.361943]  kthread+0x17d/0x1b0
[   15.362494]  ret_from_fork+0x2c/0x50
[   15.363104] 
[   15.363386] The buggy address belongs to the object at ffff888101318100
[   15.363386]  which belongs to the cache kmalloc-32 of size 32
[   15.365496] The buggy address is located 0 bytes inside of
[   15.365496]  32-byte region [ffff888101318100, ffff888101318120)
[   15.367408] 
[   15.367681] The buggy address belongs to the physical page:
[   15.368641] page:00000000ba03048f refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101318
[   15.370222] flags: 0x200000000000200(slab|node=0|zone=2)
[   15.371129] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   15.372488] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   15.373706] page dumped because: kasan: bad access detected
[   15.374604] 
[   15.374855] Memory state around the buggy address:
[   15.375609]  ffff888101318000: 00 00 00 00 fc fc fc fc fa fb fb fb fc fc fc fc
[   15.376806]  ffff888101318080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   15.378017] >ffff888101318100: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   15.379249]                    ^
[   15.379812]  ffff888101318180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.381051]  ffff888101318200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.382231] ==================================================================
[   15.383525]     ok 49 - rcu_uaf
[   15.384395] ==================================================================
[   15.387386] BUG: KASAN: use-after-free in workqueue_uaf+0x165/0x2a0
[   15.389464] Read of size 8 at addr ffff8881044e17c0 by task kunit_try_catch/336
[   15.392240] 
[   15.392908] CPU: 2 PID: 336 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   15.395564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   15.397860] Call Trace:
[   15.398528]  <TASK>
[   15.399106]  dump_stack_lvl+0x4d/0x66
[   15.400075]  print_report+0x17a/0x471
[   15.401068]  ? kasan_complete_mode_report_info+0x80/0x210
[   15.402134]  ? workqueue_uaf+0x165/0x2a0
[   15.402744]  kasan_report+0xb4/0x140
[   15.403303]  ? workqueue_uaf+0x165/0x2a0
[   15.403917]  __asan_load8+0x82/0xb0
[   15.404474]  workqueue_uaf+0x165/0x2a0
[   15.405110]  ? __pfx_workqueue_uaf+0x10/0x10
[   15.405781]  ? __kasan_check_write+0x18/0x20
[   15.406450]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   15.407171]  ? _raw_spin_unlock_irqrestore+0x2c/0x60
[   15.407941]  ? trace_preempt_on+0x2e/0xf0
[   15.408579]  ? __kthread_parkme+0x4f/0xd0
[   15.409208]  kunit_try_run_case+0x95/0xd0
[   15.409839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.410572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.411511]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.412344]  kthread+0x17d/0x1b0
[   15.412873]  ? __pfx_kthread+0x10/0x10
[   15.413471]  ret_from_fork+0x2c/0x50
[   15.414059]  </TASK>
[   15.414411] 
[   15.414660] Allocated by task 336:
[   15.415190]  kasan_save_stack+0x2a/0x60
[   15.415790]  kasan_set_track+0x29/0x40
[   15.416389]  kasan_save_alloc_info+0x22/0x30
[   15.417052]  __kasan_kmalloc+0xb8/0xc0
[   15.417640]  kmalloc_trace+0x4e/0xb0
[   15.418204]  workqueue_uaf+0xdb/0x2a0
[   15.418793]  kunit_try_run_case+0x95/0xd0
[   15.419441]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.420292]  kthread+0x17d/0x1b0
[   15.420828]  ret_from_fork+0x2c/0x50
[   15.421399] 
[   15.421648] Freed by task 56:
[   15.422120]  kasan_save_stack+0x2a/0x60
[   15.422726]  kasan_set_track+0x29/0x40
[   15.423321]  kasan_save_free_info+0x32/0x50
[   15.423982]  ____kasan_slab_free+0x174/0x1e0
[   15.424661]  __kasan_slab_free+0x16/0x20
[   15.425278]  __kmem_cache_free+0x18e/0x300
[   15.425922]  kfree+0x7d/0x120
[   15.426395]  workqueue_uaf_work+0x12/0x20
[   15.427022]  process_one_work+0x434/0x720
[   15.427655]  worker_thread+0x2bf/0x6f0
[   15.428249]  kthread+0x17d/0x1b0
[   15.428954]  ret_from_fork+0x2c/0x50
[   15.429749] 
[   15.430106] Last potentially related work creation:
[   15.431117]  kasan_save_stack+0x2a/0x60
[   15.431767]  __kasan_record_aux_stack+0xb6/0xd0
[   15.432536]  kasan_record_aux_stack_noalloc+0xf/0x20
[   15.433364]  insert_work+0x3b/0x160
[   15.433951]  __queue_work+0x329/0x6a0
[   15.434622]  queue_work_on+0x80/0x90
[   15.435238]  workqueue_uaf+0x146/0x2a0
[   15.435871]  kunit_try_run_case+0x95/0xd0
[   15.436584]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.437428]  kthread+0x17d/0x1b0
[   15.437944]  ret_from_fork+0x2c/0x50
[   15.438513] 
[   15.438760] The buggy address belongs to the object at ffff8881044e17c0
[   15.438760]  which belongs to the cache kmalloc-32 of size 32
[   15.440651] The buggy address is located 0 bytes inside of
[   15.440651]  32-byte region [ffff8881044e17c0, ffff8881044e17e0)
[   15.442394] 
[   15.442639] The buggy address belongs to the physical page:
[   15.443494] page:00000000e0a1c7c6 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044e1
[   15.444934] flags: 0x200000000000200(slab|node=0|zone=2)
[   15.445758] raw: 0200000000000200 ffff888100042500 dead000000000122 0000000000000000
[   15.446951] raw: 0000000000000000 0000000080400040 00000001ffffffff 0000000000000000
[   15.448142] page dumped because: kasan: bad access detected
[   15.449055] 
[   15.449300] Memory state around the buggy address:
[   15.450047]  ffff8881044e1680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   15.451153]  ffff8881044e1700: 00 00 07 fc fc fc fc fc 00 00 07 fc fc fc fc fc
[   15.452260] >ffff8881044e1780: 00 00 05 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   15.453382]                                            ^
[   15.454275]  ffff8881044e1800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.455440]  ffff8881044e1880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.456646] ==================================================================
[   15.457859]     ok 50 - workqueue_uaf
[   15.458309]     ok 51 - vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.459288]     ok 52 - vmalloc_oob # SKIP Test requires CONFIG_KASAN_VMALLOC=y
[   15.461002]     ok 53 - vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y
[   15.462492]     ok 54 - vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y
[   15.463969]     ok 55 - vmalloc_percpu # SKIP Test requires CONFIG_KASAN_SW_TAGS=y
[   15.465887]     ok 56 - match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.467782]     ok 57 - match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.469370]     ok 58 - match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.473407] # kasan: pass:46 fail:0 skip:12 total:58
[   15.474637] # Totals: pass:46 fail:0 skip:12 total:58
[   15.475478] ok 5 - kasan
[   15.477083]     # Subtest: kfence
[   15.477091]     1..25
[   15.477870]     # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=left, cache=0
[   15.670516] ==================================================================
[   15.671730] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x111/0x23e
[   15.671730] 
[   15.673078] Out-of-bounds read at 0x00000000f0a27cd6 (1B left of kfence-#92):
[   15.674101]  test_out_of_bounds_read+0x111/0x23e
[   15.674773]  kunit_try_run_case+0x95/0xd0
[   15.675360]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.676141]  kthread+0x17d/0x1b0
[   15.676627]  ret_from_fork+0x2c/0x50
[   15.677174] 
[   15.677405] kfence-#92: 0x000000000b354b59-0x000000007cfc48e2, size=32, cache=kmalloc-32
[   15.677405] 
[   15.678764] allocated by task 346 on cpu 0 at 15.670486s:
[   15.679552]  test_alloc+0x1d7/0x750
[   15.680066]  test_out_of_bounds_read+0xfa/0x23e
[   15.680738]  kunit_try_run_case+0x95/0xd0
[   15.681322]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.682097]  kthread+0x17d/0x1b0
[   15.682570]  ret_from_fork+0x2c/0x50
[   15.683093] 
[   15.683325] CPU: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   15.684688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   15.685870] ==================================================================
[   15.686946]     # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=right, cache=0
[   15.917909] ==================================================================
[   15.922497] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x19c/0x23e
[   15.922497] 
[   15.923943] Out-of-bounds read at 0x00000000d1570259 (32B right of kfence-#94):
[   15.925129]  test_out_of_bounds_read+0x19c/0x23e
[   15.925876]  kunit_try_run_case+0x95/0xd0
[   15.926535]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.927394]  kthread+0x17d/0x1b0
[   15.927924]  ret_from_fork+0x2c/0x50
[   15.928525] 
[   15.928784] kfence-#94: 0x00000000c8c61aa9-0x00000000b8748e79, size=32, cache=kmalloc-32
[   15.928784] 
[   15.930285] allocated by task 346 on cpu 0 at 15.917878s:
[   15.931150]  test_alloc+0x1d7/0x750
[   15.931716]  test_out_of_bounds_read+0x183/0x23e
[   15.932466]  kunit_try_run_case+0x95/0xd0
[   15.933110]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   15.933972]  kthread+0x17d/0x1b0
[   15.934494]  ret_from_fork+0x2c/0x50
[   15.935071] 
[   15.935325] CPU: 0 PID: 346 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   15.936857] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   15.938160] ==================================================================
[   15.939468] kunit_try_catch (346) used greatest stack depth: 27280 bytes left
[   15.939490]     ok 1 - test_out_of_bounds_read
[   15.941142]     # test_out_of_bounds_read-memcache: setup_test_cache: size=32, ctor=0x0
[   15.946412]     # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1
[   16.086426] ==================================================================
[   16.087708] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x111/0x23e
[   16.087708] 
[   16.089205] Out-of-bounds read at 0x00000000fa499030 (1B left of kfence-#96):
[   16.090400]  test_out_of_bounds_read+0x111/0x23e
[   16.091185]  kunit_try_run_case+0x95/0xd0
[   16.091870]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.092816]  kthread+0x17d/0x1b0
[   16.093343]  ret_from_fork+0x2c/0x50
[   16.093907] 
[   16.094153] kfence-#96: 0x000000000c9aeeb9-0x000000002cd7c8b2, size=32, cache=test
[   16.094153] 
[   16.095539] allocated by task 347 on cpu 3 at 16.086396s:
[   16.096444]  test_alloc+0x1ca/0x750
[   16.096989]  test_out_of_bounds_read+0xfa/0x23e
[   16.097682]  kunit_try_run_case+0x95/0xd0
[   16.098311]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.099167]  kthread+0x17d/0x1b0
[   16.099675]  ret_from_fork+0x2c/0x50
[   16.100230] 
[   16.100479] CPU: 3 PID: 347 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   16.101902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   16.103149] ==================================================================
[   16.104293]     # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1
[   16.191058] ==================================================================
[   16.192255] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x19c/0x23e
[   16.192255] 
[   16.193616] Out-of-bounds read at 0x00000000375696c1 (32B right of kfence-#97):
[   16.194672]  test_out_of_bounds_read+0x19c/0x23e
[   16.195345]  kunit_try_run_case+0x95/0xd0
[   16.195938]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.196735]  kthread+0x17d/0x1b0
[   16.197214]  ret_from_fork+0x2c/0x50
[   16.197748] 
[   16.197982] kfence-#97: 0x00000000361fd389-0x00000000a510b88d, size=32, cache=test
[   16.197982] 
[   16.199285] allocated by task 347 on cpu 3 at 16.191028s:
[   16.200079]  test_alloc+0x1ca/0x750
[   16.200609]  test_out_of_bounds_read+0x183/0x23e
[   16.201285]  kunit_try_run_case+0x95/0xd0
[   16.201878]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.202667]  kthread+0x17d/0x1b0
[   16.203148]  ret_from_fork+0x2c/0x50
[   16.203678] 
[   16.203912] CPU: 3 PID: 347 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   16.205297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   16.206501] ==================================================================
[   16.224757]     ok 2 - test_out_of_bounds_read-memcache
[   16.225247]     # test_out_of_bounds_write: test_alloc: size=32, gfp=cc0, policy=left, cache=0
[   16.294451] ==================================================================
[   16.295947] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xdb/0x17f
[   16.295947] 
[   16.297424] Out-of-bounds write at 0x000000007d7d3507 (1B left of kfence-#98):
[   16.298547]  test_out_of_bounds_write+0xdb/0x17f
[   16.299270]  kunit_try_run_case+0x95/0xd0
[   16.299914]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.300875]  kthread+0x17d/0x1b0
[   16.301401]  ret_from_fork+0x2c/0x50
[   16.301969] 
[   16.302215] kfence-#98: 0x0000000022709c1e-0x0000000087ebc074, size=32, cache=kmalloc-32
[   16.302215] 
[   16.303702] allocated by task 348 on cpu 2 at 16.294413s:
[   16.304581]  test_alloc+0x1d7/0x750
[   16.305138]  test_out_of_bounds_write+0xcb/0x17f
[   16.305864]  kunit_try_run_case+0x95/0xd0
[   16.306495]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.307333]  kthread+0x17d/0x1b0
[   16.307846]  ret_from_fork+0x2c/0x50
[   16.308430] 
[   16.308761] CPU: 2 PID: 348 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   16.310720] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   16.312081] ==================================================================
[   16.313291]     ok 3 - test_out_of_bounds_write
[   16.313750]     # test_out_of_bounds_write-memcache: setup_test_cache: size=32, ctor=0x0
[   16.318859]     # test_out_of_bounds_write-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1
[   16.398490] ==================================================================
[   16.399724] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0xdb/0x17f
[   16.399724] 
[   16.401196] Out-of-bounds write at 0x00000000abc5d3e6 (1B left of kfence-#99):
[   16.402347]  test_out_of_bounds_write+0xdb/0x17f
[   16.403089]  kunit_try_run_case+0x95/0xd0
[   16.403738]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.404627]  kthread+0x17d/0x1b0
[   16.405156]  ret_from_fork+0x2c/0x50
[   16.405734] 
[   16.405986] kfence-#99: 0x00000000fe1613cb-0x00000000d16ee216, size=32, cache=test
[   16.405986] 
[   16.407393] allocated by task 349 on cpu 3 at 16.398458s:
[   16.408254]  test_alloc+0x1ca/0x750
[   16.408831]  test_out_of_bounds_write+0xcb/0x17f
[   16.409582]  kunit_try_run_case+0x95/0xd0
[   16.410231]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.411097]  kthread+0x17d/0x1b0
[   16.411630]  ret_from_fork+0x2c/0x50
[   16.412213] 
[   16.412487] CPU: 3 PID: 349 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   16.414003] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   16.415321] ==================================================================
[   16.430848]     ok 4 - test_out_of_bounds_write-memcache
[   16.431205]     # test_use_after_free_read: test_alloc: size=32, gfp=cc0, policy=any, cache=0
[   16.502469] ==================================================================
[   16.503605] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xfc/0x17d
[   16.503605] 
[   16.504939] Use-after-free read at 0x000000008b1c35ba (in kfence-#100):
[   16.505903]  test_use_after_free_read+0xfc/0x17d
[   16.506608]  kunit_try_run_case+0x95/0xd0
[   16.507210]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.508008]  kthread+0x17d/0x1b0
[   16.508515]  ret_from_fork+0x2c/0x50
[   16.509062] 
[   16.509300] kfence-#100: 0x000000008b1c35ba-0x0000000067fc3d5e, size=32, cache=kmalloc-32
[   16.509300] 
[   16.510710] allocated by task 350 on cpu 2 at 16.502390s:
[   16.511519]  test_alloc+0x1d7/0x750
[   16.512047]  test_use_after_free_read+0xcb/0x17d
[   16.512753]  kunit_try_run_case+0x95/0xd0
[   16.513352]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.514150]  kthread+0x17d/0x1b0
[   16.514642]  ret_from_fork+0x2c/0x50
[   16.515178] 
[   16.515422] freed by task 350 on cpu 2 at 16.502423s:
[   16.516184]  kfree+0x7d/0x120
[   16.516659]  test_use_after_free_read+0xf0/0x17d
[   16.517356]  kunit_try_run_case+0x95/0xd0
[   16.517962]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.518781]  kthread+0x17d/0x1b0
[   16.519289]  ret_from_fork+0x2c/0x50
[   16.519852] 
[   16.520096] CPU: 2 PID: 350 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   16.521936] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   16.523604] ==================================================================
[   16.525051]     ok 5 - test_use_after_free_read
[   16.525391]     # test_use_after_free_read-memcache: setup_test_cache: size=32, ctor=0x0
[   16.527824]     # test_use_after_free_read-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1
[   16.606449] ==================================================================
[   16.607634] BUG: KFENCE: use-after-free read in test_use_after_free_read+0xfc/0x17d
[   16.607634] 
[   16.609035] Use-after-free read at 0x00000000501e2c7f (in kfence-#101):
[   16.610100]  test_use_after_free_read+0xfc/0x17d
[   16.610827]  kunit_try_run_case+0x95/0xd0
[   16.611463]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.612306]  kthread+0x17d/0x1b0
[   16.612838]  ret_from_fork+0x2c/0x50
[   16.613408] 
[   16.613655] kfence-#101: 0x00000000501e2c7f-0x000000007a8e8f10, size=32, cache=test
[   16.613655] 
[   16.615104] allocated by task 351 on cpu 3 at 16.606396s:
[   16.615954]  test_alloc+0x1ca/0x750
[   16.616529]  test_use_after_free_read+0xcb/0x17d
[   16.617257]  kunit_try_run_case+0x95/0xd0
[   16.617893]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.618761]  kthread+0x17d/0x1b0
[   16.619249]  ret_from_fork+0x2c/0x50
[   16.619795] 
[   16.620030] freed by task 351 on cpu 3 at 16.606417s:
[   16.620788]  test_use_after_free_read+0xe6/0x17d
[   16.621471]  kunit_try_run_case+0x95/0xd0
[   16.622065]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.622852]  kthread+0x17d/0x1b0
[   16.623334]  ret_from_fork+0x2c/0x50
[   16.623864] 
[   16.624097] CPU: 3 PID: 351 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   16.625688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   16.627003] ==================================================================
[   16.643947]     ok 6 - test_use_after_free_read-memcache
[   16.644332]     # test_double_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0
[   16.710456] ==================================================================
[   16.714774] BUG: KFENCE: invalid free in kfree+0x7d/0x120
[   16.714774] 
[   16.715874] Invalid free of 0x0000000034d077eb (in kfence-#102):
[   16.717061]  kfree+0x7d/0x120
[   16.717692]  test_double_free+0x10e/0x18f
[   16.718532]  kunit_try_run_case+0x95/0xd0
[   16.719282]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.720139]  kthread+0x17d/0x1b0
[   16.720686]  ret_from_fork+0x2c/0x50
[   16.721265] 
[   16.721519] kfence-#102: 0x0000000034d077eb-0x000000005cc46250, size=32, cache=kmalloc-32
[   16.721519] 
[   16.723031] allocated by task 352 on cpu 2 at 16.710390s:
[   16.723896]  test_alloc+0x1d7/0x750
[   16.724476]  test_double_free+0xcb/0x18f
[   16.725106]  kunit_try_run_case+0x95/0xd0
[   16.725749]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.726603]  kthread+0x17d/0x1b0
[   16.727125]  ret_from_fork+0x2c/0x50
[   16.727701] 
[   16.727951] freed by task 352 on cpu 2 at 16.710414s:
[   16.728781]  kfree+0x7d/0x120
[   16.729262]  test_double_free+0xf0/0x18f
[   16.729892]  kunit_try_run_case+0x95/0xd0
[   16.730539]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.731397]  kthread+0x17d/0x1b0
[   16.731920]  ret_from_fork+0x2c/0x50
[   16.732509] 
[   16.732766] CPU: 2 PID: 352 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   16.734284] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   16.735599] ==================================================================
[   16.736848]     # test_double_free: EXPECTATION FAILED at mm/kfence/kfence_test.c:396
[   16.736848]     Expected report_matches(&expect) to be true, but is false
[   16.739199]     not ok 7 - test_double_free
[   16.739581]     # test_double_free-memcache: setup_test_cache: size=32, ctor=0x0
[   16.741726]     # test_double_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1
[   16.814487] ==================================================================
[   16.815647] BUG: KFENCE: invalid free in test_double_free+0x104/0x18f
[   16.815647] 
[   16.816869] Invalid free of 0x00000000807e1b83 (in kfence-#103):
[   16.817793]  test_double_free+0x104/0x18f
[   16.818422]  kunit_try_run_case+0x95/0xd0
[   16.819052]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.819888]  kthread+0x17d/0x1b0
[   16.820396]  ret_from_fork+0x2c/0x50
[   16.820954] 
[   16.821198] kfence-#103: 0x00000000807e1b83-0x00000000c12d5828, size=32, cache=test
[   16.821198] 
[   16.822560] allocated by task 353 on cpu 3 at 16.814424s:
[   16.823376]  test_alloc+0x1ca/0x750
[   16.823910]  test_double_free+0xcb/0x18f
[   16.824565]  kunit_try_run_case+0x95/0xd0
[   16.825367]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.826458]  kthread+0x17d/0x1b0
[   16.827108]  ret_from_fork+0x2c/0x50
[   16.827819] 
[   16.828145] freed by task 353 on cpu 3 at 16.814447s:
[   16.829179]  test_double_free+0xe6/0x18f
[   16.829982]  kunit_try_run_case+0x95/0xd0
[   16.830749]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.831647]  kthread+0x17d/0x1b0
[   16.832194]  ret_from_fork+0x2c/0x50
[   16.832813] 
[   16.833077] CPU: 3 PID: 353 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   16.834609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   16.835940] ==================================================================
[   16.853296]     ok 8 - test_double_free-memcache
[   16.853642]     # test_invalid_addr_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0
[   16.918516] ==================================================================
[   16.919855] BUG: KFENCE: invalid free in kfree+0x7d/0x120
[   16.919855] 
[   16.920962] Invalid free of 0x000000003722a694 (in kfence-#104):
[   16.921915]  kfree+0x7d/0x120
[   16.922403]  test_invalid_addr_free+0xf5/0x197
[   16.923118]  kunit_try_run_case+0x95/0xd0
[   16.923760]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.924652]  kthread+0x17d/0x1b0
[   16.925190]  ret_from_fork+0x2c/0x50
[   16.925770] 
[   16.926024] kfence-#104: 0x00000000d1d8e521-0x00000000c0150b6f, size=32, cache=kmalloc-32
[   16.926024] 
[   16.927540] allocated by task 354 on cpu 2 at 16.918454s:
[   16.928435]  test_alloc+0x1d7/0x750
[   16.929004]  test_invalid_addr_free+0xcb/0x197
[   16.929722]  kunit_try_run_case+0x95/0xd0
[   16.930376]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   16.931240]  kthread+0x17d/0x1b0
[   16.931770]  ret_from_fork+0x2c/0x50
[   16.932350] 
[   16.932622] CPU: 2 PID: 354 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   16.934136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   16.935477] ==================================================================
[   16.936755]     # test_invalid_addr_free: EXPECTATION FAILED at mm/kfence/kfence_test.c:413
[   16.936755]     Expected report_matches(&expect) to be true, but is false
[   16.939212]     not ok 9 - test_invalid_addr_free
[   16.939602]     # test_invalid_addr_free-memcache: setup_test_cache: size=32, ctor=0x0
[   16.941966]     # test_invalid_addr_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1
[   17.022482] ==================================================================
[   17.023764] BUG: KFENCE: invalid free in test_invalid_addr_free+0xeb/0x197
[   17.023764] 
[   17.025096] Invalid free of 0x00000000ab6b9cce (in kfence-#105):
[   17.026084]  test_invalid_addr_free+0xeb/0x197
[   17.026840]  kunit_try_run_case+0x95/0xd0
[   17.027515]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.028361]  kthread+0x17d/0x1b0
[   17.028950]  ret_from_fork+0x2c/0x50
[   17.029555] 
[   17.029818] kfence-#105: 0x000000003a47dd71-0x00000000eb9cc5c3, size=32, cache=test
[   17.029818] 
[   17.031362] allocated by task 355 on cpu 3 at 17.022439s:
[   17.032297]  test_alloc+0x1ca/0x750
[   17.032925]  test_invalid_addr_free+0xcb/0x197
[   17.033659]  kunit_try_run_case+0x95/0xd0
[   17.034316]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.035205]  kthread+0x17d/0x1b0
[   17.035776]  ret_from_fork+0x2c/0x50
[   17.036414] 
[   17.036670] CPU: 3 PID: 355 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   17.038203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   17.039521] ==================================================================
[   17.055777]     ok 10 - test_invalid_addr_free-memcache
[   17.056167]     # test_corruption: test_alloc: size=32, gfp=cc0, policy=left, cache=0
[   17.126598] ==================================================================
[   17.127795] BUG: KFENCE: memory corruption in kfree+0x7d/0x120
[   17.127795] 
[   17.128997] Corrupted memory at 0x000000008227ef3d [ ! . . . . . . . . . . . . . . . ] (in kfence-#106):
[   17.130551]  kfree+0x7d/0x120
[   17.131043]  test_corruption+0x101/0x20d
[   17.131690]  kunit_try_run_case+0x95/0xd0
[   17.132348]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.133245]  kthread+0x17d/0x1b0
[   17.133844]  ret_from_fork+0x2c/0x50
[   17.134434] 
[   17.134696] kfence-#106: 0x00000000c6fdad2c-0x00000000c1959aa5, size=32, cache=kmalloc-32
[   17.134696] 
[   17.136579] allocated by task 356 on cpu 2 at 17.126552s:
[   17.137664]  test_alloc+0x1d7/0x750
[   17.138388]  test_corruption+0xce/0x20d
[   17.139165]  kunit_try_run_case+0x95/0xd0
[   17.139968]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.141052]  kthread+0x17d/0x1b0
[   17.141714]  ret_from_fork+0x2c/0x50
[   17.142473] 
[   17.142791] freed by task 356 on cpu 2 at 17.126577s:
[   17.143804]  kfree+0x7d/0x120
[   17.144409]  test_corruption+0x101/0x20d
[   17.145070]  kunit_try_run_case+0x95/0xd0
[   17.145753]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.146656]  kthread+0x17d/0x1b0
[   17.147223]  ret_from_fork+0x2c/0x50
[   17.147827] 
[   17.148087] CPU: 2 PID: 356 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   17.149691] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   17.151083] ==================================================================
[   17.152498]     # test_corruption: EXPECTATION FAILED at mm/kfence/kfence_test.c:433
[   17.152498]     Expected report_matches(&expect) to be true, but is false
[   17.155024]     # test_corruption: test_alloc: size=32, gfp=cc0, policy=right, cache=0
[   17.438516] ==================================================================
[   17.439684] BUG: KFENCE: memory corruption in kfree+0x7d/0x120
[   17.439684] 
[   17.440807] Corrupted memory at 0x00000000d6d8d3f2 [ ! ] (in kfence-#109):
[   17.441868]  kfree+0x7d/0x120
[   17.442337]  test_corruption+0x18a/0x20d
[   17.442950]  kunit_try_run_case+0x95/0xd0
[   17.443574]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.444414]  kthread+0x17d/0x1b0
[   17.444921]  ret_from_fork+0x2c/0x50
[   17.445480] 
[   17.445725] kfence-#109: 0x00000000598b16ca-0x000000005339cecf, size=32, cache=kmalloc-32
[   17.445725] 
[   17.447199] allocated by task 356 on cpu 2 at 17.438460s:
[   17.448025]  test_alloc+0x1d7/0x750
[   17.448625]  test_corruption+0x157/0x20d
[   17.449426]  kunit_try_run_case+0x95/0xd0
[   17.450208]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.451250]  kthread+0x17d/0x1b0
[   17.451891]  ret_from_fork+0x2c/0x50
[   17.452605] 
[   17.452932] freed by task 356 on cpu 2 at 17.438482s:
[   17.453916]  kfree+0x7d/0x120
[   17.454533]  test_corruption+0x18a/0x20d
[   17.455339]  kunit_try_run_case+0x95/0xd0
[   17.456070]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.456950]  kthread+0x17d/0x1b0
[   17.457467]  ret_from_fork+0x2c/0x50
[   17.458032] 
[   17.458280] CPU: 2 PID: 356 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   17.459744] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   17.461027] ==================================================================
[   17.462278]     # test_corruption: EXPECTATION FAILED at mm/kfence/kfence_test.c:439
[   17.462278]     Expected report_matches(&expect) to be true, but is false
[   17.464571]     not ok 11 - test_corruption
[   17.465030]     # test_corruption-memcache: setup_test_cache: size=32, ctor=0x0
[   17.468606]     # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1
[   17.854394] ==================================================================
[   17.856971] BUG: KFENCE: memory corruption in test_corruption+0xf7/0x20d
[   17.856971] 
[   17.858249] Corrupted memory at 0x000000006e7faa4e [ ! . . . . . . . . . . . . . . . ] (in kfence-#113):
[   17.859773]  test_corruption+0xf7/0x20d
[   17.860381]  kunit_try_run_case+0x95/0xd0
[   17.861247]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.862357]  kthread+0x17d/0x1b0
[   17.863019]  ret_from_fork+0x2c/0x50
[   17.863582] 
[   17.863834] kfence-#113: 0x00000000aa47e265-0x00000000ce908fe3, size=32, cache=test
[   17.863834] 
[   17.865238] allocated by task 358 on cpu 3 at 17.854346s:
[   17.866074]  test_alloc+0x1ca/0x750
[   17.866625]  test_corruption+0xce/0x20d
[   17.867224]  kunit_try_run_case+0x95/0xd0
[   17.867829]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.868700]  kthread+0x17d/0x1b0
[   17.869230]  ret_from_fork+0x2c/0x50
[   17.869813] 
[   17.870067] freed by task 358 on cpu 3 at 17.854374s:
[   17.870881]  test_corruption+0xf7/0x20d
[   17.871501]  kunit_try_run_case+0x95/0xd0
[   17.872150]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.873035]  kthread+0x17d/0x1b0
[   17.873561]  ret_from_fork+0x2c/0x50
[   17.874142] 
[   17.874398] CPU: 3 PID: 358 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   17.875910] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   17.877254] ==================================================================
[   17.878445]     # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1
[   17.958446] ==================================================================
[   17.959687] BUG: KFENCE: memory corruption in test_corruption+0x180/0x20d
[   17.959687] 
[   17.961012] Corrupted memory at 0x00000000dea0a0ee [ ! ] (in kfence-#114):
[   17.962103]  test_corruption+0x180/0x20d
[   17.962734]  kunit_try_run_case+0x95/0xd0
[   17.963381]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.964237]  kthread+0x17d/0x1b0
[   17.964773]  ret_from_fork+0x2c/0x50
[   17.965351] 
[   17.965603] kfence-#114: 0x00000000fb872493-0x00000000c28bf510, size=32, cache=test
[   17.965603] 
[   17.967025] allocated by task 358 on cpu 3 at 17.958383s:
[   17.967883]  test_alloc+0x1ca/0x750
[   17.968454]  test_corruption+0x157/0x20d
[   17.969080]  kunit_try_run_case+0x95/0xd0
[   17.969726]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.970583]  kthread+0x17d/0x1b0
[   17.971106]  ret_from_fork+0x2c/0x50
[   17.971682] 
[   17.971934] freed by task 358 on cpu 3 at 17.958412s:
[   17.972763]  test_corruption+0x180/0x20d
[   17.973394]  kunit_try_run_case+0x95/0xd0
[   17.974038]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   17.974895]  kthread+0x17d/0x1b0
[   17.975417]  ret_from_fork+0x2c/0x50
[   17.975994] 
[   17.976249] CPU: 3 PID: 358 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   17.977763] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   17.979069] ==================================================================
[   17.999856]     ok 12 - test_corruption-memcache
[   18.000319]     # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=right, cache=0
[   18.166475]     # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=none, cache=0
[   18.167777]     # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=left, cache=0
[   18.287822]     # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=none, cache=0
[   18.289209]     # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=none, cache=0
[   18.290644]     # test_free_bulk: test_alloc: size=208, gfp=cc0, policy=right, cache=0
[   18.478560]     # test_free_bulk: test_alloc: size=208, gfp=cc0, policy=none, cache=0
[   18.480383]     # test_free_bulk: test_alloc: size=208, gfp=cc0, policy=left, cache=0
[   18.582481]     # test_free_bulk: test_alloc: size=208, gfp=cc0, policy=none, cache=0
[   18.583787]     # test_free_bulk: test_alloc: size=208, gfp=cc0, policy=none, cache=0
[   18.589732]     # test_free_bulk: test_alloc: size=37, gfp=cc0, policy=right, cache=0
[   18.998570]     # test_free_bulk: test_alloc: size=37, gfp=cc0, policy=none, cache=0
[   18.999885]     # test_free_bulk: test_alloc: size=37, gfp=cc0, policy=left, cache=0
[   19.206527]     # test_free_bulk: test_alloc: size=37, gfp=cc0, policy=none, cache=0
[   19.207820]     # test_free_bulk: test_alloc: size=37, gfp=cc0, policy=none, cache=0
[   19.209121]     # test_free_bulk: test_alloc: size=280, gfp=cc0, policy=right, cache=0
[   19.518523]     # test_free_bulk: test_alloc: size=280, gfp=cc0, policy=none, cache=0
[   19.521202]     # test_free_bulk: test_alloc: size=280, gfp=cc0, policy=left, cache=0
[   19.934517]     # test_free_bulk: test_alloc: size=280, gfp=cc0, policy=none, cache=0
[   19.936394]     # test_free_bulk: test_alloc: size=280, gfp=cc0, policy=none, cache=0
[   19.938139]     # test_free_bulk: test_alloc: size=99, gfp=cc0, policy=right, cache=0
[   20.142437]     # test_free_bulk: test_alloc: size=99, gfp=cc0, policy=none, cache=0
[   20.143740]     # test_free_bulk: test_alloc: size=99, gfp=cc0, policy=left, cache=0
[   20.246439]     # test_free_bulk: test_alloc: size=99, gfp=cc0, policy=none, cache=0
[   20.250764]     # test_free_bulk: test_alloc: size=99, gfp=cc0, policy=none, cache=0
[   20.252157]     ok 13 - test_free_bulk
[   20.252766]     # test_free_bulk-memcache: setup_test_cache: size=27, ctor=0x0
[   20.257874]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=right, cache=1
[   20.350461]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=none, cache=1
[   20.351813]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=left, cache=1
[   20.454530]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=none, cache=1
[   20.455898]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=none, cache=1
[   20.463787]     # test_free_bulk-memcache: setup_test_cache: size=27, ctor=ctor_set_x
[   20.465392]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=right, cache=1
[   20.766526]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=none, cache=1
[   20.768021]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=left, cache=1
[   20.974489]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=none, cache=1
[   20.979068]     # test_free_bulk-memcache: test_alloc: size=27, gfp=cc0, policy=none, cache=1
[   20.991180]     # test_free_bulk-memcache: setup_test_cache: size=19, ctor=0x0
[   20.992670]     # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=right, cache=1
[   21.182463]     # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=none, cache=1
[   21.183874]     # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=left, cache=1
[   21.286489]     # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=none, cache=1
[   21.288108]     # test_free_bulk-memcache: test_alloc: size=19, gfp=cc0, policy=none, cache=1
[   21.296880]     # test_free_bulk-memcache: setup_test_cache: size=106, ctor=ctor_set_x
[   21.298522]     # test_free_bulk-memcache: test_alloc: size=106, gfp=cc0, policy=right, cache=1
[   21.702530]     # test_free_bulk-memcache: test_alloc: size=106, gfp=cc0, policy=none, cache=1
[   21.704063]     # test_free_bulk-memcache: test_alloc: size=106, gfp=cc0, policy=left, cache=1
[   21.806446]     # test_free_bulk-memcache: test_alloc: size=106, gfp=cc0, policy=none, cache=1
[   21.807815]     # test_free_bulk-memcache: test_alloc: size=106, gfp=cc0, policy=none, cache=1
[   21.828533]     # test_free_bulk-memcache: setup_test_cache: size=279, ctor=0x0
[   21.829995]     # test_free_bulk-memcache: test_alloc: size=279, gfp=cc0, policy=right, cache=1
[   21.910455]     # test_free_bulk-memcache: test_alloc: size=279, gfp=cc0, policy=none, cache=1
[   21.911930]     # test_free_bulk-memcache: test_alloc: size=279, gfp=cc0, policy=left, cache=1
[   22.014427]     # test_free_bulk-memcache: test_alloc: size=279, gfp=cc0, policy=none, cache=1
[   22.019536]     # test_free_bulk-memcache: test_alloc: size=279, gfp=cc0, policy=none, cache=1
[   22.033331]     ok 14 - test_free_bulk-memcache
[   22.033667]     ok 15 - test_init_on_free # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON)
[   22.034846]     ok 16 - test_init_on_free-memcache # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON)
[   22.036660]     # test_kmalloc_aligned_oob_read: test_alloc: size=73, gfp=cc0, policy=right, cache=0
[   22.118450] ==================================================================
[   22.119687] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x188/0x22d
[   22.119687] 
[   22.121265] Out-of-bounds read at 0x000000007b59e5bc (81B right of kfence-#154):
[   22.122448]  test_kmalloc_aligned_oob_read+0x188/0x22d
[   22.123300]  kunit_try_run_case+0x95/0xd0
[   22.123956]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   22.124841]  kthread+0x17d/0x1b0
[   22.125371]  ret_from_fork+0x2c/0x50
[   22.125958] 
[   22.126216] kfence-#154: 0x0000000055dee408-0x00000000bb8e3b76, size=73, cache=kmalloc-96
[   22.126216] 
[   22.127745] allocated by task 363 on cpu 2 at 22.118421s:
[   22.128637]  test_alloc+0x1d7/0x750
[   22.129210]  test_kmalloc_aligned_oob_read+0xce/0x22d
[   22.130017]  kunit_try_run_case+0x95/0xd0
[   22.130666]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   22.131526]  kthread+0x17d/0x1b0
[   22.132049]  ret_from_fork+0x2c/0x50
[   22.132731] 
[   22.132982] CPU: 2 PID: 363 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   22.134461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   22.135757] ==================================================================
[   22.137028]     ok 17 - test_kmalloc_aligned_oob_read
[   22.137365]     # test_kmalloc_aligned_oob_write: test_alloc: size=73, gfp=cc0, policy=right, cache=0
[   22.222542] ==================================================================
[   22.223673] BUG: KFENCE: memory corruption in kfree+0x7d/0x120
[   22.223673] 
[   22.224750] Corrupted memory at 0x00000000454ab5aa [ ! . . . . . . ] (in kfence-#155):
[   22.225921]  kfree+0x7d/0x120
[   22.226367]  test_kmalloc_aligned_oob_write+0x12e/0x1af
[   22.227137]  kunit_try_run_case+0x95/0xd0
[   22.227732]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   22.228540]  kthread+0x17d/0x1b0
[   22.229025]  ret_from_fork+0x2c/0x50
[   22.229558] 
[   22.229792] kfence-#155: 0x000000008cc85289-0x00000000fdd3df4d, size=73, cache=kmalloc-96
[   22.229792] 
[   22.231188] allocated by task 364 on cpu 3 at 22.222490s:
[   22.231982]  test_alloc+0x1d7/0x750
[   22.232514]  test_kmalloc_aligned_oob_write+0xae/0x1af
[   22.233276]  kunit_try_run_case+0x95/0xd0
[   22.233871]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   22.234660]  kthread+0x17d/0x1b0
[   22.235142]  ret_from_fork+0x2c/0x50
[   22.235673] 
[   22.235907] freed by task 364 on cpu 3 at 22.222511s:
[   22.236663]  kfree+0x7d/0x120
[   22.237114]  test_kmalloc_aligned_oob_write+0x12e/0x1af
[   22.238001]  kunit_try_run_case+0x95/0xd0
[   22.238663]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   22.239540]  kthread+0x17d/0x1b0
[   22.240072]  ret_from_fork+0x2c/0x50
[   22.240688] 
[   22.240947] CPU: 3 PID: 364 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   22.242468] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   22.243797] ==================================================================
[   22.245053]     # test_kmalloc_aligned_oob_write: EXPECTATION FAILED at mm/kfence/kfence_test.c:505
[   22.245053]     Expected report_matches(&expect) to be true, but is false
[   22.247690]     not ok 18 - test_kmalloc_aligned_oob_write
[   22.248007]     # test_shrink_memcache: setup_test_cache: size=32, ctor=0x0
[   22.250346]     # test_shrink_memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1
[   22.331560]     ok 19 - test_shrink_memcache
[   22.331901]     # test_memcache_ctor: setup_test_cache: size=32, ctor=ctor_set_x
[   22.334145]     # test_memcache_ctor: test_alloc: size=32, gfp=cc0, policy=any, cache=1
[   22.435915]     ok 20 - test_memcache_ctor
[   22.436237] ==================================================================
[   22.438171] BUG: KFENCE: invalid read in test_invalid_access+0xaf/0x140
[   22.438171] 
[   22.439450] Invalid read at 0x00000000ca287e6c:
[   22.440123]  test_invalid_access+0xaf/0x140
[   22.440833]  kunit_try_run_case+0x95/0xd0
[   22.441504]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   22.442673]  kthread+0x17d/0x1b0
[   22.443501]  ret_from_fork+0x2c/0x50
[   22.444426] 
[   22.444929] CPU: 2 PID: 367 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   22.447337] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   22.449414] ==================================================================
[   22.450777]     ok 21 - test_invalid_access
[   22.451041]     # test_gfpzero: test_alloc: size=4096, gfp=cc0, policy=any, cache=0
[   22.534486]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   22.638592]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   22.742494]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   22.846468]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   22.950432]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.054591]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.158443]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.262556]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.366495]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.470478]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.574476]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.678502]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.782501]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.886458]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   23.990483]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   24.094494]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   24.198590]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   24.302503]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   24.406446]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   24.510436]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   24.614453]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   24.718477]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   24.822574]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   24.926579]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.030465]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.134513]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.238471]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.342560]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.446481]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.550447]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.654405]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.758596]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.862464]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   25.966475]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   26.070501]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   26.174532]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   26.278472]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   26.382506]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   26.486381]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   26.590418]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   26.694461]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   26.798500]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   26.902416]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.006440]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.110436]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.214428]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.318469]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.422451]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.526432]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.630456]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.734406]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.838447]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   27.942405]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.046404]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.150458]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.254418]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.358563]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.462492]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.566511]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.670486]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.774485]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.878601]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   28.982442]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   29.086414]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   29.190410]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   29.294425]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   29.398422]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   29.502505]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   29.606472]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   29.710443]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   29.814471]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   29.918537]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.022419]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.126471]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.230555]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.334613]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.438472]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.542488]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.646527]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.750453]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.854474]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   30.958440]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.062428]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.166607]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.270481]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.374441]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.478443]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.582585]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.686442]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.790505]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.894473]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   31.998501]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   32.102480]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   32.206481]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   32.310511]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   32.414475]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   32.518472]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   32.622480]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   32.726477]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   32.830619]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   32.934517]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.038452]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.142446]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.246468]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.350454]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.454504]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.558409]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.662453]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.766529]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.870484]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   33.974490]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   34.078444]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   34.182486]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   34.286564]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   34.390481]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   34.494486]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   34.598500]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   34.702548]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   34.806531]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   34.910578]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.014479]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.118544]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.222679]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.326511]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.430634]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.534632]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.638464]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.742510]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.846497]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   35.950682]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.054496]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.158430]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.262408]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.366440]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.470486]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.574484]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.678454]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.782518]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.886414]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   36.990418]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   37.094417]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   37.198418]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   37.302642]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   37.406601]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   37.510494]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   37.614475]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   37.718489]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   37.822441]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   37.926456]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.030469]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.134462]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.238501]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.342406]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.446634]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.550418]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.654489]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.758603]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.862472]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   38.966440]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   39.070404]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   39.174413]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   39.278458]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   39.382503]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   39.486469]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   39.590433]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   39.694410]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   39.798495]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   39.902461]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.006458]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.110441]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.214494]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.318479]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.422527]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.526552]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.630458]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.734455]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.838492]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   40.942424]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.046509]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.150479]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.254435]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.358486]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.462462]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.566449]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.670517]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.774457]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.878527]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   41.982444]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   42.086406]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   42.190535]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   42.294490]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   42.398396]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   42.502410]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   42.606470]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   42.710465]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   42.814517]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   42.918430]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.022470]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.126496]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.230424]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.334427]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.438433]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.542380]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.646490]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.750396]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.854449]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   43.958483]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.062464]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.166444]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.270515]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.374498]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.478478]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.582457]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.686603]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.790461]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.894513]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   44.998485]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   45.102439]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   45.207469]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   45.310454]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   45.414562]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   45.518609]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   45.622449]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   45.726445]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   45.830487]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   45.934612]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.038449]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.142446]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.246443]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.350440]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.454440]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.558458]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.662505]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.766457]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.870447]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   46.974422]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   47.078444]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   47.182439]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   47.286461]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   47.390444]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   47.494440]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   47.598449]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   47.702420]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   47.806399]     # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0
[   47.910539]     ok 22 - test_gfpzero
[   47.910898]     # test_memcache_typesafe_by_rcu: setup_test_cache: size=32, ctor=0x0
[   47.913401]     # test_memcache_typesafe_by_rcu: test_alloc: size=32, gfp=cc0, policy=any, cache=1
[   48.020341] ==================================================================
[   48.022085] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu.cold+0xd0/0x208
[   48.022085] 
[   48.024404] Use-after-free read at 0x00000000f55b8dd7 (in kfence-#159):
[   48.025953]  test_memcache_typesafe_by_rcu.cold+0xd0/0x208
[   48.027236]  kunit_try_run_case+0x95/0xd0
[   48.028189]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.029475]  kthread+0x17d/0x1b0
[   48.030253]  ret_from_fork+0x2c/0x50
[   48.031108] 
[   48.031482] kfence-#159: 0x00000000f55b8dd7-0x000000000f38ceb6, size=32, cache=test
[   48.031482] 
[   48.033614] allocated by task 369 on cpu 2 at 48.014358s:
[   48.034895]  test_alloc+0x1ca/0x750
[   48.035734]  test_memcache_typesafe_by_rcu.cold+0x2d/0x208
[   48.037079]  kunit_try_run_case+0x95/0xd0
[   48.038001]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.039230]  kthread+0x17d/0x1b0
[   48.039982]  ret_from_fork+0x2c/0x50
[   48.040807] 
[   48.041193] freed by task 0 on cpu 2 at 48.020286s:
[   48.042093]  rcu_guarded_free+0x2e/0x40
[   48.042663]  rcu_core+0x468/0xfb0
[   48.043159]  rcu_core_si+0x12/0x20
[   48.043665]  __do_softirq+0x152/0x4f6
[   48.044210]  __irq_exit_rcu+0xf6/0x140
[   48.044767]  irq_exit_rcu+0x12/0x30
[   48.045301]  sysvec_apic_timer_interrupt+0xa5/0xc0
[   48.046007]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   48.046761]  default_idle+0x18/0x20
[   48.047279]  arch_cpu_idle+0x19/0x20
[   48.047809]  default_idle_call+0x77/0x1a0
[   48.048403]  do_idle+0x35b/0x410
[   48.048884]  cpu_startup_entry+0x24/0x30
[   48.049476]  start_secondary+0x1be/0x1e0
[   48.050058]  secondary_startup_64_no_verify+0xe0/0xeb
[   48.050795] 
[   48.051031] CPU: 2 PID: 369 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   48.052407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   48.053637] ==================================================================
[   48.056878]     ok 23 - test_memcache_typesafe_by_rcu
[   48.056991] kunit_try_catch (369) used greatest stack depth: 27232 bytes left
[   48.058013]     # test_krealloc: test_alloc: size=32, gfp=cc0, policy=any, cache=0
[   48.118408] ==================================================================
[   48.119696] BUG: KFENCE: use-after-free read in test_krealloc+0x412/0x4a7
[   48.119696] 
[   48.121062] Use-after-free read at 0x0000000031c2315d (in kfence-#160):
[   48.122141]  test_krealloc+0x412/0x4a7
[   48.122769]  kunit_try_run_case+0x95/0xd0
[   48.123434]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.124332]  kthread+0x17d/0x1b0
[   48.124880]  ret_from_fork+0x2c/0x50
[   48.125449] 
[   48.125692] kfence-#160: 0x0000000031c2315d-0x00000000bb42af23, size=32, cache=kmalloc-32
[   48.125692] 
[   48.127155] allocated by task 370 on cpu 3 at 48.118336s:
[   48.127987]  test_alloc+0x1d7/0x750
[   48.128529]  test_krealloc+0xbb/0x4a7
[   48.129165]  kunit_try_run_case+0x95/0xd0
[   48.129791]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.130622]  kthread+0x17d/0x1b0
[   48.131129]  ret_from_fork+0x2c/0x50
[   48.131689] 
[   48.131937] freed by task 370 on cpu 3 at 48.118370s:
[   48.132716]  kfree+0x7d/0x120
[   48.133193]  krealloc+0x76/0x110
[   48.133696]  test_krealloc+0x18c/0x4a7
[   48.134279]  kunit_try_run_case+0x95/0xd0
[   48.134901]  kunit_generic_run_threadfn_adapter+0x33/0x50
[   48.135729]  kthread+0x17d/0x1b0
[   48.136234]  ret_from_fork+0x2c/0x50
[   48.136790] 
[   48.137109] CPU: 3 PID: 370 Comm: kunit_try_catch Tainted: G    B            N 6.1.0-rc5-next-20221117 #1
[   48.139164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[   48.140519] ==================================================================
[   48.141701]     ok 24 - test_krealloc
[   48.141745] kunit_try_catch (370) used greatest stack depth: 27184 bytes left
[   48.142046]     # test_memcache_alloc_bulk: setup_test_cache: size=32, ctor=0x0
[   48.226011]     ok 25 - test_memcache_alloc_bulk
[   48.228376] # kfence: pass:19 fail:4 skip:2 total:25
[   48.229690] # Totals: pass:19 fail:4 skip:2 total:25
[   48.231068] not ok 6 - kfence
[   48.233335]     # Subtest: binfmt_elf
[   48.233344]     1..1
[   48.234644]     ok 1 - total_mapping_size_test
[   48.235246] ok 7 - binfmt_elf
[   48.237282]     # Subtest: compat_binfmt_elf
[   48.237294]     1..1
[   48.238761]     ok 1 - total_mapping_size_test
[   48.239403] ok 8 - compat_binfmt_elf
[   48.241613]     # Subtest: ext4_inode_test
[   48.241622]     1..1
[   48.242292]         # Subtest: inode_test_xtimestamp_decoding
[   48.242987]         ok 1 - 1901-12-13 Lower bound of 32bit < 0 timestamp, no extra bits
[   48.244242]         ok 2 - 1969-12-31 Upper bound of 32bit < 0 timestamp, no extra bits
[   48.246089]         ok 3 - 1970-01-01 Lower bound of 32bit >=0 timestamp, no extra bits
[   48.247749]         ok 4 - 2038-01-19 Upper bound of 32bit >=0 timestamp, no extra bits
[   48.249331]         ok 5 - 2038-01-19 Lower bound of 32bit <0 timestamp, lo extra sec bit on
[   48.250915]         ok 6 - 2106-02-07 Upper bound of 32bit <0 timestamp, lo extra sec bit on
[   48.252502]         ok 7 - 2106-02-07 Lower bound of 32bit >=0 timestamp, lo extra sec bit on
[   48.254211]         ok 8 - 2174-02-25 Upper bound of 32bit >=0 timestamp, lo extra sec bit on
[   48.255942]         ok 9 - 2174-02-25 Lower bound of 32bit <0 timestamp, hi extra sec bit on
[   48.257542]         ok 10 - 2242-03-16 Upper bound of 32bit <0 timestamp, hi extra sec bit on
[   48.259106]         ok 11 - 2242-03-16 Lower bound of 32bit >=0 timestamp, hi extra sec bit on
[   48.260658]         ok 12 - 2310-04-04 Upper bound of 32bit >=0 timestamp, hi extra sec bit on
[   48.262276]         ok 13 - 2310-04-04 Upper bound of 32bit>=0 timestamp, hi extra sec bit 1. 1 ns
[   48.263849]         ok 14 - 2378-04-22 Lower bound of 32bit>= timestamp. Extra sec bits 1. Max ns
[   48.265464]         ok 15 - 2378-04-22 Lower bound of 32bit >=0 timestamp. All extra sec bits on
[   48.267162]         ok 16 - 2446-05-10 Upper bound of 32bit >=0 timestamp. All extra sec bits on
[   48.268556]     # inode_test_xtimestamp_decoding: pass:16 fail:0 skip:0 total:16
[   48.269959]     ok 1 - inode_test_xtimestamp_decoding
[   48.271147] # Totals: pass:16 fail:0 skip:0 total:16
[   48.271964] ok 9 - ext4_inode_test
[   48.273427]     # Subtest: fat_test
[   48.273433]     1..3
[   48.274241]     ok 1 - fat_checksum_test
[   48.274644]         # Subtest: fat_time_fat2unix_test
[   48.275513]         ok 1 - Earliest possible UTC (1980-01-01 00:00:00)
[   48.276543]         ok 2 - Latest possible UTC (2107-12-31 23:59:58)
[   48.277856]         ok 3 - Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC)
[   48.279049]         ok 4 - Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC)
[   48.280495]         ok 5 - Leap Day / Year (1996-02-29 00:00:00)
[   48.281873]         ok 6 - Year 2000 is leap year (2000-02-29 00:00:00)
[   48.283021]         ok 7 - Year 2100 not leap year (2100-03-01 00:00:00)
[   48.284359]         ok 8 - Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC)
[   48.285866]         ok 9 - Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC)
[   48.287346]         ok 10 - VFAT odd-second resolution (1999-12-31 23:59:59)
[   48.288671]         ok 11 - VFAT 10ms resolution (1980-01-01 00:00:00:0010)
[   48.289847]     # fat_time_fat2unix_test: pass:11 fail:0 skip:0 total:11
[   48.290975]     ok 2 - fat_time_fat2unix_test
[   48.292057]         # Subtest: fat_time_unix2fat_test
[   48.292984]         ok 1 - Earliest possible UTC (1980-01-01 00:00:00)
[   48.294010]         ok 2 - Latest possible UTC (2107-12-31 23:59:58)
[   48.295269]         ok 3 - Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC)
[   48.296526]         ok 4 - Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC)
[   48.297976]         ok 5 - Leap Day / Year (1996-02-29 00:00:00)
[   48.299428]         ok 6 - Year 2000 is leap year (2000-02-29 00:00:00)
[   48.300599]         ok 7 - Year 2100 not leap year (2100-03-01 00:00:00)
[   48.301911]         ok 8 - Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC)
[   48.303217]         ok 9 - Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC)
[   48.304654]         ok 10 - VFAT odd-second resolution (1999-12-31 23:59:59)
[   48.306113]         ok 11 - VFAT 10ms resolution (1980-01-01 00:00:00:0010)
[   48.307264]     # fat_time_unix2fat_test: pass:11 fail:0 skip:0 total:11
[   48.308394]     ok 3 - fat_time_unix2fat_test
[   48.309501] # fat_test: pass:3 fail:0 skip:0 total:3
[   48.310204] # Totals: pass:23 fail:0 skip:0 total:23
[   48.311014] ok 10 - fat_test
[   48.312508]     # Subtest: cpumask
[   48.312514]     1..6
[   48.313336]     ok 1 - test_cpumask_weight
[   48.314025]     ok 2 - test_cpumask_first
[   48.314886]     ok 3 - test_cpumask_last
[   48.315770]     ok 4 - test_cpumask_next
[   48.316636]     ok 5 - test_cpumask_iterators
[   48.317690]     ok 6 - test_cpumask_iterators_builtin
[   48.318690] # cpumask: pass:6 fail:0 skip:0 total:6
[   48.319729] # Totals: pass:6 fail:0 skip:0 total:6
[   48.320529] ok 11 - cpumask
[   48.321861]     # Subtest: hash
[   48.321867]     1..2
[   48.323336]     ok 1 - test_string_or
[   48.340643]     ok 2 - test_hash_or
[   48.341386] # hash: pass:2 fail:0 skip:0 total:2
[   48.341963] # Totals: pass:2 fail:0 skip:0 total:2
[   48.342741] ok 12 - hash
[   48.344288]     # Subtest: list_sort
[   48.344297]     1..1
[   48.353499]     ok 1 - list_sort_test
[   48.353926] ok 13 - list_sort
[   48.355070]     # Subtest: lib_sort
[   48.355075]     1..1
[   48.356393]     ok 1 - test_sort
[   48.356773] ok 14 - lib_sort
[   48.357875]     # Subtest: kprobes_test
[   48.357881]     1..6
[   48.365541]     ok 1 - test_kprobe
[   48.376118]     ok 2 - test_kprobes
[   48.383336]     ok 3 - test_kretprobe
[   48.396695]     ok 4 - test_kretprobes
[   48.404313]     ok 5 - test_stacktrace_on_kretprobe
[   48.419020]     ok 6 - test_stacktrace_on_nested_kretprobe
[   48.420370] # kprobes_test: pass:6 fail:0 skip:0 total:6
[   48.421802] # Totals: pass:6 fail:0 skip:0 total:6
[   48.423210] ok 15 - kprobes_test
[   48.425407]     # Subtest: kunit_executor_test
[   48.425418]     1..4
[   48.427028]     ok 1 - parse_filter_test
[   48.427994]     ok 2 - filter_suites_test
[   48.429054]     ok 3 - filter_suites_test_glob_test
[   48.430092]     ok 4 - filter_suites_to_empty_test
[   48.430983] # kunit_executor_test: pass:4 fail:0 skip:0 total:4
[   48.431965] # Totals: pass:4 fail:0 skip:0 total:4
[   48.433110] ok 16 - kunit_executor_test
[   48.434700]     # Subtest: kunit-try-catch-test
[   48.434706]     1..2
[   48.436012]     ok 1 - kunit_test_try_catch_successful_try_no_catch
[   48.436920]     ok 2 - kunit_test_try_catch_unsuccessful_try_does_catch
[   48.438035] # kunit-try-catch-test: pass:2 fail:0 skip:0 total:2
[   48.439128] # Totals: pass:2 fail:0 skip:0 total:2
[   48.440144] ok 17 - kunit-try-catch-test
[   48.441739]     # Subtest: kunit-resource-test
[   48.441746]     1..8
[   48.442719]     ok 1 - kunit_resource_test_init_resources
[   48.443407]     ok 2 - kunit_resource_test_alloc_resource
[   48.444534]     ok 3 - kunit_resource_test_destroy_resource
[   48.445770]     ok 4 - kunit_resource_test_remove_resource
[   48.447123]     ok 5 - kunit_resource_test_cleanup_resources
[   48.448454]     ok 6 - kunit_resource_test_proper_free_ordering
[   48.449617]     ok 7 - kunit_resource_test_static
[   48.450925]     ok 8 - kunit_resource_test_named
[   48.451872] # kunit-resource-test: pass:8 fail:0 skip:0 total:8
[   48.452794] # Totals: pass:8 fail:0 skip:0 total:8
[   48.453833] ok 18 - kunit-resource-test
[   48.455411]     # Subtest: kunit-log-test
[   48.455418]     1..1
[   48.456352] put this in log.
[   48.457347] this too.
[   48.458423] add to suite log.
[   48.459234] along with this.
[   48.460436]     ok 1 - kunit_log_test
[   48.460948] ok 19 - kunit-log-test
[   48.462181]     # Subtest: kunit_status
[   48.462186]     1..2
[   48.463107]     ok 1 - kunit_status_set_failure_test
[   48.463758]     ok 2 - kunit_status_mark_skipped_test
[   48.465082] # kunit_status: pass:2 fail:0 skip:0 total:2
[   48.466395] # Totals: pass:2 fail:0 skip:0 total:2
[   48.467862] ok 20 - kunit_status
[   48.470507]     # Subtest: string-stream-test
[   48.470520]     1..3
[   48.472027]     ok 1 - string_stream_test_empty_on_creation
[   48.473043]     ok 2 - string_stream_test_not_empty_after_add
[   48.474401]     ok 3 - string_stream_test_get_string
[   48.475353] # string-stream-test: pass:3 fail:0 skip:0 total:3
[   48.476158] # Totals: pass:3 fail:0 skip:0 total:3
[   48.477139] ok 21 - string-stream-test
[   48.478616]     # example: initializing suite
[   48.479336]     # Subtest: example
[   48.479341]     1..4
[   48.480101]     # example_simple_test: initializing
[   48.481718]     ok 1 - example_simple_test
[   48.481956]     # example_skip_test: initializing
[   48.484643]     # example_skip_test: You should not see a line below.
[   48.484713]     ok 2 - example_skip_test # SKIP this test should be skipped
[   48.486075]     # example_mark_skipped_test: initializing
[   48.489687]     # example_mark_skipped_test: You should see a line below.
[   48.489701]     # example_mark_skipped_test: You should see this line.
[   48.491685]     ok 3 - example_mark_skipped_test # SKIP this test should be skipped
[   48.494310]     # example_all_expect_macros_test: initializing
[   48.498330]     ok 4 - example_all_expect_macros_test
[   48.498356] # example: pass:2 fail:0 skip:2 total:4
[   48.499716] # Totals: pass:2 fail:0 skip:2 total:4
[   48.500986] ok 22 - example
[   48.503071]     # Subtest: rational
[   48.503080]     1..1
[   48.504001]         # Subtest: rational_test
[   48.504883]         ok 1 - Exceeds bounds, semi-convergent term > 1/2 last term
[   48.506429]         ok 2 - Exceeds bounds, semi-convergent term < 1/2 last term
[   48.508351]         ok 3 - Closest to zero
[   48.509757]         ok 4 - Closest to smallest non-zero
[   48.510694]         ok 5 - Use convergent
[   48.511795]         ok 6 - Exact answer
[   48.512711]         ok 7 - Semiconvergent, numerator limit
[   48.513576]         ok 8 - Semiconvergent, denominator limit
[   48.514466]     # rational_test: pass:8 fail:0 skip:0 total:8
[   48.515375]     ok 1 - rational_test
[   48.516278] # Totals: pass:8 fail:0 skip:0 total:8
[   48.516844] ok 23 - rational
[   48.519814]     # Subtest: bitfields
[   48.519828]     1..2
[   48.521591]     ok 1 - test_bitfields_constants
[   48.522783]     ok 2 - test_bitfields_variables
[   48.524482] # bitfields: pass:2 fail:0 skip:0 total:2
[   48.525850] # Totals: pass:2 fail:0 skip:0 total:2
[   48.526702] ok 24 - bitfields
[   48.528220]     # Subtest: list-kunit-test
[   48.528226]     1..39
[   48.529182]     ok 1 - list_test_list_init
[   48.529770]     ok 2 - list_test_list_add
[   48.530754]     ok 3 - list_test_list_add_tail
[   48.531686]     ok 4 - list_test_list_del
[   48.532646]     ok 5 - list_test_list_replace
[   48.533526]     ok 6 - list_test_list_replace_init
[   48.534500]     ok 7 - list_test_list_swap
[   48.535515]     ok 8 - list_test_list_del_init
[   48.536468]     ok 9 - list_test_list_del_init_careful
[   48.537411]     ok 10 - list_test_list_move
[   48.538563]     ok 11 - list_test_list_move_tail
[   48.539527]     ok 12 - list_test_list_bulk_move_tail
[   48.540521]     ok 13 - list_test_list_is_head
[   48.541593]     ok 14 - list_test_list_is_first
[   48.542610]     ok 15 - list_test_list_is_last
[   48.543689]     ok 16 - list_test_list_empty
[   48.544662]     ok 17 - list_test_list_empty_careful
[   48.545632]     ok 18 - list_test_list_rotate_left
[   48.546687]     ok 19 - list_test_list_rotate_to_front
[   48.547677]     ok 20 - list_test_list_is_singular
[   48.548782]     ok 21 - list_test_list_cut_position
[   48.549795]     ok 22 - list_test_list_cut_before
[   48.550810]     ok 23 - list_test_list_splice
[   48.551800]     ok 24 - list_test_list_splice_tail
[   48.552730]     ok 25 - list_test_list_splice_init
[   48.553711]     ok 26 - list_test_list_splice_tail_init
[   48.554673]     ok 27 - list_test_list_entry
[   48.555749]     ok 28 - list_test_list_entry_is_head
[   48.556673]     ok 29 - list_test_list_first_entry
[   48.557744]     ok 30 - list_test_list_last_entry
[   48.558704]     ok 31 - list_test_list_first_entry_or_null
[   48.559683]     ok 32 - list_test_list_next_entry
[   48.560747]     ok 33 - list_test_list_prev_entry
[   48.561690]     ok 34 - list_test_list_for_each
[   48.562648]     ok 35 - list_test_list_for_each_prev
[   48.563578]     ok 36 - list_test_list_for_each_safe
[   48.564572]     ok 37 - list_test_list_for_each_prev_safe
[   48.565584]     ok 38 - list_test_list_for_each_entry
[   48.566645]     ok 39 - list_test_list_for_each_entry_reverse
[   48.567495] # list-kunit-test: pass:39 fail:0 skip:0 total:39
[   48.568411] # Totals: pass:39 fail:0 skip:0 total:39
[   48.569340] ok 25 - list-kunit-test
[   48.570794]     # Subtest: hlist
[   48.570799]     1..18
[   48.571538]     ok 1 - hlist_test_init
[   48.572126]     ok 2 - hlist_test_unhashed
[   48.572977]     ok 3 - hlist_test_unhashed_lockless
[   48.573864]     ok 4 - hlist_test_del
[   48.574856]     ok 5 - hlist_test_del_init
[   48.575653]     ok 6 - hlist_test_add
[   48.576500]     ok 7 - hlist_test_fake
[   48.577298]     ok 8 - hlist_test_is_singular_node
[   48.578058]     ok 9 - hlist_test_empty
[   48.579002]     ok 10 - hlist_test_move_list
[   48.579831]     ok 11 - hlist_test_entry
[   48.580719]     ok 12 - hlist_test_entry_safe
[   48.581563]     ok 13 - hlist_test_for_each
[   48.582462]     ok 14 - hlist_test_for_each_safe
[   48.583321]     ok 15 - hlist_test_for_each_entry
[   48.584226]     ok 16 - hlist_test_for_each_entry_continue
[   48.585186]     ok 17 - hlist_test_for_each_entry_from
[   48.586309]     ok 18 - hlist_test_for_each_entry_safe
[   48.587125] # hlist: pass:18 fail:0 skip:0 total:18
[   48.587949] # Totals: pass:18 fail:0 skip:0 total:18
[   48.588736] ok 26 - hlist
[   48.590180]     # Subtest: bits-test
[   48.590186]     1..3
[   48.590953]     ok 1 - genmask_test
[   48.591673]     ok 2 - genmask_ull_test
[   48.592494]     ok 3 - genmask_input_check_test
[   48.593125] # bits-test: pass:3 fail:0 skip:0 total:3
[   48.593859] # Totals: pass:3 fail:0 skip:0 total:3
[   48.594674] ok 27 - bits-test
[   48.595988]     # Subtest: cmdline
[   48.595993]     1..4
[   48.596760]     ok 1 - cmdline_test_noint
[   48.597413]     ok 2 - cmdline_test_lead_int
[   48.598400]     ok 3 - cmdline_test_tail_int
[   48.599422]     ok 4 - cmdline_test_range
[   48.600107] # cmdline: pass:4 fail:0 skip:0 total:4
[   48.600765] # Totals: pass:4 fail:0 skip:0 total:4
[   48.601574] ok 28 - cmdline
[   48.602847]     # Subtest: slub_test
[   48.602852]     1..2
[   48.607157]     ok 1 - test_clobber_zone
[   48.610276]     ok 2 - test_clobber_redzone_free
[   48.610946] # slub_test: pass:2 fail:0 skip:0 total:2
[   48.611709] # Totals: pass:2 fail:0 skip:0 total:2
[   48.612535] ok 29 - slub_test
[   48.614056]     # Subtest: memcpy
[   48.614064]     1..7
[   48.615232]     # memset_test: ok: memset() direct assignment
[   48.617243]     # memset_test: ok: memset() complete overwrite
[   48.618610]     # memset_test: ok: memset() middle overwrite
[   48.619914]     # memset_test: ok: memset() argument side-effects
[   48.621346]     # memset_test: ok: memset() memset_after()
[   48.622622]     # memset_test: ok: memset() memset_startat()
[   48.623997]     ok 1 - memset_test
[   48.624433]     # memcpy_test: ok: memcpy() static initializers
[   48.627967]     # memcpy_test: ok: memcpy() direct assignment
[   48.630301]     # memcpy_test: ok: memcpy() complete overwrite
[   48.632416]     # memcpy_test: ok: memcpy() middle overwrite
[   48.634379]     # memcpy_test: ok: memcpy() argument side-effects
[   48.635349]     ok 2 - memcpy_test
[   54.198508]     ok 3 - memcpy_large_test
[   54.199653]     # memmove_test: ok: memmove() static initializers
[   54.201367]     # memmove_test: ok: memmove() direct assignment
[   54.202352]     # memmove_test: ok: memmove() complete overwrite
[   54.203332]     # memmove_test: ok: memmove() middle overwrite
[   54.204289]     # memmove_test: ok: memmove() argument side-effects
[   54.205346]     # memmove_test: ok: memmove() overlapping write
[   54.206383]     ok 4 - memmove_test
[   59.681912]     ok 5 - memmove_large_test
[   70.810445]     ok 6 - memmove_overlap_test
[   70.811832]     ok 7 - strtomem_test
[   70.812671] # memcpy: pass:7 fail:0 skip:0 total:7
[   70.818416] # Totals: pass:7 fail:0 skip:0 total:7
[   70.819373] ok 30 - memcpy
[   70.822473]     # Subtest: is_signed_type
[   70.822487]     1..1
[   70.824122]     ok 1 - is_signed_type_test
[   70.824606] ok 31 - is_signed_type
[   70.826229]     # Subtest: overflow
[   70.826240]     1..21
[   70.827522]     # u8_u8__u8_overflow_test: 18 u8_u8__u8 arithmetic tests finished
[   70.831527]     ok 1 - u8_u8__u8_overflow_test
[   70.832088]     # s8_s8__s8_overflow_test: 19 s8_s8__s8 arithmetic tests finished
[   70.835935]     ok 2 - s8_s8__s8_overflow_test
[   70.836384]     # u16_u16__u16_overflow_test: 17 u16_u16__u16 arithmetic tests finished
[   70.839786]     ok 3 - u16_u16__u16_overflow_test
[   70.840134]     # s16_s16__s16_overflow_test: 17 s16_s16__s16 arithmetic tests finished
[   70.843995]     ok 4 - s16_s16__s16_overflow_test
[   70.844380]     # u32_u32__u32_overflow_test: 17 u32_u32__u32 arithmetic tests finished
[   70.849022]     ok 5 - u32_u32__u32_overflow_test
[   70.849595]     # s32_s32__s32_overflow_test: 17 s32_s32__s32 arithmetic tests finished
[   70.853323]     ok 6 - s32_s32__s32_overflow_test
[   70.853674]     # u64_u64__u64_overflow_test: 17 u64_u64__u64 arithmetic tests finished
[   70.856983]     ok 7 - u64_u64__u64_overflow_test
[   70.857342]     # s64_s64__s64_overflow_test: 21 s64_s64__s64 arithmetic tests finished
[   70.860658]     ok 8 - s64_s64__s64_overflow_test
[   70.860987]     # u32_u32__int_overflow_test: 2 u32_u32__int arithmetic tests finished
[   70.864333]     ok 9 - u32_u32__int_overflow_test
[   70.864673]     # u32_u32__u8_overflow_test: 3 u32_u32__u8 arithmetic tests finished
[   70.867913]     ok 10 - u32_u32__u8_overflow_test
[   70.868221]     # u8_u8__int_overflow_test: 3 u8_u8__int arithmetic tests finished
[   70.871420]     ok 11 - u8_u8__int_overflow_test
[   70.871749]     # int_int__u8_overflow_test: 3 int_int__u8 arithmetic tests finished
[   70.875506]     ok 12 - int_int__u8_overflow_test
[   70.875853]     # shift_sane_test: 36 sane shift tests finished
[   70.878957]     ok 13 - shift_sane_test
[   70.879277]     # shift_overflow_test: 25 overflow shift tests finished
[   70.882052]     ok 14 - shift_overflow_test
[   70.882417]     # shift_truncate_test: 27 truncate shift tests finished
[   70.885356]     ok 15 - shift_truncate_test
[   70.885682]     # shift_nonsense_test: 25 nonsense shift tests finished
[   70.888889]     ok 16 - shift_nonsense_test
[   70.889581]     # overflow_allocation_test: 11 allocation overflow tests finished
[   70.891390]     ok 17 - overflow_allocation_test
[   70.891599]     # overflow_size_helpers_test: 43 overflow size helper tests finished
[   70.893650]     ok 18 - overflow_size_helpers_test
[   70.893894]     # overflows_type_test: 658 overflows_type() tests finished
[   70.897310]     ok 19 - overflows_type_test
[   70.897708]     # same_type_test: 0 __same_type() tests finished
[   70.900477]     ok 20 - same_type_test
[   70.900720]     # castable_to_type_test: 103 castable_to_type() tests finished
[   70.903721]     ok 21 - castable_to_type_test
[   70.903736] # overflow: pass:21 fail:0 skip:0 total:21
[   70.904912] # Totals: pass:21 fail:0 skip:0 total:21
[   70.906273] ok 32 - overflow
[   70.908761]     # Subtest: stackinit
[   70.908771]     1..65
[   70.910061]     ok 1 - test_u8_zero
[   70.911058]     ok 2 - test_u16_zero
[   70.912339]     ok 3 - test_u32_zero
[   70.913619]     ok 4 - test_u64_zero
[   70.915133]     ok 5 - test_char_array_zero
[   70.917043]     ok 6 - test_small_hole_zero
[   70.918617]     ok 7 - test_big_hole_zero
[   70.919892]     ok 8 - test_trailing_hole_zero
[   70.920890]     ok 9 - test_packed_zero
[   70.921909]     ok 10 - test_small_hole_dynamic_partial
[   70.922833]     ok 11 - test_big_hole_dynamic_partial
[   70.924066]     ok 12 - test_trailing_hole_dynamic_partial
[   70.925162]     ok 13 - test_packed_dynamic_partial
[   70.926392]     ok 14 - test_small_hole_assigned_dynamic_partial
[   70.927466]     ok 15 - test_big_hole_assigned_dynamic_partial
[   70.928779]     ok 16 - test_trailing_hole_assigned_dynamic_partial
[   70.930020]     ok 17 - test_packed_assigned_dynamic_partial
[   70.931290]     ok 18 - test_small_hole_static_partial
[   70.932534]     ok 19 - test_big_hole_static_partial
[   70.933614]     ok 20 - test_trailing_hole_static_partial
[   70.934667]     ok 21 - test_packed_static_partial
[   70.935866]     ok 22 - test_small_hole_static_all # SKIP XFAIL uninit bytes: 3
[   70.938120]     ok 23 - test_big_hole_static_all # SKIP XFAIL uninit bytes: 124
[   70.939579]     ok 24 - test_trailing_hole_static_all # SKIP XFAIL uninit bytes: 7
[   70.941123]     ok 25 - test_packed_static_all
[   70.941402]     ok 26 - test_small_hole_dynamic_all # SKIP XFAIL uninit bytes: 3
[   70.943673]     ok 27 - test_big_hole_dynamic_all # SKIP XFAIL uninit bytes: 124
[   70.945360]     ok 28 - test_trailing_hole_dynamic_all # SKIP XFAIL uninit bytes: 7
[   70.946922]     ok 29 - test_packed_dynamic_all
[   70.947211]     ok 30 - test_small_hole_runtime_partial # SKIP XFAIL uninit bytes: 23
[   70.949604]     ok 31 - test_big_hole_runtime_partial # SKIP XFAIL uninit bytes: 127
[   70.951171]     ok 32 - test_trailing_hole_runtime_partial # SKIP XFAIL uninit bytes: 24
[   70.952752]     ok 33 - test_packed_runtime_partial # SKIP XFAIL uninit bytes: 24
[   70.954222]     ok 34 - test_small_hole_runtime_all # SKIP XFAIL uninit bytes: 3
[   70.955651]     ok 35 - test_big_hole_runtime_all # SKIP XFAIL uninit bytes: 124
[   70.957114]     ok 36 - test_trailing_hole_runtime_all # SKIP XFAIL uninit bytes: 7
[   70.959041]     ok 37 - test_packed_runtime_all
[   70.959426]     ok 38 - test_small_hole_assigned_static_partial
[   70.960517]     ok 39 - test_big_hole_assigned_static_partial
[   70.961740]     ok 40 - test_trailing_hole_assigned_static_partial
[   70.962908]     ok 41 - test_packed_assigned_static_partial
[   70.964139]     ok 42 - test_small_hole_assigned_static_all # SKIP XFAIL uninit bytes: 3
[   70.966638]     ok 43 - test_big_hole_assigned_static_all # SKIP XFAIL uninit bytes: 124
[   70.968199]     ok 44 - test_trailing_hole_assigned_static_all # SKIP XFAIL uninit bytes: 7
[   70.969855]     ok 45 - test_packed_assigned_static_all
[   70.970172]     ok 46 - test_small_hole_assigned_dynamic_all # SKIP XFAIL uninit bytes: 3
[   70.972548]     ok 47 - test_big_hole_assigned_dynamic_all # SKIP XFAIL uninit bytes: 124
[   70.974160]     ok 48 - test_trailing_hole_assigned_dynamic_all # SKIP XFAIL uninit bytes: 7
[   70.975768]     ok 49 - test_packed_assigned_dynamic_all
[   70.976002]     ok 50 - test_small_hole_assigned_copy # SKIP XFAIL uninit bytes: 3
[   70.978395]     ok 51 - test_big_hole_assigned_copy # SKIP XFAIL uninit bytes: 124
[   70.979855]     ok 52 - test_trailing_hole_assigned_copy # SKIP XFAIL uninit bytes: 7
[   70.981428]     ok 53 - test_packed_assigned_copy
[   70.981700]     ok 54 - test_u8_none # SKIP XFAIL uninit bytes: 1
[   70.983682]     ok 55 - test_u16_none # SKIP XFAIL uninit bytes: 2
[   70.984931]     ok 56 - test_u32_none # SKIP XFAIL uninit bytes: 4
[   70.986185]     ok 57 - test_u64_none # SKIP XFAIL uninit bytes: 8
[   70.987449]     ok 58 - test_char_array_none # SKIP XFAIL uninit bytes: 16
[   70.988869]     ok 59 - test_switch_1_none # SKIP XFAIL uninit bytes: 80
[   70.990408]     ok 60 - test_switch_2_none # SKIP XFAIL uninit bytes: 80
[   70.991820]     ok 61 - test_small_hole_none # SKIP XFAIL uninit bytes: 24
[   70.993270]     ok 62 - test_big_hole_none # SKIP XFAIL uninit bytes: 128
[   70.994725]     ok 63 - test_trailing_hole_none # SKIP XFAIL uninit bytes: 32
[   70.996283]     ok 64 - test_packed_none # SKIP XFAIL uninit bytes: 32
[   70.997633]     ok 65 - test_user # SKIP XFAIL uninit bytes: 32
[   70.998621] # stackinit: pass:31 fail:0 skip:34 total:65
[   70.998631] # Totals: pass:31 fail:0 skip:34 total:65
[   70.999504] ok 33 - stackinit
[   71.000886]     # Subtest: strscpy
[   71.000892]     1..1
[   71.001986]     ok 1 - strscpy_test
[   71.002544] ok 34 - strscpy
[   71.003948]     # Subtest: siphash
[   71.003954]     1..1
[   71.004925]     ok 1 - siphash_test
[   71.005368] ok 35 - siphash
[   71.006491]     # Subtest: drm_test_pick_cmdline
[   71.006497]     1..1
[   71.010591]     ok 1 - drm_test_pick_cmdline_res_1920_1080_60
[   71.010996] ok 36 - drm_test_pick_cmdline
[   71.012674]     # drm_buddy: Testing DRM buddy manager, with random_seed=0xb2ed9260
[   71.013953]     # Subtest: drm_buddy
[   71.013959]     1..6
[   71.015628]     ok 1 - drm_test_buddy_alloc_limit
[   71.017530]     ok 2 - drm_test_buddy_alloc_range
[   71.019293]     ok 3 - drm_test_buddy_alloc_optimistic
[   71.021188]     ok 4 - drm_test_buddy_alloc_pessimistic
[   71.026381]     ok 5 - drm_test_buddy_alloc_smoke
[   71.028354]     ok 6 - drm_test_buddy_alloc_pathological
[   71.029647] # drm_buddy: pass:6 fail:0 skip:0 total:6
[   71.031062] # Totals: pass:6 fail:0 skip:0 total:6
[   71.032426] ok 37 - drm_buddy
[   71.034989]     # Subtest: drm_cmdline_parser
[   71.035000]     1..39
[   71.036650]     ok 1 - drm_test_cmdline_force_d_only
[   71.037669]     ok 2 - drm_test_cmdline_force_D_only_dvi
[   71.039421]     ok 3 - drm_test_cmdline_force_D_only_hdmi
[   71.041212]     ok 4 - drm_test_cmdline_force_D_only_not_digital
[   71.043012]     ok 5 - drm_test_cmdline_force_e_only
[   71.044466]     ok 6 - drm_test_cmdline_res
[   71.045640]     ok 7 - drm_test_cmdline_res_vesa
[   71.046676]     ok 8 - drm_test_cmdline_res_vesa_rblank
[   71.047766]     ok 9 - drm_test_cmdline_res_rblank
[   71.048955]     ok 10 - drm_test_cmdline_res_bpp
[   71.050243]     ok 11 - drm_test_cmdline_res_refresh
[   71.051585]     ok 12 - drm_test_cmdline_res_bpp_refresh
[   71.052676]     ok 13 - drm_test_cmdline_res_bpp_refresh_interlaced
[   71.053966]     ok 14 - drm_test_cmdline_res_bpp_refresh_margins
[   71.055423]     ok 15 - drm_test_cmdline_res_bpp_refresh_force_off
[   71.056707]     ok 16 - drm_test_cmdline_res_bpp_refresh_force_on
[   71.058033]     ok 17 - drm_test_cmdline_res_bpp_refresh_force_on_analog
[   71.059471]     ok 18 - drm_test_cmdline_res_bpp_refresh_force_on_digital
[   71.060917]     ok 19 - drm_test_cmdline_res_bpp_refresh_interlaced_margins_force_on
[   71.062654]     ok 20 - drm_test_cmdline_res_margins_force_on
[   71.064239]     ok 21 - drm_test_cmdline_res_vesa_margins
[   71.065605]     ok 22 - drm_test_cmdline_name
[   71.066852]     ok 23 - drm_test_cmdline_name_bpp
[   71.067876]     ok 24 - drm_test_cmdline_name_option
[   71.068936]     ok 25 - drm_test_cmdline_name_bpp_option
[   71.070157]     ok 26 - drm_test_cmdline_rotate_0
[   71.071334]     ok 27 - drm_test_cmdline_rotate_90
[   71.072342]     ok 28 - drm_test_cmdline_rotate_180
[   71.073396]     ok 29 - drm_test_cmdline_rotate_270
[   71.074413]     ok 30 - drm_test_cmdline_hmirror
[   71.075440]     ok 31 - drm_test_cmdline_vmirror
[   71.076445]     ok 32 - drm_test_cmdline_margin_options
[   71.077502]     ok 33 - drm_test_cmdline_multiple_options
[   71.078631]     ok 34 - drm_test_cmdline_bpp_extra_and_option
[   71.079759]     ok 35 - drm_test_cmdline_extra_and_option
[   71.080925]     ok 36 - drm_test_cmdline_freestanding_options
[   71.082071]     ok 37 - drm_test_cmdline_freestanding_force_e_and_options
[   71.083339]     ok 38 - drm_test_cmdline_panel_orientation
[   71.084497]         # Subtest: drm_test_cmdline_invalid
[   71.085803]         ok 1 - margin_only
[   71.087060]         ok 2 - interlace_only
[   71.088053]         ok 3 - res_missing_x
[   71.089118]         ok 4 - res_missing_y
[   71.090193]         ok 5 - res_bad_y
[   71.092005]         ok 6 - res_missing_y_bpp
[   71.093032]         ok 7 - res_bad_bpp
[   71.094606]         ok 8 - res_bad_refresh
[   71.096736]         ok 9 - res_bpp_refresh_force_on_off
[   71.098505]         ok 10 - res_invalid_mode
[   71.100498]         ok 11 - res_bpp_wrong_place_mode
[   71.102243]         ok 12 - name_bpp_refresh
[   71.104161]         ok 13 - name_refresh
[   71.105770]         ok 14 - name_refresh_wrong_mode
[   71.106763]         ok 15 - name_refresh_invalid_mode
[   71.107887]         ok 16 - rotate_multiple
[   71.109019]         ok 17 - rotate_invalid_val
[   71.110093]         ok 18 - rotate_truncated
[   71.111116]         ok 19 - invalid_option
[   71.111848]     # drm_test_cmdline_invalid: pass:19 fail:0 skip:0 total:19
[   71.112533]     ok 39 - drm_test_cmdline_invalid
[   71.113672] # drm_cmdline_parser: pass:39 fail:0 skip:0 total:39
[   71.114450] # Totals: pass:57 fail:0 skip:0 total:57
[   71.115432] ok 38 - drm_cmdline_parser
[   71.117032]     # Subtest: drm_damage_helper
[   71.117042]     1..21
[   71.118146]     ok 1 - drm_test_damage_iter_no_damage
[   71.118842]     ok 2 - drm_test_damage_iter_no_damage_fractional_src
[   71.119968]     ok 3 - drm_test_damage_iter_no_damage_src_moved
[   71.121276]     ok 4 - drm_test_damage_iter_no_damage_fractional_src_moved
[   71.122534]     ok 5 - drm_test_damage_iter_no_damage_not_visible
[   71.123932]     ok 6 - drm_test_damage_iter_no_damage_no_crtc
[   71.125195]     ok 7 - drm_test_damage_iter_no_damage_no_fb
[   71.126428]     ok 8 - drm_test_damage_iter_simple_damage
[   71.127649]     ok 9 - drm_test_damage_iter_single_damage
[   71.128784]     ok 10 - drm_test_damage_iter_single_damage_intersect_src
[   71.129954]     ok 11 - drm_test_damage_iter_single_damage_outside_src
[   71.131378]     ok 12 - drm_test_damage_iter_single_damage_fractional_src
[   71.132895]     ok 13 - drm_test_damage_iter_single_damage_intersect_fractional_src
[   71.134722]     ok 14 - drm_test_damage_iter_single_damage_outside_fractional_src
[   71.136727]     ok 15 - drm_test_damage_iter_single_damage_src_moved
[   71.138380]     ok 16 - drm_test_damage_iter_single_damage_fractional_src_moved
[   71.139834]     ok 17 - drm_test_damage_iter_damage
[   71.141458]     ok 18 - drm_test_damage_iter_damage_one_intersect
[   71.142656]     ok 19 - drm_test_damage_iter_damage_one_outside
[   71.143998]     ok 20 - drm_test_damage_iter_damage_src_moved
[   71.145461]     ok 21 - drm_test_damage_iter_damage_not_visible
[   71.146418] # drm_damage_helper: pass:21 fail:0 skip:0 total:21
[   71.147367] # Totals: pass:21 fail:0 skip:0 total:21
[   71.148326] ok 39 - drm_damage_helper
[   71.150417]     # Subtest: drm_dp_mst_helper
[   71.150434]     1..2
[   71.151970]         # Subtest: drm_test_dp_mst_calc_pbn_mode
[   71.153144]         ok 1 - Clock 154000 BPP 30 DSC disabled
[   71.155509]         ok 2 - Clock 234000 BPP 30 DSC disabled
[   71.157852]         ok 3 - Clock 297000 BPP 24 DSC disabled
[   71.159331]         ok 4 - Clock 332880 BPP 24 DSC enabled
[   71.160673]         ok 5 - Clock 324540 BPP 24 DSC enabled
[   71.161599]     # drm_test_dp_mst_calc_pbn_mode: pass:5 fail:0 skip:0 total:5
[   71.162494]     ok 1 - drm_test_dp_mst_calc_pbn_mode
[   71.163634]         # Subtest: drm_test_dp_mst_sideband_msg_req_decode
[   71.164879]         ok 1 - DP_ENUM_PATH_RESOURCES with port number
[   71.166577]         ok 2 - DP_POWER_UP_PHY with port number
[   71.167955]         ok 3 - DP_POWER_DOWN_PHY with port number
[   71.169348]         ok 4 - DP_ALLOCATE_PAYLOAD with SDP stream sinks
[   71.170685]         ok 5 - DP_ALLOCATE_PAYLOAD with port number
[   71.172081]         ok 6 - DP_ALLOCATE_PAYLOAD with VCPI
[   71.173468]         ok 7 - DP_ALLOCATE_PAYLOAD with PBN
[   71.174669]         ok 8 - DP_QUERY_PAYLOAD with port number
[   71.175952]         ok 9 - DP_QUERY_PAYLOAD with VCPI
[   71.177272]         ok 10 - DP_REMOTE_DPCD_READ with port number
[   71.178601]         ok 11 - DP_REMOTE_DPCD_READ with DPCD address
[   71.179964]         ok 12 - DP_REMOTE_DPCD_READ with max number of bytes
[   71.181448]         ok 13 - DP_REMOTE_DPCD_WRITE with port number
[   71.182923]         ok 14 - DP_REMOTE_DPCD_WRITE with DPCD address
[   71.184585]         ok 15 - DP_REMOTE_DPCD_WRITE with data array
[   71.185973]         ok 16 - DP_REMOTE_I2C_READ with port number
[   71.187348]         ok 17 - DP_REMOTE_I2C_READ with I2C device ID
[   71.188741]         ok 18 - DP_REMOTE_I2C_READ with transactions array
[   71.190167]         ok 19 - DP_REMOTE_I2C_WRITE with port number
[   71.191648]         ok 20 - DP_REMOTE_I2C_WRITE with I2C device ID
[   71.193303]         ok 21 - DP_REMOTE_I2C_WRITE with data array
[   71.195238]         ok 22 - DP_QUERY_STREAM_ENC_STATUS with stream ID
[   71.197152]         ok 23 - DP_QUERY_STREAM_ENC_STATUS with client ID
[   71.199763]         ok 24 - DP_QUERY_STREAM_ENC_STATUS with stream event
[   71.201719]         ok 25 - DP_QUERY_STREAM_ENC_STATUS with valid stream event
[   71.203105]         ok 26 - DP_QUERY_STREAM_ENC_STATUS with stream behavior
[   71.204723]         ok 27 - DP_QUERY_STREAM_ENC_STATUS with a valid stream behavior
[   71.206284]     # drm_test_dp_mst_sideband_msg_req_decode: pass:27 fail:0 skip:0 total:27
[   71.207556]     ok 2 - drm_test_dp_mst_sideband_msg_req_decode
[   71.208864] # drm_dp_mst_helper: pass:2 fail:0 skip:0 total:2
[   71.209817] # Totals: pass:32 fail:0 skip:0 total:32
[   71.210728] ok 40 - drm_dp_mst_helper
[   71.212237]     # Subtest: drm_format_helper_test
[   71.212243]     1..5
[   71.212999]         # Subtest: drm_test_fb_xrgb8888_to_gray8
[   71.213796]         ok 1 - single_pixel_source_buffer
[   71.215181]         ok 2 - single_pixel_clip_rectangle
[   71.216713]         ok 3 - well_known_colors
[   71.218057]         ok 4 - destination_pitch
[   71.218800]     # drm_test_fb_xrgb8888_to_gray8: pass:4 fail:0 skip:0 total:4
[   71.219546]     ok 1 - drm_test_fb_xrgb8888_to_gray8
[   71.220795]         # Subtest: drm_test_fb_xrgb8888_to_rgb332
[   71.222278]         ok 1 - single_pixel_source_buffer
[   71.223918]         ok 2 - single_pixel_clip_rectangle
[   71.225635]         ok 3 - well_known_colors
[   71.227222]         ok 4 - destination_pitch
[   71.228025]     # drm_test_fb_xrgb8888_to_rgb332: pass:4 fail:0 skip:0 total:4
[   71.228798]     ok 2 - drm_test_fb_xrgb8888_to_rgb332
[   71.230138]         # Subtest: drm_test_fb_xrgb8888_to_rgb565
[   71.231695]         ok 1 - single_pixel_source_buffer
[   71.233695]         ok 2 - single_pixel_clip_rectangle
[   71.235155]         ok 3 - well_known_colors
[   71.236786]         ok 4 - destination_pitch
[   71.237639]     # drm_test_fb_xrgb8888_to_rgb565: pass:4 fail:0 skip:0 total:4
[   71.238411]     ok 3 - drm_test_fb_xrgb8888_to_rgb565
[   71.239642]         # Subtest: drm_test_fb_xrgb8888_to_rgb888
[   71.241136]         ok 1 - single_pixel_source_buffer
[   71.246297]         ok 2 - single_pixel_clip_rectangle
[   71.247693]         ok 3 - well_known_colors
[   71.248972]         ok 4 - destination_pitch
[   71.249788]     # drm_test_fb_xrgb8888_to_rgb888: pass:4 fail:0 skip:0 total:4
[   71.250498]     ok 4 - drm_test_fb_xrgb8888_to_rgb888
[   71.251645]         # Subtest: drm_test_fb_xrgb8888_to_xrgb2101010
[   71.252880]         ok 1 - single_pixel_source_buffer
[   71.254276]         ok 2 - single_pixel_clip_rectangle
[   71.255546]         ok 3 - well_known_colors
[   71.256870]         ok 4 - destination_pitch
[   71.257627]     # drm_test_fb_xrgb8888_to_xrgb2101010: pass:4 fail:0 skip:0 total:4
[   71.258450]     ok 5 - drm_test_fb_xrgb8888_to_xrgb2101010
[   71.259804] # drm_format_helper_test: pass:5 fail:0 skip:0 total:5
[   71.260777] # Totals: pass:20 fail:0 skip:0 total:20
[   71.261995] ok 41 - drm_format_helper_test
[   71.263894]     # Subtest: drm_format
[   71.263903]     1..18
[   71.265185]     ok 1 - drm_test_format_block_width_invalid
[   71.266047]     ok 2 - drm_test_format_block_width_one_plane
[   71.267479]     ok 3 - drm_test_format_block_width_two_plane
[   71.268935]     ok 4 - drm_test_format_block_width_three_plane
[   71.270509]     ok 5 - drm_test_format_block_width_tiled
[   71.271997]     ok 6 - drm_test_format_block_height_invalid
[   71.273501]     ok 7 - drm_test_format_block_height_one_plane
[   71.274879]     ok 8 - drm_test_format_block_height_two_plane
[   71.276318]     ok 9 - drm_test_format_block_height_three_plane
[   71.277811]     ok 10 - drm_test_format_block_height_tiled
[   71.279351]     ok 11 - drm_test_format_min_pitch_invalid
[   71.280774]     ok 12 - drm_test_format_min_pitch_one_plane_8bpp
[   71.282299]     ok 13 - drm_test_format_min_pitch_one_plane_16bpp
[   71.283961]     ok 14 - drm_test_format_min_pitch_one_plane_24bpp
[   71.285592]     ok 15 - drm_test_format_min_pitch_one_plane_32bpp
[   71.287188]     ok 16 - drm_test_format_min_pitch_two_plane
[   71.288856]     ok 17 - drm_test_format_min_pitch_three_plane_8bpp
[   71.290481]     ok 18 - drm_test_format_min_pitch_tiled
[   71.291675] # drm_format: pass:18 fail:0 skip:0 total:18
[   71.292624] # Totals: pass:18 fail:0 skip:0 total:18
[   71.293650] ok 42 - drm_format
[   71.295246]     # Subtest: drm_framebuffer
[   71.295291]     1..1
[   71.296022]         # Subtest: drm_test_framebuffer_create
[   71.296929]         ok 1 - ABGR8888 normal sizes
[   71.298540]         ok 2 - ABGR8888 max sizes
[   71.299681]         ok 3 - ABGR8888 pitch greater than min required
[   71.300807]         ok 4 - ABGR8888 pitch less than min required
[   71.302358]         ok 5 - ABGR8888 Invalid width
[   71.303756]         ok 6 - ABGR8888 Invalid buffer handle
[   71.304894]         ok 7 - No pixel format
[   71.306227]         ok 8 - ABGR8888 Width 0
[   71.307409]         ok 9 - ABGR8888 Height 0
[   71.308644]         ok 10 - ABGR8888 Out of bound height * pitch combination
[   71.309742]         ok 11 - ABGR8888 Large buffer offset
[   71.311422]         ok 12 - ABGR8888 Set DRM_MODE_FB_MODIFIERS without modifiers
[   71.312707]         ok 13 - ABGR8888 Valid buffer modifier
[   71.314360]         ok 14 - ABGR8888 Invalid buffer modifier(DRM_FORMAT_MOD_SAMSUNG_64_32_TILE)
[   71.315658]         ok 15 - ABGR8888 Extra pitches without DRM_MODE_FB_MODIFIERS
[   71.317644]         ok 16 - ABGR8888 Extra pitches with DRM_MODE_FB_MODIFIERS
[   71.319222]         ok 17 - NV12 Normal sizes
[   71.320776]         ok 18 - NV12 Max sizes
[   71.321869]         ok 19 - NV12 Invalid pitch
[   71.322882]         ok 20 - NV12 Invalid modifier/missing DRM_MODE_FB_MODIFIERS flag
[   71.323985]         ok 21 - NV12 different  modifier per-plane
[   71.325717]         ok 22 - NV12 with DRM_FORMAT_MOD_SAMSUNG_64_32_TILE
[   71.327077]         ok 23 - NV12 Valid modifiers without DRM_MODE_FB_MODIFIERS
[   71.328562]         ok 24 - NV12 Modifier for inexistent plane
[   71.330281]         ok 25 - NV12 Handle for inexistent plane
[   71.331729]         ok 26 - NV12 Handle for inexistent plane without DRM_MODE_FB_MODIFIERS
[   71.333170]         ok 27 - YVU420 Normal sizes
[   71.334890]         ok 28 - YVU420 DRM_MODE_FB_MODIFIERS set without modifier
[   71.335975]         ok 29 - YVU420 Max sizes
[   71.337541]         ok 30 - YVU420 Invalid pitch
[   71.338586]         ok 31 - YVU420 Different pitches
[   71.339717]         ok 32 - YVU420 Different buffer offsets/pitches
[   71.340899]         ok 33 - YVU420 Modifier set just for plane 0, without DRM_MODE_FB_MODIFIERS
[   71.342335]         ok 34 - YVU420 Modifier set just for planes 0, 1, without DRM_MODE_FB_MODIFIERS
[   71.344137]         ok 35 - YVU420 Modifier set just for plane 0, 1, with DRM_MODE_FB_MODIFIERS
[   71.346031]         ok 36 - YVU420 Valid modifier
[   71.347929]         ok 37 - YVU420 Different modifiers per plane
[   71.349190]         ok 38 - YVU420 Modifier for inexistent plane
[   71.350623]         ok 39 - X0L2 Normal sizes
[   71.352138]         ok 40 - X0L2 Max sizes
[   71.353433]         ok 41 - X0L2 Invalid pitch
[   71.354719]         ok 42 - X0L2 Pitch greater than minimum required
[   71.356075]         ok 43 - X0L2 Handle for inexistent plane
[   71.357769]         ok 44 - X0L2 Offset for inexistent plane, without DRM_MODE_FB_MODIFIERS set
[   71.359348]         ok 45 - X0L2 Modifier without DRM_MODE_FB_MODIFIERS set
[   71.361544]         ok 46 - X0L2 Valid modifier
[   71.363383]         ok 47 - X0L2 Modifier for inexistent plane
[   71.364205]     # drm_test_framebuffer_create: pass:47 fail:0 skip:0 total:47
[   71.365317]     ok 1 - drm_test_framebuffer_create
[   71.366618] # Totals: pass:47 fail:0 skip:0 total:47
[   71.367504] ok 43 - drm_framebuffer
[   71.369060]     # drm_mm: Testing DRM range manager, with random_seed=0x26f2c3de max_iterations=8192 max_prime=128
[   71.370831]     # Subtest: drm_mm
[   71.370839]     1..19
[   71.371838]     ok 1 - drm_test_mm_init
[   71.372703]     ok 2 - drm_test_mm_debug
[   72.242797]     ok 3 - drm_test_mm_reserve
[  140.009204]     ok 4 - drm_test_mm_insert
[  206.485547]     ok 5 - drm_test_mm_replace
[  213.160469]     ok 6 - drm_test_mm_insert_range
[  213.287247]     # drm_test_mm_frag: bottom-up fragmented insert of 10000 and 20000 insertions took 34766286 and 70139403 nsecs
[  213.467892]     # drm_test_mm_frag: top-down fragmented insert of 10000 and 20000 insertions took 45182770 and 82471761 nsecs
[  213.534216]     ok 7 - drm_test_mm_frag
[  213.535443]     ok 8 - drm_test_mm_align
[  213.537931]     ok 9 - drm_test_mm_align32
[  213.540573]     ok 10 - drm_test_mm_align64
[  215.361664]     ok 11 - drm_test_mm_evict
[  216.676928]     ok 12 - drm_test_mm_evict_range
[  216.846826]     ok 13 - drm_test_mm_topdown
[  216.994637]     ok 14 - drm_test_mm_bottomup
[  216.996919]     ok 15 - drm_test_mm_lowest
[  216.998955]     ok 16 - drm_test_mm_highest
[  217.455460]     ok 17 - drm_test_mm_color
[  223.346040]     ok 18 - drm_test_mm_color_evict
[  228.687936]     ok 19 - drm_test_mm_color_evict_range
[  228.689013] # drm_mm: pass:19 fail:0 skip:0 total:19
[  228.690028] # Totals: pass:19 fail:0 skip:0 total:19
[  228.691077] ok 44 - drm_mm
[  228.692794]     # Subtest: drm_plane_helper
[  228.692802]     1..2
[  228.693676]         # Subtest: drm_test_check_plane_state
[  228.694857]         ok 1 - clipping_simple
[  228.696743]         ok 2 - clipping_rotate_reflect
[  228.698216]         ok 3 - positioning_simple
[  228.699818]         ok 4 - upscaling
[  228.701484]         ok 5 - downscaling
[  228.702727]         ok 6 - rounding1
[  228.704007]         ok 7 - rounding2
[  228.705302]         ok 8 - rounding3
[  228.706529]         ok 9 - rounding4
[  228.707314]     # drm_test_check_plane_state: pass:9 fail:0 skip:0 total:9
[  228.708084]     ok 1 - drm_test_check_plane_state
[  228.709578]         # Subtest: drm_test_check_invalid_plane_state
[  228.711033]         ok 1 - positioning_invalid
[  228.712712]         ok 2 - upscaling_invalid
[  228.714042]         ok 3 - downscaling_invalid
[  228.714897]     # drm_test_check_invalid_plane_state: pass:3 fail:0 skip:0 total:3
[  228.715770]     ok 2 - drm_test_check_invalid_plane_state
[  228.717355] # drm_plane_helper: pass:2 fail:0 skip:0 total:2
[  228.718440] # Totals: pass:12 fail:0 skip:0 total:12
[  228.719637] ok 45 - drm_plane_helper
[  228.722853]     # Subtest: drm_rect
[  228.722869]     1..4
[  228.724540]     ok 1 - drm_test_rect_clip_scaled_div_by_zero
[  228.725712]     ok 2 - drm_test_rect_clip_scaled_not_clipped
[  228.728167]     ok 3 - drm_test_rect_clip_scaled_clipped
[  228.729658]     ok 4 - drm_test_rect_clip_scaled_signed_vs_unsigned
[  228.730563] # drm_rect: pass:4 fail:0 skip:0 total:4
[  228.731608] # Totals: pass:4 fail:0 skip:0 total:4
[  228.732470] ok 46 - drm_rect
[  228.733828]     # Subtest: qos-kunit-test
[  228.733834]     1..3
[  228.734749]     ok 1 - freq_qos_test_min
[  228.735405]     ok 2 - freq_qos_test_maxdef
[  228.736444]     ok 3 - freq_qos_test_readd
[  228.737137] # qos-kunit-test: pass:3 fail:0 skip:0 total:3
[  228.737858] # Totals: pass:3 fail:0 skip:0 total:3
[  228.738770] ok 47 - qos-kunit-test
[  228.740214]     # Subtest: property-entry
[  228.740220]     1..7
[  228.741615]     ok 1 - pe_test_uints
[  228.742927]     ok 2 - pe_test_uint_arrays
[  228.743999]     ok 3 - pe_test_strings
[  228.745148]     ok 4 - pe_test_bool
[  228.746091]     ok 5 - pe_test_move_inline_u8
[  228.747090]     ok 6 - pe_test_move_inline_str
[  228.748427]     ok 7 - pe_test_reference
[  228.749175] # property-entry: pass:7 fail:0 skip:0 total:7
[  228.749877] # Totals: pass:7 fail:0 skip:0 total:7
[  228.750808] ok 48 - property-entry
[  228.752234]     # Subtest: rtc_lib_test_cases
[  228.752239]     1..1
[  232.102123]     ok 1 - rtc_time64_to_tm_test_date_range
[  232.103004] ok 49 - rtc_lib_test_cases
[  232.106427]     # Subtest: dev-addr-list-test
[  232.106447]     1..6
[  232.120544]     ok 1 - dev_addr_test_basic
[  232.130549]     ok 2 - dev_addr_test_sync_one
[  232.147543]     ok 3 - dev_addr_test_add_del
[  232.162722]     ok 4 - dev_addr_test_del_main
[  232.178642]     ok 5 - dev_addr_test_add_set
[  232.189500]     ok 6 - dev_addr_test_add_excl
[  232.191187] # dev-addr-list-test: pass:6 fail:0 skip:0 total:6
[  232.192847] # Totals: pass:6 fail:0 skip:0 total:6
[  232.194944] ok 50 - dev-addr-list-test
[  232.198316]     # Subtest: mptcp-crypto
[  232.198330]     1..1
[  232.199565]     ok 1 - mptcp_crypto_test_basic
[  232.199949] ok 51 - mptcp-crypto
[  232.201361]     # Subtest: mptcp-token
[  232.201367]     1..4
[  232.202485]     ok 1 - mptcp_token_test_req_basic
[  232.203230]     ok 2 - mptcp_token_test_msk_basic
[  232.204472]     ok 3 - mptcp_token_test_accept
[  232.205639]     ok 4 - mptcp_token_test_destroyed
[  232.206405] # mptcp-token: pass:4 fail:0 skip:0 total:4
[  232.207220] # Totals: pass:4 fail:0 skip:0 total:4
[  232.208122] ok 52 - mptcp-token
[  232.211624] md: Waiting for all devices to be available before autodetect
[  232.212677] md: If you don't use raid, use raid=noautodetect
[  232.213380] md: Autodetecting RAID arrays.
[  232.213849] md: autorun ...
[  232.214174] md: ... autorun DONE.
[  232.374891] EXT4-fs (sda): mounted filesystem with ordered data mode. Quota mode: none.
[  232.375909] VFS: Mounted root (ext4 filesystem) readonly on device 8:0.
[  232.482364] devtmpfs: mounted
[  232.499473] Freeing unused kernel image (initmem) memory: 6648K
[  232.500309] Write protecting the kernel read-only data: 47104k
[  232.502283] Freeing unused kernel image (rodata/data gap) memory: 1052K
[  232.629801] x86/mm: Checked W+X mappings: passed, no W+X pages found.
[  232.633112] Run /sbin/init as init process
[  239.839106] systemd[1]: systemd 250.5+ running in system mode (-PAM -AUDIT -SELINUX -APPARMOR +IMA -SMACK +SECCOMP -GCRYPT -GNUTLS -OPENSSL +ACL +BLKID -CURL -ELFUTILS -FIDO2 -IDN2 -IDN -IPTC +KMOD -LIBCRYPTSETUP +LIBFDISK -PCRE2 -PWQUALITY -P11KIT -QRENCODE -BZIP2 -LZ4 -XZ -ZLIB +ZSTD -BPF_FRAMEWORK +XKBCOMMON +UTMP +SYSVINIT default-hierarchy=hybrid)
[  239.850136] systemd[1]: Detected virtualization kvm.
[  239.850907] systemd[1]: Detected architecture x86-64.
Welcome to [1mLinux-Kernel-Functional-Testing nodistro.0[0m!
[  240.005746] systemd[1]: Hostname set to <intel-corei7-64>.
[  240.482033] systemd[1]: Initializing machine ID from random generator.
[  240.484181] systemd[1]: Installed transient /etc/machine-id file.
[  241.182058] systemd-sysv-ge (897) used greatest stack depth: 26400 bytes left
[  244.595483] systemd[1]: Queued start job for default target Multi-User System.
[  244.715232] systemd[1]: Created slice Slice /system/getty.
[[0;32m  OK  [0m] Created slice [0;1;39mSlice /system/getty[0m.
[  244.732432] systemd[1]: Created slice Slice /system/modprobe.
[[0;32m  OK  [0m] Created slice [0;1;39mSlice /system/modprobe[0m.
[  244.737449] systemd[1]: Created slice Slice /system/serial-getty.
[[0;32m  OK  [0m] Created slice [0;1;39mSlice /system/serial-getty[0m.
[  244.742125] systemd[1]: Created slice User and Session Slice.
[[0;32m  OK  [0m] Created slice [0;1;39mUser and Session Slice[0m.
[  244.744575] systemd[1]: Started Dispatch Password Requests to Console Directory Watch.
[[0;32m  OK  [0m] Started [0;1;39mDispatch Password …ts to Console Directory Watch[0m.
[  244.747483] systemd[1]: Started Forward Password Requests to Wall Directory Watch.
[[0;32m  OK  [0m] Started [0;1;39mForward Password R…uests to Wall Directory Watch[0m.
[  244.749782] systemd[1]: Reached target Path Units.
[[0;32m  OK  [0m] Reached target [0;1;39mPath Units[0m.
[  244.751545] systemd[1]: Reached target Remote File Systems.
[[0;32m  OK  [0m] Reached target [0;1;39mRemote File Systems[0m.
[  244.753305] systemd[1]: Reached target Slice Units.
[[0;32m  OK  [0m] Reached target [0;1;39mSlice Units[0m.
[  244.754914] systemd[1]: Reached target Swaps.
[[0;32m  OK  [0m] Reached target [0;1;39mSwaps[0m.
[  244.941530] systemd[1]: Listening on RPCbind Server Activation Socket.
[[0;32m  OK  [0m] Listening on [0;1;39mRPCbind Server Activation Socket[0m.
[  244.946400] systemd[1]: Reached target RPC Port Mapper.
[[0;32m  OK  [0m] Reached target [0;1;39mRPC Port Mapper[0m.
[  245.013306] systemd[1]: Listening on Syslog Socket.
[[0;32m  OK  [0m] Listening on [0;1;39mSyslog Socket[0m.
[  245.015383] systemd[1]: Listening on initctl Compatibility Named Pipe.
[[0;32m  OK  [0m] Listening on [0;1;39minitctl Compatibility Named Pipe[0m.
[  245.017998] systemd[1]: Listening on Journal Audit Socket.
[[0;32m  OK  [0m] Listening on [0;1;39mJournal Audit Socket[0m.
[  245.020150] systemd[1]: Listening on Journal Socket (/dev/log).
[[0;32m  OK  [0m] Listening on [0;1;39mJournal Socket (/dev/log)[0m.
[  245.022568] systemd[1]: Listening on Journal Socket.
[[0;32m  OK  [0m] Listening on [0;1;39mJournal Socket[0m.
[  245.024725] systemd[1]: Listening on Network Service Netlink Socket.
[[0;32m  OK  [0m] Listening on [0;1;39mNetwork Service Netlink Socket[0m.
[  245.028339] systemd[1]: Listening on udev Control Socket.
[[0;32m  OK  [0m] Listening on [0;1;39mudev Control Socket[0m.
[  245.030775] systemd[1]: Listening on udev Kernel Socket.
[[0;32m  OK  [0m] Listening on [0;1;39mudev Kernel Socket[0m.
[  245.033715] systemd[1]: Listening on User Database Manager Socket.
[[0;32m  OK  [0m] Listening on [0;1;39mUser Database Manager Socket[0m.
[  245.051099] systemd[1]: Mounting Huge Pages File System...
         Mounting [0;1;39mHuge Pages File System[0m...
[  245.065481] systemd[1]: Mounting POSIX Message Queue File System...
         Mounting [0;1;39mPOSIX Message Queue File System[0m...
[  245.075125] systemd[1]: Mounting Kernel Debug File System...
         Mounting [0;1;39mKernel Debug File System[0m...
[  245.084656] systemd[1]: Mounting Kernel Trace File System...
         Mounting [0;1;39mKernel Trace File System[0m...
[  245.176929] systemd[1]: Mounting Temporary Directory /tmp...
         Mounting [0;1;39mTemporary Directory /tmp[0m...
[  245.239385] systemd[1]: Starting Create List of Static Device Nodes...
         Starting [0;1;39mCreate List of Static Device Nodes[0m...
[  245.250639] systemd[1]: Starting Load Kernel Module configfs...
         Starting [0;1;39mLoad Kernel Module configfs[0m...
[  245.261695] systemd[1]: Starting Load Kernel Module drm...
         Starting [0;1;39mLoad Kernel Module drm[0m...
[  245.271612] systemd[1]: Starting Load Kernel Module fuse...
         Starting [0;1;39mLoad Kernel Module fuse[0m...
[  245.281691] systemd[1]: Starting Start psplash boot splash screen...
         Starting [0;1;39mStart psplash boot splash screen[0m...
[  245.603933] systemd[1]: Starting RPC Bind...
         Starting [0;1;39mRPC Bind[0m...
[  245.639435] systemd[1]: Starting File System Check on Root Device...
         Starting [0;1;39mFile System Check on Root Device[0m...
[  245.642177] systemd[1]: systemd-journald.service: unit configures an IP firewall, but the local system does not support BPF/cgroup firewalling.
[  245.644385] systemd[1]: (This warning is only shown for the first unit using IP firewalling.)
[  245.671335] systemd[1]: Starting Journal Service...
         Starting [0;1;39mJournal Service[0m...
[  246.105533] kmod (903) used greatest stack depth: 26136 bytes left
[  246.178430] systemd[1]: Starting Load Kernel Modules...
         Starting [0;1;39mLoad Kernel Modules[0m...
[  246.191975] systemd[1]: Starting Generate network units from Kernel command line...
         Starting [0;1;39mGenerate network …ts from Kernel command line[0m...
[  246.201581] systemd[1]: Starting Coldplug All udev Devices...
         Starting [0;1;39mColdplug All udev Devices[0m...
[  246.214971] systemd[1]: Mounted Huge Pages File System.
[[0;32m  OK  [0m] Mounted [0;1;39mHuge Pages File System[0m.
[  246.217391] systemd[1]: Mounted POSIX Message Queue File System.
[[0;32m  OK  [0m] Mounted [0;1;39mPOSIX Message Queue File System[0m.
[  246.219730] systemd[1]: Mounted Kernel Debug File System.
[[0;32m  OK  [0m] Mounted [0;1;39mKernel Debug File System[0m.
[  246.221977] systemd[1]: Mounted Kernel Trace File System.
[[0;32m  OK  [0m] Mounted [0;1;39mKernel Trace File System[0m.
[  246.224622] systemd[1]: Mounted Temporary Directory /tmp.
[[0;32m  OK  [0m] Mounted [0;1;39mTemporary Directory /tmp[0m.
[  246.228744] systemd[1]: Finished Create List of Static Device Nodes.
[[0;32m  OK  [0m] Finished [0;1;39mCreate List of Static Device Nodes[0m.
[  246.323482] systemd-network (913) used greatest stack depth: 25040 bytes left
[  246.330007] systemd[1]: Finished Generate network units from Kernel command line.
[[0;32m  OK  [0m] Finished [0;1;39mGenerate network units from Kernel command line[0m.
[  246.900717] systemd[1]: modprobe@configfs.service: Deactivated successfully.
[  246.904290] systemd[1]: Finished Load Kernel Module configfs.
[[0;32m  OK  [0m] Finished [0;1;39mLoad Kernel Module configfs[0m.
[  246.907982] systemd[1]: modprobe@drm.service: Deactivated successfully.
[  246.911116] systemd[1]: Finished Load Kernel Module drm.
[[0;32m  OK  [0m] Finished [0;1;39mLoad Kernel Module drm[0m.
[  246.915882] systemd[1]: modprobe@fuse.service: Deactivated successfully.
[  246.919284] systemd[1]: Finished Load Kernel Module fuse.
[[0;32m  OK  [0m] Finished [0;1;39mLoad Kernel Module fuse[0m.
[  246.922873] systemd[1]: FUSE Control File System was skipped because of a failed condition check (ConditionPathExists=/sys/fs/fuse/connections).
[  246.924952] systemd[1]: Kernel Configuration File System was skipped because of a failed condition check (ConditionPathExists=/sys/kernel/config).
[  247.058824] systemd[1]: Finished Load Kernel Modules.
[[0;32m  OK  [0m] Finished [0;1;39mLoad Kernel Modules[0m.
[  247.080624] systemd[1]: Starting Apply Kernel Variables...
         Starting [0;1;39mApply Kernel Variables[0m...
[  247.411201] systemd[1]: psplash-start.service: Main process exited, code=exited, status=255/EXCEPTION
[  247.416112] systemd[1]: psplash-start.service: Failed with result 'exit-code'.
[  247.422123] systemd[1]: Failed to start Start psplash boot splash screen.
[[0;1;31mFAILED[  247.423219] systemd[1]: Dependency failed for Start psplash-systemd progress communication helper.
[0m] Failed to start [0;1;39mStart psplash boot splash screen[  247.425069] systemd[1]: psplash-systemd.service: Job psplash-systemd.service/start failed with result 'dependency'.
[0m.
See 'systemctl status psplash-start.service' for details.
[[0;1;38;5;185mDEPEND[0m] Dependency failed for [0;1;39mStar…progress communication helper[0m.
[  247.975637] systemd[1]: Started Journal Service.
[[0;32m  OK  [0m] Started [0;1;39mJournal Service[0m.
[[0;32m  OK  [0m] Started [0;1;39mRPC Bind[0m.
[[0;32m  OK  [0m] Finished [0;1;39mApply Kernel Variables[0m.
[[0;32m  OK  [0m] Finished [0;1;39mColdplug All udev Devices[0m.
         Starting [0;1;39mWait for udev To …plete Device Initialization[0m...
[[0;32m  OK  [0m] Finished [0;1;39mFile System Check on Root Device[0m.
         Starting [0;1;39mRemount Root and Kernel File Systems[0m...
[  248.847302] EXT4-fs (sda): re-mounted. Quota mode: none.
[[0;32m  OK  [0m] Finished [0;1;39mRemount Root and Kernel File Systems[0m.
         Starting [0;1;39mFlush Journal to Persistent Storage[0m...
         Starting [0;1;39mCreate System Users[0m...
[  249.174173] systemd-journald[910]: Received client request to flush runtime journal.
[[0;32m  OK  [0m] Finished [0;1;39mFlush Journal to Persistent Storage[0m.
[[0;32m  OK  [0m] Finished [0;1;39mCreate System Users[0m.
         Starting [0;1;39mCreate Static Device Nodes in /dev[0m...
[[0;32m  OK  [0m] Finished [0;1;39mCreate Static Device Nodes in /dev[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mPreparation for Local File Systems[0m.
         Mounting [0;1;39m/var/volatile[0m...
         Starting [0;1;39mRule-based Manage…for Device Events and Files[0m...
[[0;32m  OK  [0m] Mounted [0;1;39m/var/volatile[0m.
         Starting [0;1;39mLoad/Save Random Seed[0m...
[[0;32m  OK  [0m] Reached target [0;1;39mLocal File Systems[0m.
         Starting [0;1;39mRebuild Dynamic Linker Cache[0m...
         Starting [0;1;39mCreate Volatile Files and Directories[0m...
[[0;32m  OK  [0m] Finished [0;1;39mLoad/Save Random Seed[0m.
         Starting [0;1;39mCommit a transient machine-id on disk[0m...
[[0;32m  OK  [0m] Finished [0;1;39mCreate Volatile Files and Directories[0m.
         Starting [0;1;39mRebuild Journal Catalog[0m...
         Starting [0;1;39mNetwork Time Synchronization[0m...
         Starting [0;1;39mRecord System Boot/Shutdown in UTMP[0m...
[[0;32m  OK  [0m] Finished [0;1;39mRecord System Boot/Shutdown in UTMP[0m.
[[0;32m  OK  [0m] Started [0;1;39mNetwork Time Synchronization[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mSystem Time Set[0m.
[[0;32m  OK  [0m] Finished [0;1;39mRebuild Journal Catalog[0m.
[[0;32m  OK  [0m] Started [0;1;39mRule-based Manager for Device Events and Files[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mLoad/Save RF …itch Status /dev/rfkill Watch[0m.
[  256.024734] virtio_net virtio0 enp0s3: renamed from eth0
[  256.081093] dmi_memory_id (969) used greatest stack depth: 25016 bytes left
[[0;32m  OK  [0m] Finished [0;1;39mCommit a transient machine-id on disk[0m.
[[0;32m  OK  [0m] Finished [0;1;39mWait for udev To Complete Device Initialization[0m.
[[0;32m  OK  [0m] Started [0;1;39mHardware RNG Entropy Gatherer Daemon[0m.
[[0m[0;31m*     [0m] A start job is running for Rebuild …amic Linker Cache (14s / no limit)
M[K[[0;1;31m*[0m[0;31m*    [0m] A start job is running for Rebuild …amic Linker Cache (14s / no limit)
M[K[[0;32m  OK  [0m] Finished [0;1;39mRebuild Dynamic Linker Cache[0m.
[K         Starting [0;1;39mUpdate is Completed[0m...
[[0;32m  OK  [0m] Finished [0;1;39mUpdate is Completed[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mSystem Initialization[0m.
[[0;32m  OK  [0m] Started [0;1;39mDaily rotation of log files[0m.
[[0;32m  OK  [0m] Started [0;1;39mDaily Cleanup of Temporary Directories[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mTimer Units[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mAvahi mDNS/DNS-SD Stack Activation Socket[0m.
[[0;32m  OK  [0m] Listening on [0;1;39mD-Bus System Message Bus Socket[0m.
         Starting [0;1;39msshd.socket[0m...
[[0;32m  OK  [0m] Listening on [0;1;39msshd.socket[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mSocket Units[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mBasic System[0m.
         Starting [0;1;39mACPI Event Daemon[0m...
[[0;32m  OK  [0m] Started [0;1;39mKernel Logging Service[0m.
[[0;32m  OK  [0m] Started [0;1;39mSystem Logging Service[0m.
[[0;32m  OK  [0m] Started [0;1;39mPeriodic Command Scheduler[0m.
         Starting [0;1;39mD-Bus System Message Bus[0m...
[[0;32m  OK  [0m] Started [0;1;39mGetty on tty1[0m.
         Starting [0;1;39mIPv6 Packet Filtering Framework[0m...
         Starting [0;1;39mIPv4 Packet Filtering Framework[0m...
         Starting [0;1;39mTelephony service[0m...
[[0;32m  OK  [0m] Started [0;1;39mSerial Getty on ttyS0[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mLogin Prompts[0m.
         Starting [0;1;39mResets System Activity Logs[0m...
         Starting [0;1;39mUser Login Management[0m...
         Starting [0;1;39mOpenSSH Key Generation[0m...
[[0;32m  OK  [0m] Started [0;1;39mACPI Event Daemon[0m.
[[0;32m  OK  [0m] Finished [0;1;39mIPv4 Packet Filtering Framework[0m.
[[0;32m  OK  [0m] Finished [0;1;39mIPv6 Packet Filtering Framework[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mPreparation for Network[0m.
         Starting [0;1;39mNetwork Configuration[0m...
[  260.491986] sadc (992) used greatest stack depth: 24816 bytes left
[[0;32m  OK  [0m] Finished [0;1;39mResets System Activity Logs[0m.
[[0;32m  OK  [0m] Started [0;1;39mD-Bus System Message Bus[0m.
[[0;32m  OK  [0m] Started [0;1;39mUser Login Management[0m.
[[0;32m  OK  [0m] Started [0;1;39mTelephony service[0m.
[  260.862675] systemd-journald[910]: Data hash table of /run/log/journal/c9bfa6f1c7364b65b78e39d5cbbfab79/system.journal has a fill level at 75.0 (10923 of 14563 items, 8388608 file size, 767 bytes per hash table item), suggesting rotation.
[  260.866303] systemd-journald[910]: /run/log/journal/c9bfa6f1c7364b65b78e39d5cbbfab79/system.journal: Journal header limits reached or header out-of-date, rotating.
[[0;32m  OK  [0m] Started [0;1;39mNetwork Configuration[0m.
         Starting [0;1;39mNetwork Name Resolution[0m...
[  261.860696] IPv4: martian source 255.255.255.255 from 10.66.16.15, on dev enp0s3
[  261.862304] ll header: 00000000: ff ff ff ff ff ff 52 54 00 4f 94 5e 08 00
[  261.863587] IPv4: martian source 255.255.255.255 from 10.66.16.201, on dev enp0s3
[  261.864438] ll header: 00000000: ff ff ff ff ff ff 00 1e c0 93 f0 f7 08 00
[  261.869373] IPv4: martian source 255.255.255.255 from 10.66.16.15, on dev enp0s3
[  261.870240] ll header: 00000000: ff ff ff ff ff ff 52 54 00 4f 94 5e 08 00
[  261.873347] IPv4: martian source 255.255.255.255 from 10.66.16.15, on dev enp0s3
[  261.874313] ll header: 00000000: ff ff ff ff ff ff 52 54 00 4f 94 5e 08 00
[[0;32m  OK  [0m] Started [0;1;39mNetwork Name Resolution[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mNetwork[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mHost and Network Name Lookups[0m.
         Starting [0;1;39mAvahi mDNS/DNS-SD Stack[0m...
[[0;32m  OK  [0m] Started [0;1;39mAvahi mDNS/DNS-SD Stack[0m.
[[0;32m  OK  [0m] Reached target [0;1;39mMulti-User System[0m.
         Starting [0;1;39mRecord Runlevel Change in UTMP[0m...
[[0;32m  OK  [0m] Finished [0;1;39mRecord Runlevel Change in UTMP[0m.
[[0;32m  OK  [0m] Finished [0;1;39mOpenSSH Key Generation[0m.
Linux-Kernel-Functional-Testing nodistro.0 intel-corei7-64 ttyS0
intel-corei7-64 login: root
root
7[r[999;999H[6nroot@intel-corei7-64:~# 
root@intel-corei7-64:~# #
#
root@intel-corei7-64:~# mkdir /lava-5866612
mkdir /lava-5866612
root@intel-corei7-64:~# mount /dev/disk/by-uuid/726912c1-debc-4d0b-8cb6-c5a785e2618c -t ext2 /lava-5866612
mount /dev/disk/by-uuid/726912c1-debc-4d0b-8cb6-c5a785e26618c -t ext2 /lava-5866612
[  270.023804] EXT4-fs (vda): mounting ext2 file system using the ext4 subsystem
[  270.120741] EXT4-fs (vda): mounted filesystem without journal. Quota mode: none.
root@intel-corei7-64:~# ls -la /lava-5866612/bin/lava-test-runner
ls -la /lava-5866612/bin/lava-test-runner
-rwxr-xr-x 1 root root 1039 Nov 21 06:13 /lava-5866612/bin/lava-test-runner
root@intel-corei7-64:~# export SHELL=/bin/sh
export SHELL=/bin/sh
root@intel-corei7-64:~# . /lava-5866612/environment
. /lava-5866612/environment
root@intel-corei7-64:~# /lava-5866612/bin/lava-test-runner /lava-5866612/0
/lava-5866612/bin/lava-test-runner /lava-5866612/0
+ export TESTRUN_ID=0_prep-inline
+ TESTRUN_ID=0_prep-inline
+ cd /lava-5866612/0/tests/0_prep-inline
++ cat uuid
+ UUID=5866612_1.1.3.1
+ set +x
<LAVA_SIGNAL_STARTRUN 0_prep-inline 5866612_1.1.3.1>
+ ln -sf /lib /lib64
+ set +x
<LAVA_SIGNAL_ENDRUN 0_prep-inline 5866612_1.1.3.1>
<LAVA_TEST_RUNNER EXIT>#
root@intel-corei7-64:~# #mkdir /lava-5866612
root@intel-corei7-64:~# mkdir /lava-5866612mount /dev/disk/by-uuid/726912c1-debc-4d0b-8cb6-c5a785e2618c -t ext2 /lava-5866612
mkdir: cannot create directory '/lava-5866612': File exists
root@intel-corei7-64:~# mount /dev/disk/by-uuid/726912c1-debc-4d0b-8cb6-c5a785e26618c -t ext2 /lava-5866612ls -la /lava-5866612/bin/lava-test-runner
mount: /lava-5866612: /dev/vda already mounted on /lava-5866612.
root@intel-corei7-64:~# ls -la /lava-5866612/bin/lava-test-runnerexport SHELL=/bin/sh
-rwxr-xr-x 1 root root 1039 Nov 21 06:13 /lava-5866612/bin/lava-test-runner
root@intel-corei7-64:~# export SHELL=/bin/sh. /lava-5866612/environment
root@intel-corei7-64:~# . /lava-5866612/environment/lava-5866612/bin/lava-test-runner /lava-5866612/1
root@intel-corei7-64:~# /lava-5866612/bin/lava-test-runner /lava-5866612/1
+ export TESTRUN_ID=1_prep-tmp-disk
+ TESTRUN_ID=1_prep-tmp-disk
+ cd /lava-5866612/1/tests/1_prep-tmp-disk
++ cat uuid
+ UUID=5866612_1.1.3.5
+ set +x
<LAVA_SIGNAL_STARTRUN 1_prep-tmp-disk 5866612_1.1.3.5>
+ df -h
Filesystem      Size  Used Avail Use% Mounted on
/dev/root       3.7G  1.9G  1.6G  54% /
devtmpfs        1.7G     0  1.7G   0% /dev
tmpfs           1.7G     0  1.7G   0% /dev/shm
tmpfs           674M   13M  662M   2% /run
tmpfs           4.0M     0  4.0M   0% /sys/fs/cgroup
tmpfs           1.7G     0  1.7G   0% /tmp
tmpfs           1.7G   20K  1.7G   1% /var/volatile
/dev/vda        504M   75M  404M  16% /lava-5866612
+ ln -s /tmp /scratch
+ set +x
<LAVA_SIGNAL_ENDRUN 1_prep-tmp-disk 5866612_1.1.3.5>
+ export TESTRUN_ID=2_kunit
+ TESTRUN_ID=2_kunit
+ cd /lava-5866612/1/tests/2_kunit
++ cat uuid
+ UUID=5866612_1.1.3.9
+ set +x
<LAVA_SIGNAL_STARTRUN 2_kunit 5866612_1.1.3.9>
+ cd ./automated/linux/kunit/
+ ./kunit.sh -m test.ko
/lib/modules/6.1.0-rc5-next-20221117/kernel/kernel/trace/preemptirq_delay_test.ko
/lib/modules/6.1.0-rc5-next-20221117/kernel/drivers/usb/misc/usbtest.ko
preemptirq_delay_test
usbtest
KUNIT_TEST_MODULE=preemptirq_delay_test.ko
KUNIT_TEST_MODULE=usbtest.ko
modprobe-preemptirq_delay_test pass
Module                  Size  Used by
preemptirq_delay_test    16384  0
[  279.696290] usbcore: registered new interface driver usbtest
modprobe-usbtest pass
Module                  Size  Used by
usbtest                81920  0
preemptirq_delay_test    16384  0
INFO: Kernel config CONFIG_KUNIT_TEST=y not enabled
dmesg pass
[   13.164344]     ok 36 - kasan_alloca_oob_left
[   13.220581]     ok 37 - kasan_alloca_oob_right
[   13.270893]     ok 38 - ksize_unpoisons_memory
[   13.440907]     ok 39 - ksize_uaf
[   13.524025]     ok 40 - kmem_cache_double_free
[   13.597555]     ok 41 - kmem_cache_invalid_free
[   13.670666]     ok 42 - kmem_cache_double_destroy
[   13.733327]     ok 43 - kasan_memchr
[   13.801860]     ok 44 - kasan_memcmp
[   14.152339]     ok 45 - kasan_strings
[   15.148890]     ok 46 - kasan_bitops_generic
[   15.149493]     ok 47 - kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.279635]     ok 48 - kmalloc_double_kzfree
[   15.383525]     ok 49 - rcu_uaf
[   15.457859]     ok 50 - workqueue_uaf
[   15.458309]     ok 51 - vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.459288]     ok 52 - vmalloc_oob # SKIP Test requires CONFIG_KASAN_VMALLOC=y
[   15.461002]     ok 53 - vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y
[   15.462492]     ok 54 - vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y
[   15.463969]     ok 55 - vmalloc_percpu # SKIP Test requires CONFIG_KASAN_SW_TAGS=y
[   15.465887]     ok 56 - match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.467782]     ok 57 - match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.469370]     ok 58 - match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n
[   15.475478] ok 5 - kasan
[   15.939490]     ok 1 - test_out_of_bounds_read
[   16.224757]     ok 2 - test_out_of_bounds_read-memcache
[   16.313291]     ok 3 - test_out_of_bounds_write
[   16.430848]     ok 4 - test_out_of_bounds_write-memcache
[   16.525051]     ok 5 - test_use_after_free_read
[   16.643947]     ok 6 - test_use_after_free_read-memcache
[   16.739199]     not ok 7 - test_double_free
[   16.853296]     ok 8 - test_double_free-memcache
[   16.939212]     not ok 9 - test_invalid_addr_free
[   17.055777]     ok 10 - test_invalid_addr_free-memcache
[   17.464571]     not ok 11 - test_corruption
[   17.999856]     ok 12 - test_corruption-memcache
[   20.252157]     ok 13 - test_free_bulk
[   22.033331]     ok 14 - test_free_bulk-memcache
[   22.033667]     ok 15 - test_init_on_free # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON)
[   22.034846]     ok 16 - test_init_on_free-memcache # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON)
[   22.137028]     ok 17 - test_kmalloc_aligned_oob_read
[   22.247690]     not ok 18 - test_kmalloc_aligned_oob_write
[   22.331560]     ok 19 - test_shrink_memcache
[   22.435915]     ok 20 - test_memcache_ctor
[   22.450777]     ok 21 - test_invalid_access
[   47.910539]     ok 22 - test_gfpzero
[   48.056878]     ok 23 - test_memcache_typesafe_by_rcu
[   48.141701]     ok 24 - test_krealloc
[   48.226011]     ok 25 - test_memcache_alloc_bulk
[   48.231068] not ok 6 - kfence
[   48.234644]     ok 1 - total_mapping_size_test
[   48.235246] ok 7 - binfmt_elf
[   48.238761]     ok 1 - total_mapping_size_test
[   48.239403] ok 8 - compat_binfmt_elf
[   48.242987]         ok 1 - 1901-12-13 Lower bound of 32bit < 0 timestamp, no extra bits
[   48.244242]         ok 2 - 1969-12-31 Upper bound of 32bit < 0 timestamp, no extra bits
[   48.246089]         ok 3 - 1970-01-01 Lower bound of 32bit >=0 timestamp, no extra bits
[   48.247749]         ok 4 - 2038-01-19 Upper bound of 32bit >=0 timestamp, no extra bits
[   48.249331]         ok 5 - 2038-01-19 Lower bound of 32bit <0 timestamp, lo extra sec bit on
[   48.250915]         ok 6 - 2106-02-07 Upper bound of 32bit <0 timestamp, lo extra sec bit on
[   48.252502]         ok 7 - 2106-02-07 Lower bound of 32bit >=0 timestamp, lo extra sec bit on
[   48.254211]         ok 8 - 2174-02-25 Upper bound of 32bit >=0 timestamp, lo extra sec bit on
[   48.255942]         ok 9 - 2174-02-25 Lower bound of 32bit <0 timestamp, hi extra sec bit on
[   48.257542]         ok 10 - 2242-03-16 Upper bound of 32bit <0 timestamp, hi extra sec bit on
[   48.259106]         ok 11 - 2242-03-16 Lower bound of 32bit >=0 timestamp, hi extra sec bit on
[   48.260658]         ok 12 - 2310-04-04 Upper bound of 32bit >=0 timestamp, hi extra sec bit on
[   48.262276]         ok 13 - 2310-04-04 Upper bound of 32bit>=0 timestamp, hi extra sec bit 1. 1 ns
[   48.263849]         ok 14 - 2378-04-22 Lower bound of 32bit>= timestamp. Extra sec bits 1. Max ns
[   48.265464]         ok 15 - 2378-04-22 Lower bound of 32bit >=0 timestamp. All extra sec bits on
[   48.267162]         ok 16 - 2446-05-10 Upper bound of 32bit >=0 timestamp. All extra sec bits on
[   48.269959]     ok 1 - inode_test_xtimestamp_decoding
[   48.271964] ok 9 - ext4_inode_test
[   48.274241]     ok 1 - fat_checksum_test
[   48.275513]         ok 1 - Earliest possible UTC (1980-01-01 00:00:00)
[   48.276543]         ok 2 - Latest possible UTC (2107-12-31 23:59:58)
[   48.277856]         ok 3 - Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC)
[   48.279049]         ok 4 - Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC)
[   48.280495]         ok 5 - Leap Day / Year (1996-02-29 00:00:00)
[   48.281873]         ok 6 - Year 2000 is leap year (2000-02-29 00:00:00)
[   48.283021]         ok 7 - Year 2100 not leap year (2100-03-01 00:00:00)
[   48.284359]         ok 8 - Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC)
[   48.285866]         ok 9 - Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC)
[   48.287346]         ok 10 - VFAT odd-second resolution (1999-12-31 23:59:59)
[   48.288671]         ok 11 - VFAT 10ms resolution (1980-01-01 00:00:00:0010)
[   48.290975]     ok 2 - fat_time_fat2unix_test
[   48.292984]         ok 1 - Earliest possible UTC (1980-01-01 00:00:00)
[   48.294010]         ok 2 - Latest possible UTC (2107-12-31 23:59:58)
[   48.295269]         ok 3 - Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC)
[   48.296526]         ok 4 - Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC)
[   48.297976]         ok 5 - Leap Day / Year (1996-02-29 00:00:00)
[   48.299428]         ok 6 - Year 2000 is leap year (2000-02-29 00:00:00)
[   48.300599]         ok 7 - Year 2100 not leap year (2100-03-01 00:00:00)
[   48.301911]         ok 8 - Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC)
[   48.303217]         ok 9 - Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC)
[   48.304654]         ok 10 - VFAT odd-second resolution (1999-12-31 23:59:59)
[   48.306113]         ok 11 - VFAT 10ms resolution (1980-01-01 00:00:00:0010)
[   48.308394]     ok 3 - fat_time_unix2fat_test
[   48.311014] ok 10 - fat_test
[   48.313336]     ok 1 - test_cpumask_weight
[   48.314025]     ok 2 - test_cpumask_first
[   48.314886]     ok 3 - test_cpumask_last
[   48.315770]     ok 4 - test_cpumask_next
[   48.316636]     ok 5 - test_cpumask_iterators
[   48.317690]     ok 6 - test_cpumask_iterators_builtin
[   48.320529] ok 11 - cpumask
[   48.323336]     ok 1 - test_string_or
[   48.340643]     ok 2 - test_hash_or
[   48.342741] ok 12 - hash
[   48.353499]     ok 1 - list_sort_test
[   48.353926] ok 13 - list_sort
[   48.356393]     ok 1 - test_sort
[   48.356773] ok 14 - lib_sort
[   48.365541]     ok 1 - test_kprobe
[   48.376118]     ok 2 - test_kprobes
[   48.383336]     ok 3 - test_kretprobe
[   48.396695]     ok 4 - test_kretprobes
[   48.404313]     ok 5 - test_stacktrace_on_kretprobe
[   48.419020]     ok 6 - test_stacktrace_on_nested_kretprobe
[   48.423210] ok 15 - kprobes_test
[   48.427028]     ok 1 - parse_filter_test
[   48.427994]     ok 2 - filter_suites_test
[   48.429054]     ok 3 - filter_suites_test_glob_test
[   48.430092]     ok 4 - filter_suites_to_empty_test
[   48.433110] ok 16 - kunit_executor_test
[   48.436012]     ok 1 - kunit_test_try_catch_successful_try_no_catch
[   48.436920]     ok 2 - kunit_test_try_catch_unsuccessful_try_does_catch
[   48.440144] ok 17 - kunit-try-catch-test
[   48.442719]     ok 1 - kunit_resource_test_init_resources
[   48.443407]     ok 2 - kunit_resource_test_alloc_resource
[   48.444534]     ok 3 - kunit_resource_test_destroy_resource
[   48.445770]     ok 4 - kunit_resource_test_remove_resource
[   48.447123]     ok 5 - kunit_resource_test_cleanup_resources
[   48.448454]     ok 6 - kunit_resource_test_proper_free_ordering
[   48.449617]     ok 7 - kunit_resource_test_static
[   48.450925]     ok 8 - kunit_resource_test_named
[   48.453833] ok 18 - kunit-resource-test
[   48.460436]     ok 1 - kunit_log_test
[   48.460948] ok 19 - kunit-log-test
[   48.463107]     ok 1 - kunit_status_set_failure_test
[   48.463758]     ok 2 - kunit_status_mark_skipped_test
[   48.467862] ok 20 - kunit_status
[   48.472027]     ok 1 - string_stream_test_empty_on_creation
[   48.473043]     ok 2 - string_stream_test_not_empty_after_add
[   48.474401]     ok 3 - string_stream_test_get_string
[   48.477139] ok 21 - string-stream-test
[   48.481718]     ok 1 - example_simple_test
[   48.484713]     ok 2 - example_skip_test # SKIP this test should be skipped
[   48.491685]     ok 3 - example_mark_skipped_test # SKIP this test should be skipped
[   48.498330]     ok 4 - example_all_expect_macros_test
[   48.500986] ok 22 - example
[   48.504883]         ok 1 - Exceeds bounds, semi-convergent term > 1/2 last term
[   48.506429]         ok 2 - Exceeds bounds, semi-convergent term < 1/2 last term
[   48.508351]         ok 3 - Closest to zero
[   48.509757]         ok 4 - Closest to smallest non-zero
[   48.510694]         ok 5 - Use convergent
[   48.511795]         ok 6 - Exact answer
[   48.512711]         ok 7 - Semiconvergent, numerator limit
[   48.513576]         ok 8 - Semiconvergent, denominator limit
[   48.515375]     ok 1 - rational_test
[   48.516844] ok 23 - rational
[   48.521591]     ok 1 - test_bitfields_constants
[   48.522783]     ok 2 - test_bitfields_variables
[   48.526702] ok 24 - bitfields
[   48.529182]     ok 1 - list_test_list_init
[   48.529770]     ok 2 - list_test_list_add
[   48.530754]     ok 3 - list_test_list_add_tail
[   48.531686]     ok 4 - list_test_list_del
[   48.532646]     ok 5 - list_test_list_replace
[   48.533526]     ok 6 - list_test_list_replace_init
[   48.534500]     ok 7 - list_test_list_swap
[   48.535515]     ok 8 - list_test_list_del_init
[   48.536468]     ok 9 - list_test_list_del_init_careful
[   48.537411]     ok 10 - list_test_list_move
[   48.538563]     ok 11 - list_test_list_move_tail
[   48.539527]     ok 12 - list_test_list_bulk_move_tail
[   48.540521]     ok 13 - list_test_list_is_head
[   48.541593]     ok 14 - list_test_list_is_first
[   48.542610]     ok 15 - list_test_list_is_last
[   48.543689]     ok 16 - list_test_list_empty
[   48.544662]     ok 17 - list_test_list_empty_careful
[   48.545632]     ok 18 - list_test_list_rotate_left
[   48.546687]     ok 19 - list_test_list_rotate_to_front
[   48.547677]     ok 20 - list_test_list_is_singular
[   48.548782]     ok 21 - list_test_list_cut_position
[   48.549795]     ok 22 - list_test_list_cut_before
[   48.550810]     ok 23 - list_test_list_splice
[   48.551800]     ok 24 - list_test_list_splice_tail
[   48.552730]     ok 25 - list_test_list_splice_init
[   48.553711]     ok 26 - list_test_list_splice_tail_init
[   48.554673]     ok 27 - list_test_list_entry
[   48.555749]     ok 28 - list_test_list_entry_is_head
[   48.556673]     ok 29 - list_test_list_first_entry
[   48.557744]     ok 30 - list_test_list_last_entry
[   48.558704]     ok 31 - list_test_list_first_entry_or_null
[   48.559683]     ok 32 - list_test_list_next_entry
[   48.560747]     ok 33 - list_test_list_prev_entry
[   48.561690]     ok 34 - list_test_list_for_each
[   48.562648]     ok 35 - list_test_list_for_each_prev
[   48.563578]     ok 36 - list_test_list_for_each_safe
[   48.564572]     ok 37 - list_test_list_for_each_prev_safe
[   48.565584]     ok 38 - list_test_list_for_each_entry
[   48.566645]     ok 39 - list_test_list_for_each_entry_reverse
[   48.569340] ok 25 - list-kunit-test
[   48.571538]     ok 1 - hlist_test_init
[   48.572126]     ok 2 - hlist_test_unhashed
[   48.572977]     ok 3 - hlist_test_unhashed_lockless
[   48.573864]     ok 4 - hlist_test_del
[   48.574856]     ok 5 - hlist_test_del_init
[   48.575653]     ok 6 - hlist_test_add
[   48.576500]     ok 7 - hlist_test_fake
[   48.577298]     ok 8 - hlist_test_is_singular_node
[   48.578058]     ok 9 - hlist_test_empty
[   48.579002]     ok 10 - hlist_test_move_list
[   48.579831]     ok 11 - hlist_test_entry
[   48.580719]     ok 12 - hlist_test_entry_safe
[   48.581563]     ok 13 - hlist_test_for_each
[   48.582462]     ok 14 - hlist_test_for_each_safe
[   48.583321]     ok 15 - hlist_test_for_each_entry
[   48.584226]     ok 16 - hlist_test_for_each_entry_continue
[   48.585186]     ok 17 - hlist_test_for_each_entry_from
[   48.586309]     ok 18 - hlist_test_for_each_entry_safe
[   48.588736] ok 26 - hlist
[   48.590953]     ok 1 - genmask_test
[   48.591673]     ok 2 - genmask_ull_test
[   48.592494]     ok 3 - genmask_input_check_test
[   48.594674] ok 27 - bits-test
[   48.596760]     ok 1 - cmdline_test_noint
[   48.597413]     ok 2 - cmdline_test_lead_int
[   48.598400]     ok 3 - cmdline_test_tail_int
[   48.599422]     ok 4 - cmdline_test_range
[   48.601574] ok 28 - cmdline
[   48.607157]     ok 1 - test_clobber_zone
[   48.610276]     ok 2 - test_clobber_redzone_free
[   48.612535] ok 29 - slub_test
[   48.615232]     # memset_test: ok: memset() direct assignment
[   48.617243]     # memset_test: ok: memset() complete overwrite
[   48.618610]     # memset_test: ok: memset() middle overwrite
[   48.619914]     # memset_test: ok: memset() argument side-effects
[   48.621346]     # memset_test: ok: memset() memset_after()
[   48.622622]     # memset_test: ok: memset() memset_startat()
[   48.623997]     ok 1 - memset_test
[   48.624433]     # memcpy_test: ok: memcpy() static initializers
[   48.627967]     # memcpy_test: ok: memcpy() direct assignment
[   48.630301]     # memcpy_test: ok: memcpy() complete overwrite
[   48.632416]     # memcpy_test: ok: memcpy() middle overwrite
[   48.634379]     # memcpy_test: ok: memcpy() argument side-effects
[   48.635349]     ok 2 - memcpy_test
[   54.198508]     ok 3 - memcpy_large_test
[   54.199653]     # memmove_test: ok: memmove() static initializers
[   54.201367]     # memmove_test: ok: memmove() direct assignment
[   54.202352]     # memmove_test: ok: memmove() complete overwrite
[   54.203332]     # memmove_test: ok: memmove() middle overwrite
[   54.204289]     # memmove_test: ok: memmove() argument side-effects
[   54.205346]     # memmove_test: ok: memmove() overlapping write
[   54.206383]     ok 4 - memmove_test
[   59.681912]     ok 5 - memmove_large_test
[   70.810445]     ok 6 - memmove_overlap_test
[   70.811832]     ok 7 - strtomem_test
[   70.819373] ok 30 - memcpy
[   70.824122]     ok 1 - is_signed_type_test
[   70.824606] ok 31 - is_signed_type
[   70.831527]     ok 1 - u8_u8__u8_overflow_test
[   70.835935]     ok 2 - s8_s8__s8_overflow_test
[   70.839786]     ok 3 - u16_u16__u16_overflow_test
[   70.843995]     ok 4 - s16_s16__s16_overflow_test
[   70.849022]     ok 5 - u32_u32__u32_overflow_test
[   70.853323]     ok 6 - s32_s32__s32_overflow_test
[   70.856983]     ok 7 - u64_u64__u64_overflow_test
[   70.860658]     ok 8 - s64_s64__s64_overflow_test
[   70.864333]     ok 9 - u32_u32__int_overflow_test
[   70.867913]     ok 10 - u32_u32__u8_overflow_test
[   70.871420]     ok 11 - u8_u8__int_overflow_test
[   70.875506]     ok 12 - int_int__u8_overflow_test
[   70.878957]     ok 13 - shift_sane_test
[   70.882052]     ok 14 - shift_overflow_test
[   70.885356]     ok 15 - shift_truncate_test
[   70.888889]     ok 16 - shift_nonsense_test
[   70.891390]     ok 17 - overflow_allocation_test
[   70.893650]     ok 18 - overflow_size_helpers_test
[   70.897310]     ok 19 - overflows_type_test
[   70.900477]     ok 20 - same_type_test
[   70.903721]     ok 21 - castable_to_type_test
[   70.906273] ok 32 - overflow
[   70.910061]     ok 1 - test_u8_zero
[   70.911058]     ok 2 - test_u16_zero
[   70.912339]     ok 3 - test_u32_zero
[   70.913619]     ok 4 - test_u64_zero
[   70.915133]     ok 5 - test_char_array_zero
[   70.917043]     ok 6 - test_small_hole_zero
[   70.918617]     ok 7 - test_big_hole_zero
[   70.919892]     ok 8 - test_trailing_hole_zero
[   70.920890]     ok 9 - test_packed_zero
[   70.921909]     ok 10 - test_small_hole_dynamic_partial
[   70.922833]     ok 11 - test_big_hole_dynamic_partial
[   70.924066]     ok 12 - test_trailing_hole_dynamic_partial
[   70.925162]     ok 13 - test_packed_dynamic_partial
[   70.926392]     ok 14 - test_small_hole_assigned_dynamic_partial
[   70.927466]     ok 15 - test_big_hole_assigned_dynamic_partial
[   70.928779]     ok 16 - test_trailing_hole_assigned_dynamic_partial
[   70.930020]     ok 17 - test_packed_assigned_dynamic_partial
[   70.931290]     ok 18 - test_small_hole_static_partial
[   70.932534]     ok 19 - test_big_hole_static_partial
[   70.933614]     ok 20 - test_trailing_hole_static_partial
[   70.934667]     ok 21 - test_packed_static_partial
[   70.935866]     ok 22 - test_small_hole_static_all # SKIP XFAIL uninit bytes: 3
[   70.938120]     ok 23 - test_big_hole_static_all # SKIP XFAIL uninit bytes: 124
[   70.939579]     ok 24 - test_trailing_hole_static_all # SKIP XFAIL uninit bytes: 7
[   70.941123]     ok 25 - test_packed_static_all
[   70.941402]     ok 26 - test_small_hole_dynamic_all # SKIP XFAIL uninit bytes: 3
[   70.943673]     ok 27 - test_big_hole_dynamic_all # SKIP XFAIL uninit bytes: 124
[   70.945360]     ok 28 - test_trailing_hole_dynamic_all # SKIP XFAIL uninit bytes: 7
[   70.946922]     ok 29 - test_packed_dynamic_all
[   70.947211]     ok 30 - test_small_hole_runtime_partial # SKIP XFAIL uninit bytes: 23
[   70.949604]     ok 31 - test_big_hole_runtime_partial # SKIP XFAIL uninit bytes: 127
[   70.951171]     ok 32 - test_trailing_hole_runtime_partial # SKIP XFAIL uninit bytes: 24
[   70.952752]     ok 33 - test_packed_runtime_partial # SKIP XFAIL uninit bytes: 24
[   70.954222]     ok 34 - test_small_hole_runtime_all # SKIP XFAIL uninit bytes: 3
[   70.955651]     ok 35 - test_big_hole_runtime_all # SKIP XFAIL uninit bytes: 124
[   70.957114]     ok 36 - test_trailing_hole_runtime_all # SKIP XFAIL uninit bytes: 7
[   70.959041]     ok 37 - test_packed_runtime_all
[   70.959426]     ok 38 - test_small_hole_assigned_static_partial
[   70.960517]     ok 39 - test_big_hole_assigned_static_partial
[   70.961740]     ok 40 - test_trailing_hole_assigned_static_partial
[   70.962908]     ok 41 - test_packed_assigned_static_partial
[   70.964139]     ok 42 - test_small_hole_assigned_static_all # SKIP XFAIL uninit bytes: 3
[   70.966638]     ok 43 - test_big_hole_assigned_static_all # SKIP XFAIL uninit bytes: 124
[   70.968199]     ok 44 - test_trailing_hole_assigned_static_all # SKIP XFAIL uninit bytes: 7
[   70.969855]     ok 45 - test_packed_assigned_static_all
[   70.970172]     ok 46 - test_small_hole_assigned_dynamic_all # SKIP XFAIL uninit bytes: 3
[   70.972548]     ok 47 - test_big_hole_assigned_dynamic_all # SKIP XFAIL uninit bytes: 124
[   70.974160]     ok 48 - test_trailing_hole_assigned_dynamic_all # SKIP XFAIL uninit bytes: 7
[   70.975768]     ok 49 - test_packed_assigned_dynamic_all
[   70.976002]     ok 50 - test_small_hole_assigned_copy # SKIP XFAIL uninit bytes: 3
[   70.978395]     ok 51 - test_big_hole_assigned_copy # SKIP XFAIL uninit bytes: 124
[   70.979855]     ok 52 - test_trailing_hole_assigned_copy # SKIP XFAIL uninit bytes: 7
[   70.981428]     ok 53 - test_packed_assigned_copy
[   70.981700]     ok 54 - test_u8_none # SKIP XFAIL uninit bytes: 1
[   70.983682]     ok 55 - test_u16_none # SKIP XFAIL uninit bytes: 2
[   70.984931]     ok 56 - test_u32_none # SKIP XFAIL uninit bytes: 4
[   70.986185]     ok 57 - test_u64_none # SKIP XFAIL uninit bytes: 8
[   70.987449]     ok 58 - test_char_array_none # SKIP XFAIL uninit bytes: 16
[   70.988869]     ok 59 - test_switch_1_none # SKIP XFAIL uninit bytes: 80
[   70.990408]     ok 60 - test_switch_2_none # SKIP XFAIL uninit bytes: 80
[   70.991820]     ok 61 - test_small_hole_none # SKIP XFAIL uninit bytes: 24
[   70.993270]     ok 62 - test_big_hole_none # SKIP XFAIL uninit bytes: 128
[   70.994725]     ok 63 - test_trailing_hole_none # SKIP XFAIL uninit bytes: 32
[   70.996283]     ok 64 - test_packed_none # SKIP XFAIL uninit bytes: 32
[   70.997633]     ok 65 - test_user # SKIP XFAIL uninit bytes: 32
[   70.999504] ok 33 - stackinit
[   71.001986]     ok 1 - strscpy_test
[   71.002544] ok 34 - strscpy
[   71.004925]     ok 1 - siphash_test
[   71.005368] ok 35 - siphash
[   71.010591]     ok 1 - drm_test_pick_cmdline_res_1920_1080_60
[   71.010996] ok 36 - drm_test_pick_cmdline
[   71.015628]     ok 1 - drm_test_buddy_alloc_limit
[   71.017530]     ok 2 - drm_test_buddy_alloc_range
[   71.019293]     ok 3 - drm_test_buddy_alloc_optimistic
[   71.021188]     ok 4 - drm_test_buddy_alloc_pessimistic
[   71.026381]     ok 5 - drm_test_buddy_alloc_smoke
[   71.028354]     ok 6 - drm_test_buddy_alloc_pathological
[   71.032426] ok 37 - drm_buddy
[   71.036650]     ok 1 - drm_test_cmdline_force_d_only
[   71.037669]     ok 2 - drm_test_cmdline_force_D_only_dvi
[   71.039421]     ok 3 - drm_test_cmdline_force_D_only_hdmi
[   71.041212]     ok 4 - drm_test_cmdline_force_D_only_not_digital
[   71.043012]     ok 5 - drm_test_cmdline_force_e_only
[   71.044466]     ok 6 - drm_test_cmdline_res
[   71.045640]     ok 7 - drm_test_cmdline_res_vesa
[   71.046676]     ok 8 - drm_test_cmdline_res_vesa_rblank
[   71.047766]     ok 9 - drm_test_cmdline_res_rblank
[   71.048955]     ok 10 - drm_test_cmdline_res_bpp
[   71.050243]     ok 11 - drm_test_cmdline_res_refresh
[   71.051585]     ok 12 - drm_test_cmdline_res_bpp_refresh
[   71.052676]     ok 13 - drm_test_cmdline_res_bpp_refresh_interlaced
[   71.053966]     ok 14 - drm_test_cmdline_res_bpp_refresh_margins
[   71.055423]     ok 15 - drm_test_cmdline_res_bpp_refresh_force_off
[   71.056707]     ok 16 - drm_test_cmdline_res_bpp_refresh_force_on
[   71.058033]     ok 17 - drm_test_cmdline_res_bpp_refresh_force_on_analog
[   71.059471]     ok 18 - drm_test_cmdline_res_bpp_refresh_force_on_digital
[   71.060917]     ok 19 - drm_test_cmdline_res_bpp_refresh_interlaced_margins_force_on
[   71.062654]     ok 20 - drm_test_cmdline_res_margins_force_on
[   71.064239]     ok 21 - drm_test_cmdline_res_vesa_margins
[   71.065605]     ok 22 - drm_test_cmdline_name
[   71.066852]     ok 23 - drm_test_cmdline_name_bpp
[   71.067876]     ok 24 - drm_test_cmdline_name_option
[   71.068936]     ok 25 - drm_test_cmdline_name_bpp_option
[   71.070157]     ok 26 - drm_test_cmdline_rotate_0
[   71.071334]     ok 27 - drm_test_cmdline_rotate_90
[   71.072342]     ok 28 - drm_test_cmdline_rotate_180
[   71.073396]     ok 29 - drm_test_cmdline_rotate_270
[   71.074413]     ok 30 - drm_test_cmdline_hmirror
[   71.075440]     ok 31 - drm_test_cmdline_vmirror
[   71.076445]     ok 32 - drm_test_cmdline_margin_options
[   71.077502]     ok 33 - drm_test_cmdline_multiple_options
[   71.078631]     ok 34 - drm_test_cmdline_bpp_extra_and_option
[   71.079759]     ok 35 - drm_test_cmdline_extra_and_option
[   71.080925]     ok 36 - drm_test_cmdline_freestanding_options
[   71.082071]     ok 37 - drm_test_cmdline_freestanding_force_e_and_options
[   71.083339]     ok 38 - drm_test_cmdline_panel_orientation
[   71.085803]         ok 1 - margin_only
[   71.087060]         ok 2 - interlace_only
[   71.088053]         ok 3 - res_missing_x
[   71.089118]         ok 4 - res_missing_y
[   71.090193]         ok 5 - res_bad_y
[   71.092005]         ok 6 - res_missing_y_bpp
[   71.093032]         ok 7 - res_bad_bpp
[   71.094606]         ok 8 - res_bad_refresh
[   71.096736]         ok 9 - res_bpp_refresh_force_on_off
[   71.098505]         ok 10 - res_invalid_mode
[   71.100498]         ok 11 - res_bpp_wrong_place_mode
[   71.102243]         ok 12 - name_bpp_refresh
[   71.104161]         ok 13 - name_refresh
[   71.105770]         ok 14 - name_refresh_wrong_mode
[   71.106763]         ok 15 - name_refresh_invalid_mode
[   71.107887]         ok 16 - rotate_multiple
[   71.109019]         ok 17 - rotate_invalid_val
[   71.110093]         ok 18 - rotate_truncated
[   71.111116]         ok 19 - invalid_option
[   71.112533]     ok 39 - drm_test_cmdline_invalid
[   71.115432] ok 38 - drm_cmdline_parser
[   71.118146]     ok 1 - drm_test_damage_iter_no_damage
[   71.118842]     ok 2 - drm_test_damage_iter_no_damage_fractional_src
[   71.119968]     ok 3 - drm_test_damage_iter_no_damage_src_moved
[   71.121276]     ok 4 - drm_test_damage_iter_no_damage_fractional_src_moved
[   71.122534]     ok 5 - drm_test_damage_iter_no_damage_not_visible
[   71.123932]     ok 6 - drm_test_damage_iter_no_damage_no_crtc
[   71.125195]     ok 7 - drm_test_damage_iter_no_damage_no_fb
[   71.126428]     ok 8 - drm_test_damage_iter_simple_damage
[   71.127649]     ok 9 - drm_test_damage_iter_single_damage
[   71.128784]     ok 10 - drm_test_damage_iter_single_damage_intersect_src
[   71.129954]     ok 11 - drm_test_damage_iter_single_damage_outside_src
[   71.131378]     ok 12 - drm_test_damage_iter_single_damage_fractional_src
[   71.132895]     ok 13 - drm_test_damage_iter_single_damage_intersect_fractional_src
[   71.134722]     ok 14 - drm_test_damage_iter_single_damage_outside_fractional_src
[   71.136727]     ok 15 - drm_test_damage_iter_single_damage_src_moved
[   71.138380]     ok 16 - drm_test_damage_iter_single_damage_fractional_src_moved
[   71.139834]     ok 17 - drm_test_damage_iter_damage
[   71.141458]     ok 18 - drm_test_damage_iter_damage_one_intersect
[   71.142656]     ok 19 - drm_test_damage_iter_damage_one_outside
[   71.143998]     ok 20 - drm_test_damage_iter_damage_src_moved
[   71.145461]     ok 21 - drm_test_damage_iter_damage_not_visible
[   71.148326] ok 39 - drm_damage_helper
[   71.153144]         ok 1 - Clock 154000 BPP 30 DSC disabled
[   71.155509]         ok 2 - Clock 234000 BPP 30 DSC disabled
[   71.157852]         ok 3 - Clock 297000 BPP 24 DSC disabled
[   71.159331]         ok 4 - Clock 332880 BPP 24 DSC enabled
[   71.160673]         ok 5 - Clock 324540 BPP 24 DSC enabled
[   71.162494]     ok 1 - drm_test_dp_mst_calc_pbn_mode
[   71.164879]         ok 1 - DP_ENUM_PATH_RESOURCES with port number
[   71.166577]         ok 2 - DP_POWER_UP_PHY with port number
[   71.167955]         ok 3 - DP_POWER_DOWN_PHY with port number
[   71.169348]         ok 4 - DP_ALLOCATE_PAYLOAD with SDP stream sinks
[   71.170685]         ok 5 - DP_ALLOCATE_PAYLOAD with port number
[   71.172081]         ok 6 - DP_ALLOCATE_PAYLOAD with VCPI
[   71.173468]         ok 7 - DP_ALLOCATE_PAYLOAD with PBN
[   71.174669]         ok 8 - DP_QUERY_PAYLOAD with port number
[   71.175952]         ok 9 - DP_QUERY_PAYLOAD with VCPI
[   71.177272]         ok 10 - DP_REMOTE_DPCD_READ with port number
[   71.178601]         ok 11 - DP_REMOTE_DPCD_READ with DPCD address
[   71.179964]         ok 12 - DP_REMOTE_DPCD_READ with max number of bytes
[   71.181448]         ok 13 - DP_REMOTE_DPCD_WRITE with port number
[   71.182923]         ok 14 - DP_REMOTE_DPCD_WRITE with DPCD address
[   71.184585]         ok 15 - DP_REMOTE_DPCD_WRITE with data array
[   71.185973]         ok 16 - DP_REMOTE_I2C_READ with port number
[   71.187348]         ok 17 - DP_REMOTE_I2C_READ with I2C device ID
[   71.188741]         ok 18 - DP_REMOTE_I2C_READ with transactions array
[   71.190167]         ok 19 - DP_REMOTE_I2C_WRITE with port number
[   71.191648]         ok 20 - DP_REMOTE_I2C_WRITE with I2C device ID
[   71.193303]         ok 21 - DP_REMOTE_I2C_WRITE with data array
[   71.195238]         ok 22 - DP_QUERY_STREAM_ENC_STATUS with stream ID
[   71.197152]         ok 23 - DP_QUERY_STREAM_ENC_STATUS with client ID
[   71.199763]         ok 24 - DP_QUERY_STREAM_ENC_STATUS with stream event
[   71.201719]         ok 25 - DP_QUERY_STREAM_ENC_STATUS with valid stream event
[   71.203105]         ok 26 - DP_QUERY_STREAM_ENC_STATUS with stream behavior
[   71.204723]         ok 27 - DP_QUERY_STREAM_ENC_STATUS with a valid stream behavior
[   71.207556]     ok 2 - drm_test_dp_mst_sideband_msg_req_decode
[   71.210728] ok 40 - drm_dp_mst_helper
[   71.213796]         ok 1 - single_pixel_source_buffer
[   71.215181]         ok 2 - single_pixel_clip_rectangle
[   71.216713]         ok 3 - well_known_colors
[   71.218057]         ok 4 - destination_pitch
[   71.219546]     ok 1 - drm_test_fb_xrgb8888_to_gray8
[   71.222278]         ok 1 - single_pixel_source_buffer
[   71.223918]         ok 2 - single_pixel_clip_rectangle
[   71.225635]         ok 3 - well_known_colors
[   71.227222]         ok 4 - destination_pitch
[   71.228798]     ok 2 - drm_test_fb_xrgb8888_to_rgb332
[   71.231695]         ok 1 - single_pixel_source_buffer
[   71.233695]         ok 2 - single_pixel_clip_rectangle
[   71.235155]         ok 3 - well_known_colors
[   71.236786]         ok 4 - destination_pitch
[   71.238411]     ok 3 - drm_test_fb_xrgb8888_to_rgb565
[   71.241136]         ok 1 - single_pixel_source_buffer
[   71.246297]         ok 2 - single_pixel_clip_rectangle
[   71.247693]         ok 3 - well_known_colors
[   71.248972]         ok 4 - destination_pitch
[   71.250498]     ok 4 - drm_test_fb_xrgb8888_to_rgb888
[   71.252880]         ok 1 - single_pixel_source_buffer
[   71.254276]         ok 2 - single_pixel_clip_rectangle
[   71.255546]         ok 3 - well_known_colors
[   71.256870]         ok 4 - destination_pitch
[   71.258450]     ok 5 - drm_test_fb_xrgb8888_to_xrgb2101010
[   71.261995] ok 41 - drm_format_helper_test
[   71.265185]     ok 1 - drm_test_format_block_width_invalid
[   71.266047]     ok 2 - drm_test_format_block_width_one_plane
[   71.267479]     ok 3 - drm_test_format_block_width_two_plane
[   71.268935]     ok 4 - drm_test_format_block_width_three_plane
[   71.270509]     ok 5 - drm_test_format_block_width_tiled
[   71.271997]     ok 6 - drm_test_format_block_height_invalid
[   71.273501]     ok 7 - drm_test_format_block_height_one_plane
[   71.274879]     ok 8 - drm_test_format_block_height_two_plane
[   71.276318]     ok 9 - drm_test_format_block_height_three_plane
[   71.277811]     ok 10 - drm_test_format_block_height_tiled
[   71.279351]     ok 11 - drm_test_format_min_pitch_invalid
[   71.280774]     ok 12 - drm_test_format_min_pitch_one_plane_8bpp
[   71.282299]     ok 13 - drm_test_format_min_pitch_one_plane_16bpp
[   71.283961]     ok 14 - drm_test_format_min_pitch_one_plane_24bpp
[   71.285592]     ok 15 - drm_test_format_min_pitch_one_plane_32bpp
[   71.287188]     ok 16 - drm_test_format_min_pitch_two_plane
[   71.288856]     ok 17 - drm_test_format_min_pitch_three_plane_8bpp
[   71.290481]     ok 18 - drm_test_format_min_pitch_tiled
[   71.293650] ok 42 - drm_format
[   71.296929]         ok 1 - ABGR8888 normal sizes
[   71.298540]         ok 2 - ABGR8888 max sizes
[   71.299681]         ok 3 - ABGR8888 pitch greater than min required
[   71.300807]         ok 4 - ABGR8888 pitch less than min required
[   71.302358]         ok 5 - ABGR8888 Invalid width
[   71.303756]         ok 6 - ABGR8888 Invalid buffer handle
[   71.304894]         ok 7 - No pixel format
[   71.306227]         ok 8 - ABGR8888 Width 0
[   71.307409]         ok 9 - ABGR8888 Height 0
[   71.308644]         ok 10 - ABGR8888 Out of bound height * pitch combination
[   71.309742]         ok 11 - ABGR8888 Large buffer offset
[   71.311422]         ok 12 - ABGR8888 Set DRM_MODE_FB_MODIFIERS without modifiers
[   71.312707]         ok 13 - ABGR8888 Valid buffer modifier
[   71.314360]         ok 14 - ABGR8888 Invalid buffer modifier(DRM_FORMAT_MOD_SAMSUNG_64_32_TILE)
[   71.315658]         ok 15 - ABGR8888 Extra pitches without DRM_MODE_FB_MODIFIERS
[   71.317644]         ok 16 - ABGR8888 Extra pitches with DRM_MODE_FB_MODIFIERS
[   71.319222]         ok 17 - NV12 Normal sizes
[   71.320776]         ok 18 - NV12 Max sizes
[   71.321869]         ok 19 - NV12 Invalid pitch
[   71.322882]         ok 20 - NV12 Invalid modifier/missing DRM_MODE_FB_MODIFIERS flag
[   71.323985]         ok 21 - NV12 different  modifier per-plane
[   71.325717]         ok 22 - NV12 with DRM_FORMAT_MOD_SAMSUNG_64_32_TILE
[   71.327077]         ok 23 - NV12 Valid modifiers without DRM_MODE_FB_MODIFIERS
[   71.328562]         ok 24 - NV12 Modifier for inexistent plane
[   71.330281]         ok 25 - NV12 Handle for inexistent plane
[   71.331729]         ok 26 - NV12 Handle for inexistent plane without DRM_MODE_FB_MODIFIERS
[   71.333170]         ok 27 - YVU420 Normal sizes
[   71.334890]         ok 28 - YVU420 DRM_MODE_FB_MODIFIERS set without modifier
[   71.335975]         ok 29 - YVU420 Max sizes
[   71.337541]         ok 30 - YVU420 Invalid pitch
[   71.338586]         ok 31 - YVU420 Different pitches
[   71.339717]         ok 32 - YVU420 Different buffer offsets/pitches
[   71.340899]         ok 33 - YVU420 Modifier set just for plane 0, without DRM_MODE_FB_MODIFIERS
[   71.342335]         ok 34 - YVU420 Modifier set just for planes 0, 1, without DRM_MODE_FB_MODIFIERS
[   71.344137]         ok 35 - YVU420 Modifier set just for plane 0, 1, with DRM_MODE_FB_MODIFIERS
[   71.346031]         ok 36 - YVU420 Valid modifier
[   71.347929]         ok 37 - YVU420 Different modifiers per plane
[   71.349190]         ok 38 - YVU420 Modifier for inexistent plane
[   71.350623]         ok 39 - X0L2 Normal sizes
[   71.352138]         ok 40 - X0L2 Max sizes
[   71.353433]         ok 41 - X0L2 Invalid pitch
[   71.354719]         ok 42 - X0L2 Pitch greater than minimum required
[   71.356075]         ok 43 - X0L2 Handle for inexistent plane
[   71.357769]         ok 44 - X0L2 Offset for inexistent plane, without DRM_MODE_FB_MODIFIERS set
[   71.359348]         ok 45 - X0L2 Modifier without DRM_MODE_FB_MODIFIERS set
[   71.361544]         ok 46 - X0L2 Valid modifier
[   71.363383]         ok 47 - X0L2 Modifier for inexistent plane
[   71.365317]     ok 1 - drm_test_framebuffer_create
[   71.367504] ok 43 - drm_framebuffer
[   71.371838]     ok 1 - drm_test_mm_init
[   71.372703]     ok 2 - drm_test_mm_debug
[   72.242797]     ok 3 - drm_test_mm_reserve
[  140.009204]     ok 4 - drm_test_mm_insert
[  206.485547]     ok 5 - drm_test_mm_replace
[  213.160469]     ok 6 - drm_test_mm_insert_range
[  213.287247]     # drm_test_mm_frag: bottom-up fragmented insert of 10000 and 20000 insertions took 34766286 and 70139403 nsecs
[  213.467892]     # drm_test_mm_frag: top-down fragmented insert of 10000 and 20000 insertions took 45182770 and 82471761 nsecs
[  213.534216]     ok 7 - drm_test_mm_frag
[  213.535443]     ok 8 - drm_test_mm_align
[  213.537931]     ok 9 - drm_test_mm_align32
[  213.540573]     ok 10 - drm_test_mm_align64
[  215.361664]     ok 11 - drm_test_mm_evict
[  216.676928]     ok 12 - drm_test_mm_evict_range
[  216.846826]     ok 13 - drm_test_mm_topdown
[  216.994637]     ok 14 - drm_test_mm_bottomup
[  216.996919]     ok 15 - drm_test_mm_lowest
[  216.998955]     ok 16 - drm_test_mm_highest
[  217.455460]     ok 17 - drm_test_mm_color
[  223.346040]     ok 18 - drm_test_mm_color_evict
[  228.687936]     ok 19 - drm_test_mm_color_evict_range
[  228.691077] ok 44 - drm_mm
[  228.694857]         ok 1 - clipping_simple
[  228.696743]         ok 2 - clipping_rotate_reflect
[  228.698216]         ok 3 - positioning_simple
[  228.699818]         ok 4 - upscaling
[  228.701484]         ok 5 - downscaling
[  228.702727]         ok 6 - rounding1
[  228.704007]         ok 7 - rounding2
[  228.705302]         ok 8 - rounding3
[  228.706529]         ok 9 - rounding4
[  228.708084]     ok 1 - drm_test_check_plane_state
[  228.711033]         ok 1 - positioning_invalid
[  228.712712]         ok 2 - upscaling_invalid
[  228.714042]         ok 3 - downscaling_invalid
[  228.715770]     ok 2 - drm_test_check_invalid_plane_state
[  228.719637] ok 45 - drm_plane_helper
[  228.724540]     ok 1 - drm_test_rect_clip_scaled_div_by_zero
[  228.725712]     ok 2 - drm_test_rect_clip_scaled_not_clipped
[  228.728167]     ok 3 - drm_test_rect_clip_scaled_clipped
[  228.729658]     ok 4 - drm_test_rect_clip_scaled_signed_vs_unsigned
[  228.732470] ok 46 - drm_rect
[  228.734749]     ok 1 - freq_qos_test_min
[  228.735405]     ok 2 - freq_qos_test_maxdef
[  228.736444]     ok 3 - freq_qos_test_readd
[  228.738770] ok 47 - qos-kunit-test
[  228.741615]     ok 1 - pe_test_uints
[  228.742927]     ok 2 - pe_test_uint_arrays
[  228.743999]     ok 3 - pe_test_strings
[  228.745148]     ok 4 - pe_test_bool
[  228.746091]     ok 5 - pe_test_move_inline_u8
[  228.747090]     ok 6 - pe_test_move_inline_str
[  228.748427]     ok 7 - pe_test_reference
[  228.750808] ok 48 - property-entry
[  232.102123]     ok 1 - rtc_time64_to_tm_test_date_range
[  232.103004] ok 49 - rtc_lib_test_cases
[  232.120544]     ok 1 - dev_addr_test_basic
[  232.130549]     ok 2 - dev_addr_test_sync_one
[  232.147543]     ok 3 - dev_addr_test_add_del
[  232.162722]     ok 4 - dev_addr_test_del_main
[  232.178642]     ok 5 - dev_addr_test_add_set
[  232.189500]     ok 6 - dev_addr_test_add_excl
[  232.194944] ok 50 - dev-addr-list-test
[  232.199565]     ok 1 - mptcp_crypto_test_basic
[  232.199949] ok 51 - mptcp-crypto
[  232.201361]     # Subtest: mptcp-token
[  232.202485]     ok 1 - mptcp_token_test_req_basic
[  232.203230]     ok 2 - mptcp_token_test_msk_basic
[  232.204472]     ok 3 - mptcp_token_test_accept
[  232.205639]     ok 4 - mptcp_token_test_destroyed
[  232.206405] # mptcp-token: pass:4 fail:0 skip:0 total:4
[  232.208122] ok 52 - mptcp-token

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect
  2022-11-21  7:28         ` Naresh Kamboju
@ 2022-11-21  8:43           ` Marco Elver
  0 siblings, 0 replies; 10+ messages in thread
From: Marco Elver @ 2022-11-21  8:43 UTC (permalink / raw)
  To: Naresh Kamboju
  Cc: Dave Hansen, Peter Zijlstra, kasan-dev, X86 ML, open list,
	linux-mm, regressions, lkft-triage, Andrew Morton,
	Alexander Potapenko

On Mon, 21 Nov 2022 at 08:28, Naresh Kamboju <naresh.kamboju@linaro.org> wrote:
>
> Hi Dave,
>
> On Fri, 18 Nov 2022 at 05:24, Dave Hansen <dave.hansen@intel.com> wrote:
> >
> > On 11/17/22 15:23, Marco Elver wrote:
> > > Yes - it's the 'level != PG_LEVEL_4K'.
> >
> > That plus the bisect made it pretty easy to find, thanks for the effort!
> >
> > Could you double-check that the attached patch fixes it?  It seemed to
> > for me.
>
> I have applied the attached patch on Linux next 20221118 and tested [1].
> The reported issue has been fixed now.
>
> Reported-by: Linux Kernel Functional Testing <lkft@linaro.org>
> Tested-by: Linux Kernel Functional Testing <lkft@linaro.org>
> Tested-by: Naresh Kamboju <naresh.kamboju@linaro.org>
>
> OTOH,
> I request you to walk through the boot and test log [1] (new see few failures).
>  not ok 7 - test_double_free
>  not ok 9 - test_invalid_addr_free
>  not ok 11 - test_corruption
>  not ok 18 - test_kmalloc_aligned_oob_write
>  # kfence: pass:19 fail:4 skip:2 total:25
>  # Totals: pass:19 fail:4 skip:2 total:25
>  not ok 6 - kfence

Fixed by https://lkml.kernel.org/r/20221118152216.3914899-1-elver@google.com

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2022-11-21  8:44 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-11-17 11:31 WARNING: CPU: 0 PID: 0 at arch/x86/include/asm/kfence.h:46 kfence_protect Naresh Kamboju
2022-11-17 13:58 ` Marco Elver
2022-11-17 14:34   ` Dave Hansen
2022-11-17 23:23     ` Marco Elver
2022-11-17 23:54       ` Dave Hansen
2022-11-18  9:19         ` Marco Elver
2022-11-18 10:32         ` Peter Zijlstra
2022-11-21  7:28         ` Naresh Kamboju
2022-11-21  8:43           ` Marco Elver
2022-11-21  5:40     ` Naresh Kamboju

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.