Build

Regressions (compared to v6.13-5252-gbc8198dc7ebc)

juno-r2-compat, ltp-controllers

qemu-arm64-compat, ltp-syscalls

qemu-arm64, ltp-syscalls

qemu-arm64, kselftest-cgroup

qemu-armv7, ltp-syscalls

qemu-armv7, kselftest-cgroup

qemu-armv7, ltp-fs

qemu-armv7, ltp-syscalls

qemu-x86_64, kselftest-x86

qemu-x86_64, ltp-syscalls

rk3399-rock-pi-4b, ltp-controllers

rk3399-rock-pi-4b, ltp-fs

rk3399-rock-pi-4b, kselftest-cgroup

x15, kselftest-cgroup

x86, kselftest-cgroup

x86_64, build

Fixes (compared to v6.13-5252-gbc8198dc7ebc)

arm, build

qemu-arm64-compat, ltp-cve

qemu-arm64-compat, ltp-syscalls

qemu-arm64, kselftest-net-mptcp

qemu-arm64, ltp-syscalls

qemu-arm64, kselftest-memfd

qemu-armv7, kselftest-timers

qemu-armv7, kselftest-seccomp

qemu-riscv64, ltp-fs

qemu-x86_64, kselftest-seccomp

qemu-x86_64, kselftest-tc-testing

qemu-x86_64, kselftest-timers

qemu-x86_64, ltp-fs

rk3399-rock-pi-4b-nvhe, kselftest-kvm

rk3399-rock-pi-4b-protected, kselftest-kvm

rk3399-rock-pi-4b-vhe, kselftest-kvm

rk3399-rock-pi-4b, ltp-cve

x86-compat, ltp-controllers

x86, ltp-controllers

Build Parser (compared to v6.13-5252-gbc8198dc7ebc)

arc, log-parser-build-gcc

arm, log-parser-build-clang

arm, log-parser-build-gcc

arm64, log-parser-build-clang

arm64, log-parser-build-gcc

i386, log-parser-build-gcc

s390, log-parser-build-gcc

x86_64, log-parser-build-clang

x86_64, log-parser-build-gcc

Boot Parser (compared to v6.13-5252-gbc8198dc7ebc)

qemu-arm64, log-parser-boot

qemu-x86_64, log-parser-boot

x15, log-parser-boot

Test Parser (compared to v6.13-5252-gbc8198dc7ebc)

qemu-arm64, log-parser-test

qemu-riscv64, log-parser-test

qemu-x86_64, log-parser-test

rk3399-rock-pi-4b, log-parser-test

x15, log-parser-test

Test log snippets

test log snippet regressions 1

memcg_test_3    memcg_test_3

test log snippet regressions 2

getrusage04 getrusage04
getrusage04    0  TINFO  :  Expected timers granularity is 4000 us
getrusage04    0  TINFO  :  Using 1 as multiply factor for max [us]time increment (1000+4000us)!
getrusage04    0  TINFO  :  utime:        6923us; stime:       43475us
getrusage04    0  TINFO  :  utime:        6935us; stime:       46943us
getrusage04    0  TINFO  :  utime:        6948us; stime:       50570us
getrusage04    0  TINFO  :  utime:        6958us; stime:       54359us
getrusage04    0  TINFO  :  utime:        9553us; stime:       54447us
getrusage04    0  TINFO  :  utime:        9559us; stime:       58099us
getrusage04    0  TINFO  :  utime:        9575us; stime:       61555us
getrusage04    0  TINFO  :  utime:        9581us; stime:       65217us
getrusage04    0  TINFO  :  utime:       13285us; stime:       65323us
getrusage04    0  TINFO  :  utime:       16905us; stime:       65324us
getrusage04    0  TINFO  :  utime:       20488us; stime:       65360us
getrusage04    0  TINFO  :  utime:       20881us; stime:       70438us
getrusage04    1  TFAIL  :  getrusage04.c:133: stime increased > 5000us:

test log snippet regressions 3

getrusage04 getrusage04
getrusage04    0  TINFO  :  Expected timers granularity is 4000 us
getrusage04    0  TINFO  :  Using 1 as multiply factor for max [us]time increment (1000+4000us)!
getrusage04    0  TINFO  :  utime:       18545us; stime:        9573us
getrusage04    0  TINFO  :  utime:       23793us; stime:        9806us
getrusage04    1  TFAIL  :  getrusage04.c:126: utime increased > 5000us:

test log snippet regressions 4

cgroup_test_kmem_test_kmem_dead_cgroups fail

test log snippet regressions 5

epoll_wait04 epoll_wait04
epoll_wait04.c:37: TFAIL: epoll_wait() waited for 3017us with a timeout equal to zero

test log snippet regressions 6

cgroup_test_cpu_test_cpucg_subtree_control pass
cgroup_test_cpu_test_cpucg_stats pass
cgroup_test_cpu_test_cpucg_nice pass
cgroup_test_cpu_test_cpucg_weight_overprovisioned pass
cgroup_test_cpu_test_cpucg_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail
cgroup_test_cpu_test_cpucg_nested_weight_underprovisioned skip
cgroup_test_cpu_test_cpucg_max pass
cgroup_test_cpu_test_cpucg_max_nested pass
cgroup_test_cpu fail
cgroup_test_cpuset skip
cgroup_test_cpuset_prs_sh skip
cgroup_test_cpuset_v1_hp_sh skip

test log snippet regressions 7

cgroup_test_cpu_test_cpucg_nested_weight_overprovisioned fail

test log snippet regressions 8

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 30331ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file2
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 38399ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 29037ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 15957ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 20071ms
fs_fill.c:115: TINFO: Running 4 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 10165ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file5
fs_fill.c:93: TPASS: Got 4 ENOSPC runtime 13394ms

test log snippet regressions 9

utime01 utime01
utime01.c:41: TPASS: stat_buf.st_atime == utbuf.actime (1737981862)
utime01.c:42: TPASS: stat_buf.st_mtime == utbuf.modtime (1737981861)
utime01.c:45: TPASS: utime(mntpoint/tmp_file, NULL) passed
utime01.c:41: TPASS: stat_buf.st_atime == utbuf.actime (1737981864)
utime01.c:42: TPASS: stat_buf.st_mtime == utbuf.modtime (1737981863)
utime01.c:45: TPASS: utime(mntpoint/tmp_file, NULL) passed
utime01.c:41: TPASS: stat_buf.st_atime == utbuf.actime (1737981865)
utime01.c:42: TPASS: stat_buf.st_mtime == utbuf.modtime (1737981864)
utime01.c:45: TPASS: utime(mntpoint/tmp_file, NULL) passed
utime01.c:41: TPASS: stat_buf.st_atime == utbuf.actime (1737981865)
utime01.c:42: TPASS: stat_buf.st_mtime == utbuf.modtime (1737981864)
utime01.c:45: TPASS: utime(mntpoint/tmp_file, NULL) passed
utime01.c:52: TFAIL: utime() did not set expected mtime, pre_time: 1737981869, post_time: 0, st_mtime: 1737981869
utime01.c:57: TFAIL: utime() did not set expected atime, pre_time: 1737981869, post_time: 0, st_atime: 1737981869

test log snippet regressions 10

x86_fsgsbase_64 fail

test log snippet regressions 11

x86_sigreturn_64 fail

test log snippet regressions 12

epoll_wait04 epoll_wait04
epoll_wait04.c:37: TFAIL: epoll_wait() waited for 2013us with a timeout equal to zero

test log snippet regressions 13

memcg_test_3    memcg_test_3

test log snippet regressions 14

fs_fill fs_fill
fs_fill.c:115: TINFO: Running 8 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 1035ms
fs_fill.c:115: TINFO: Running 8 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 1133ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/file5
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file5
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 1555ms
fs_fill.c:115: TINFO: Running 8 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 16 ENOSPC runtime 1000ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/file2
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/file1
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file3
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/file4
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/file2
fs_fill.c:93: TPASS: Got 14 ENOSPC runtime 1000ms
fs_fill.c:115: TINFO: Running 8 writer threads
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/AOF
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/AOF
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 4918ms
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread6/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread7/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread3/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread5/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread1/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread4/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread8/file0
fs_fill.c:55: TINFO: Unlinking mntpoint/subdir/thread2/file0
fs_fill.c:93: TPASS: Got 8 ENOSPC runtime 77656ms

test log snippet regressions 15

cgroup_test_cpu_test_cpucg_weight_overprovisioned fail

test log snippet regressions 16

cgroup_test_kmem_test_kmem_dead_cgroups fail

test log snippet regressions 17

cgroup_test_kmem_test_kmem_dead_cgroups fail

test log snippet regressions 18

None

test log snippet regressions 19

None

test log snippet build parser 1

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arc CROSS_COMPILE=arc-elf32- 'CC=sccache arc-elf32-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'nfsd4_get_drc_mem',
    inlined from 'check_forechannel_attrs' at /builds/linux/fs/nfsd/nfs4state.c:3791:16,
    inlined from 'nfsd4_create_session' at /builds/linux/fs/nfsd/nfs4state.c:3864:11:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_945' declared with attribute error: clamp() low limit slotsize greater than high limit total_avail/scale_factor
  542 |  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
      |                                      ^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
  523 |    prefix ## suffix();    \
      |    ^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
  542 |  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
      |  ^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
   39 | #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
      |                                     ^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
  188 |  BUILD_BUG_ON_MSG(statically_true(ulo > uhi),    \
      |  ^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
  195 |  __clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
      |  ^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:218:36: note: in expansion of macro '__careful_clamp'
  218 | #define clamp_t(type, val, lo, hi) __careful_clamp(type, val, lo, hi)
      |                                    ^~~~~~~~~~~~~~~
/builds/linux/fs/nfsd/nfs4state.c:1972:10: note: in expansion of macro 'clamp_t'
 1972 |  avail = clamp_t(unsigned long, avail, slotsize,
      |          ^~~~~~~

test log snippet build parser 2

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
uffd-wp-mremap.c:144:12: warning: format specifies type 'unsigned long' but the argument has type 'size_t' (aka 'unsigned int') [-Wformat]
  142 |                         ksft_test_result_fail("uffd-wp not %s for pte %lu!\n",
      |                                                                       ~~~
      |                                                                       %zu
  143 |                                               expect ? "set" : "clear",
  144 |                                               (addr - mem) / pagesize);
      |                                               ^~~~~~~~~~~~~~~~~~~~~~~

test log snippet build parser 3

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
uffd-wp-mremap.c:144:12: warning: format specifies type 'unsigned long' but the argument has type 'size_t' (aka 'unsigned int') [-Wformat]
  142 |                         ksft_test_result_fail("uffd-wp not %s for pte %lu!\n",
      |                                                                       ~~~
      |                                                                       %zu
  143 |                                               expect ? "set" : "clear",
  144 |                                               (addr - mem) / pagesize);
      |                                               ^~~~~~~~~~~~~~~~~~~~~~~

test log snippet build parser 4

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
  365 |                 cur = read(fds[0], new + total, transferred - total);
      |                                                 ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
  296 |         ssize_t cur, total, transferred;
      |                             ^~~~~~~~~~~

test log snippet build parser 5

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
In file included from migration.c:7:
uffd-wp-mremap.c: In function 'check_uffd_wp_state':
uffd-wp-mremap.c:142:73: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 'size_t' {aka 'unsigned int'} [-Wformat=]
  142 |                         ksft_test_result_fail("uffd-wp not %s for pte %lu!\n",
      |                                                                       ~~^
      |                                                                         |
      |                                                                         long unsigned int
      |                                                                       %u
  143 |                                               expect ? "set" : "clear",
  144 |                                               (addr - mem) / pagesize);
      |                                               ~~~~~~~~~~~~~~~~~~~~~~~    
      |                                                            |
      |                                                            size_t {aka unsigned int}

test log snippet build parser 6

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
  365 |                 cur = read(fds[0], new + total, transferred - total);
      |                                                 ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
  296 |         ssize_t cur, total, transferred;
      |                             ^~~~~~~~~~~

test log snippet build parser 7

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=arm CROSS_COMPILE=arm-linux-gnueabihf- 'CC=sccache arm-linux-gnueabihf-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
In file included from migration.c:7:
uffd-wp-mremap.c: In function 'check_uffd_wp_state':
uffd-wp-mremap.c:142:73: warning: format '%lu' expects argument of type 'long unsigned int', but argument 3 has type 'size_t' {aka 'unsigned int'} [-Wformat=]
  142 |                         ksft_test_result_fail("uffd-wp not %s for pte %lu!\n",
      |                                                                       ~~^
      |                                                                         |
      |                                                                         long unsigned int
      |                                                                       %u
  143 |                                               expect ? "set" : "clear",
  144 |                                               (addr - mem) / pagesize);
      |                                               ~~~~~~~~~~~~~~~~~~~~~~~    
      |                                                            |
      |                                                            size_t {aka unsigned int}

test log snippet build parser 8

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/cs_dsp.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 9

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_bin.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 10

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_mem_maps.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 11

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_regmap.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 12

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_utils.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 13

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_mock_wmfw.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 14

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_bin_error.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 15

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_bin.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 16

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_callbacks.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 17

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_control_cache.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 18

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_control_parse.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 19

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_control_rw.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 20

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_wmfw_error.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 21

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_test_wmfw.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 22

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/firmware/cirrus/test/cs_dsp_tests.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 23

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 24

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 25

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 26

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 27

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 28

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 29

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(lib/math/tests/int_sqrt_kunit.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 30

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(lib/test_xarray.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 31

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 32

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 33

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 34

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 35

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 36

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 37

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 38

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 39

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 40

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 41

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 42

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 43

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 44

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 45

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 46

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 47

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 48

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 49

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 50

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 51

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 52

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 53

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 54

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 55

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs8300.o):(.ARM.attributes) is being placed in '.ARM.attributes'
make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/interconnect/qcom/qcs615.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 56

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/mtd/nand/qpic_common.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 57

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pci/pcie/tlp.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 58

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/pmdomain/mediatek/airoha-cpu-pmdomain.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 59

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/soc/imx/soc-imx9.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 60

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1
ld.lld: warning: vmlinux.a(drivers/watchdog/rzv2h_wdt.o):(.ARM.attributes) is being placed in '.ARM.attributes'

test log snippet build parser 61

make -C /builds/linux/tools/testing/selftests/../../../tools/arch/arm64/tools/ OUTPUT=/builds/linux/tools/testing/selftests/../../../tools/
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
  365 |                 cur = read(fds[0], new + total, transferred - total);
      |                                                 ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
  296 |         ssize_t cur, total, transferred;
      |                             ^~~~~~~~~~~

test log snippet build parser 62

make -C /builds/linux/tools/testing/selftests/../../../tools/arch/arm64/tools/ OUTPUT=/builds/linux/tools/testing/selftests/../../../tools/
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
  365 |                 cur = read(fds[0], new + total, transferred - total);
      |                                                 ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
  296 |         ssize_t cur, total, transferred;
      |                             ^~~~~~~~~~~

test log snippet build parser 63

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=i386 SRCARCH=x86 CROSS_COMPILE=i686-linux-gnu- 'CC=sccache i686-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'intel_dp_dsc_compute_pipe_bpp_limits.isra.43',
    inlined from 'intel_dp_compute_config_limits' at /builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2547:3:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_850' declared with attribute error: clamp() low limit dsc_min_bpc * 3 greater than high limit dsc_max_bpc * 3
  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
                                      ^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
    prefix ## suffix();    \
    ^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
  ^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
 #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
                                     ^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
  BUILD_BUG_ON_MSG(statically_true(ulo > uhi),    \
  ^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
  __clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
  ^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:206:28: note: in expansion of macro '__careful_clamp'
 #define clamp(val, lo, hi) __careful_clamp(__auto_type, val, lo, hi)
                            ^~~~~~~~~~~~~~~
/builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2506:25: note: in expansion of macro 'clamp'
  limits->pipe.max_bpp = clamp(limits->pipe.max_bpp, dsc_min_bpc * 3, dsc_max_bpc * 3);
                         ^~~~~

test log snippet build parser 64

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: st2913HS: warning: allocated section `.got.plt' not in segment

test log snippet build parser 65

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stYX1F1t: warning: allocated section `.got.plt' not in segment

test log snippet build parser 66

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: st3Y3ofJ: warning: allocated section `.got.plt' not in segment

test log snippet build parser 67

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=s390 CROSS_COMPILE=s390x-linux-gnu- 'CC=sccache s390x-linux-gnu-gcc' 'HOSTCC=sccache gcc'
s390x-linux-gnu-objcopy: stYx1ACV: warning: allocated section `.got.plt' not in segment

test log snippet build parser 68

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'HOSTCC=sccache clang' 'CC=sccache clang' LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-2ce51f.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 69

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- HOSTCC=clang CC=clang LLVM=1 LLVM_IAS=1 kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/x86_64-linux-gnu-ld: warning: /tmp/test_encl_bootstrap-dbb031.o: missing .note.GNU-stack section implies executable stack
/usr/bin/x86_64-linux-gnu-ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 70

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
  365 |                 cur = read(fds[0], new + total, transferred - total);
      |                                                 ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
  296 |         ssize_t cur, total, transferred;
      |                             ^~~~~~~~~~~

test log snippet build parser 71

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/ccFjBoFb.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 72

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/mm'
cow.c: In function 'do_test_vmsplice_in_parent':
cow.c:365:61: warning: 'transferred' may be used uninitialized [-Wmaybe-uninitialized]
  365 |                 cur = read(fds[0], new + total, transferred - total);
      |                                                 ~~~~~~~~~~~~^~~~~~~
cow.c:296:29: note: 'transferred' was declared here
  296 |         ssize_t cur, total, transferred;
      |                             ^~~~~~~~~~~

test log snippet build parser 73

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/kselftest_install ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' kselftest-install
make[4]: Entering directory '/builds/linux/tools/testing/selftests/sgx'
/usr/bin/ld: warning: /tmp/cc6cMp8b.o: missing .note.GNU-stack section implies executable stack
/usr/bin/ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker

test log snippet build parser 74

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'intel_dp_dsc_compute_pipe_bpp_limits.isra.44',
    inlined from 'intel_dp_compute_config_limits' at /builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2547:3:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_1689' declared with attribute error: clamp() low limit dsc_min_bpc * 3 greater than high limit dsc_max_bpc * 3
  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
                                      ^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
    prefix ## suffix();    \
    ^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
  ^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
 #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
                                     ^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
  BUILD_BUG_ON_MSG(statically_true(ulo > uhi),    \
  ^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
  __clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
  ^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:206:28: note: in expansion of macro '__careful_clamp'
 #define clamp(val, lo, hi) __careful_clamp(__auto_type, val, lo, hi)
                            ^~~~~~~~~~~~~~~
/builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2506:25: note: in expansion of macro 'clamp'
  limits->pipe.max_bpp = clamp(limits->pipe.max_bpp, dsc_min_bpc * 3, dsc_max_bpc * 3);
                         ^~~~~

test log snippet build parser 75

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'intel_dp_dsc_compute_pipe_bpp_limits.isra.80',
    inlined from 'intel_dp_compute_config_limits' at /builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2547:3:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_1219' declared with attribute error: clamp() low limit dsc_min_bpc * 3 greater than high limit dsc_max_bpc * 3
  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
                                      ^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
    prefix ## suffix();    \
    ^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
  ^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
 #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
                                     ^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
  BUILD_BUG_ON_MSG(statically_true(ulo > uhi),    \
  ^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
  __clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
  ^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:206:28: note: in expansion of macro '__careful_clamp'
 #define clamp(val, lo, hi) __careful_clamp(__auto_type, val, lo, hi)
                            ^~~~~~~~~~~~~~~
/builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2506:25: note: in expansion of macro 'clamp'
  limits->pipe.max_bpp = clamp(limits->pipe.max_bpp, dsc_min_bpc * 3, dsc_max_bpc * 3);
                         ^~~~~

test log snippet build parser 76

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.builtin', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.builtin'.

test log snippet build parser 77

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.builtin.modinfo', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.builtin.modinfo'.

test log snippet build parser 78

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.order', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.order'.

test log snippet build parser 79

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc'
In file included from <command-line>:
In function 'intel_dp_dsc_compute_pipe_bpp_limits.isra.80',
    inlined from 'intel_dp_compute_config_limits' at /builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2547:3:
/builds/linux/include/linux/compiler_types.h:542:38: error: call to '__compiletime_assert_907' declared with attribute error: clamp() low limit dsc_min_bpc * 3 greater than high limit dsc_max_bpc * 3
  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
                                      ^
/builds/linux/include/linux/compiler_types.h:523:4: note: in definition of macro '__compiletime_assert'
    prefix ## suffix();    \
    ^~~~~~
/builds/linux/include/linux/compiler_types.h:542:2: note: in expansion of macro '_compiletime_assert'
  _compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
  ^~~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/build_bug.h:39:37: note: in expansion of macro 'compiletime_assert'
 #define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
                                     ^~~~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:188:2: note: in expansion of macro 'BUILD_BUG_ON_MSG'
  BUILD_BUG_ON_MSG(statically_true(ulo > uhi),    \
  ^~~~~~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:195:2: note: in expansion of macro '__clamp_once'
  __clamp_once(type, val, lo, hi, __UNIQUE_ID(v_), __UNIQUE_ID(l_), __UNIQUE_ID(h_))
  ^~~~~~~~~~~~
/builds/linux/include/linux/minmax.h:206:28: note: in expansion of macro '__careful_clamp'
 #define clamp(val, lo, hi) __careful_clamp(__auto_type, val, lo, hi)
                            ^~~~~~~~~~~~~~~
/builds/linux/drivers/gpu/drm/i915/display/intel_dp.c:2506:25: note: in expansion of macro 'clamp'
  limits->pipe.max_bpp = clamp(limits->pipe.max_bpp, dsc_min_bpc * 3, dsc_max_bpc * 3);
                         ^~~~~

test log snippet build parser 80

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.builtin', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.builtin'.

test log snippet build parser 81

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.builtin.modinfo', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.builtin.modinfo'.

test log snippet build parser 82

make --silent --keep-going --jobs=8 O=/home/tuxbuild/.cache/tuxmake/builds/1/build INSTALL_MOD_STRIP=1 INSTALL_MOD_PATH=/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall ARCH=x86_64 SRCARCH=x86 CROSS_COMPILE=x86_64-linux-gnu- 'CC=sccache x86_64-linux-gnu-gcc' 'HOSTCC=sccache gcc' modules_install
make[3]: *** No rule to make target 'modules.order', needed by '/home/tuxbuild/.cache/tuxmake/builds/1/build/modinstall/lib/modules/6.13.0/modules.order'.

test log snippet boot parser 1

[  401.202842] ==================================================================
[  401.204709] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  401.206154] Read of size 12 at addr ffffa4b4ccbf6f80 by task kunit_try_catch/2841
[  401.206982] 
[  401.207336] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G      D          N 6.13.0 #1
[  401.207513] Tainted: [D]=DIE, [N]=TEST
[  401.207599] Hardware name: linux,dummy-virt (DT)
[  401.207687] Call trace:
[  401.207770]  show_stack+0x18/0x24 (C)
[  401.207933]  dump_stack_lvl+0x40/0x84
[  401.208127]  print_report+0x16c/0x728
[  401.208271]  kasan_report+0xd8/0x134
[  401.208405]  kasan_check_range+0x264/0x2a4
[  401.208529]  __asan_memcpy+0x3c/0x84
[  401.208664]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  401.208831]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  401.208944]  bin_patch_name_and_info+0xfc/0x550
[  401.209060]  kunit_try_run_case+0x118/0x31c
[  401.209177]  kunit_generic_run_threadfn_adapter+0x84/0x104
[  401.209290]  kthread+0x3f4/0x518
[  401.209399]  ret_from_fork+0x10/0x20
[  401.209502] 
[  401.218745] The buggy address belongs to the variable:
[  401.219427]  .str.271+0x0/0x20
[  401.220603] 
[  401.221697] The buggy address belongs to the virtual mapping at
[  401.221697]  [ffffa4b4cbdf0000, ffffa4b4cd4d0000) created by:
[  401.221697]  declare_kernel_vmas+0x54/0xb4
[  401.223159] 
[  401.223630] The buggy address belongs to the physical page:
[  401.224704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43bf6
[  401.226622] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  401.228679] raw: 03fffe0000002000 ffffedeb560efd88 ffffedeb560efd88 0000000000000000
[  401.229603] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  401.230455] page dumped because: kasan: bad access detected
[  401.231175] 
[  401.231506] Memory state around the buggy address:
[  401.232975]  ffffa4b4ccbf6e80: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[  401.233855]  ffffa4b4ccbf6f00: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[  401.234776] >ffffa4b4ccbf6f80: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[  401.235548]                       ^
[  401.236373]  ffffa4b4ccbf7000: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[  401.237345]  ffffa4b4ccbf7080: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[  401.238268] ==================================================================

test log snippet boot parser 2

[  401.202842] ==================================================================
[  401.204709] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  401.206154] Read of size 12 at addr ffffa4b4ccbf6f80 by task kunit_try_catch/2841
[  401.206982] 
[  401.207336] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G      D          N 6.13.0 #1
[  401.207513] Tainted: [D]=DIE, [N]=TEST
[  401.207599] Hardware name: linux,dummy-virt (DT)
[  401.207687] Call trace:
[  401.207770]  show_stack+0x18/0x24 (C)
[  401.207933]  dump_stack_lvl+0x40/0x84
[  401.208127]  print_report+0x16c/0x728
[  401.208271]  kasan_report+0xd8/0x134
[  401.208405]  kasan_check_range+0x264/0x2a4
[  401.208529]  __asan_memcpy+0x3c/0x84
[  401.208664]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  401.208831]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  401.208944]  bin_patch_name_and_info+0xfc/0x550
[  401.209060]  kunit_try_run_case+0x118/0x31c
[  401.209177]  kunit_generic_run_threadfn_adapter+0x84/0x104
[  401.209290]  kthread+0x3f4/0x518
[  401.209399]  ret_from_fork+0x10/0x20
[  401.209502] 
[  401.218745] The buggy address belongs to the variable:
[  401.219427]  .str.271+0x0/0x20
[  401.220603] 
[  401.221697] The buggy address belongs to the virtual mapping at
[  401.221697]  [ffffa4b4cbdf0000, ffffa4b4cd4d0000) created by:
[  401.221697]  declare_kernel_vmas+0x54/0xb4
[  401.223159] 
[  401.223630] The buggy address belongs to the physical page:
[  401.224704] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43bf6
[  401.226622] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  401.228679] raw: 03fffe0000002000 ffffedeb560efd88 ffffedeb560efd88 0000000000000000
[  401.229603] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  401.230455] page dumped because: kasan: bad access detected
[  401.231175] 
[  401.231506] Memory state around the buggy address:
[  401.232975]  ffffa4b4ccbf6e80: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[  401.233855]  ffffa4b4ccbf6f00: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[  401.234776] >ffffa4b4ccbf6f80: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[  401.235548]                       ^
[  401.236373]  ffffa4b4ccbf7000: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[  401.237345]  ffffa4b4ccbf7080: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[  401.238268] ==================================================================

test log snippet boot parser 3

[  439.913277] ==================================================================
[  439.915347] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  439.916251] Read of size 12 at addr ffff911dc31f6c00 by task kunit_try_catch/2841
[  439.917123] 
[  439.919559] CPU: 0 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G      D          N 6.13.0 #1
[  439.919788] Tainted: [D]=DIE, [N]=TEST
[  439.919891] Hardware name: linux,dummy-virt (DT)
[  439.919997] Call trace:
[  439.920085]  show_stack+0x18/0x24 (C)
[  439.920246]  __dump_stack+0x28/0x38
[  439.920402]  dump_stack_lvl+0x54/0x6c
[  439.920553]  print_address_description+0x90/0x220
[  439.920703]  print_report+0x68/0x84
[  439.920825]  kasan_report+0xd8/0x134
[  439.920955]  kasan_check_range+0x264/0x2a4
[  439.921084]  __asan_memcpy+0x3c/0x84
[  439.921206]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  439.921333]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  439.921413]  bin_patch_name_and_info+0xfc/0x550
[  439.921496]  kunit_try_run_case+0x118/0x31c
[  439.921584]  kunit_generic_run_threadfn_adapter+0x84/0x104
[  439.921670]  kthread+0x3f4/0x518
[  439.921749]  ret_from_fork+0x10/0x20
[  439.921866] 
[  439.931719] The buggy address belongs to the variable:
[  439.933052]  .str.279+0x0/0x20
[  439.933677] 
[  439.934284] The buggy address belongs to the virtual mapping at
[  439.934284]  [ffff911dc23f0000, ffff911dc3ad0000) created by:
[  439.934284]  declare_kernel_vmas+0x54/0xb4
[  439.935783] 
[  439.937428] The buggy address belongs to the physical page:
[  439.938665] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43bf6
[  439.939753] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  439.941924] raw: 03fffe0000002000 ffffc585ed0efd88 ffffc585ed0efd88 0000000000000000
[  439.942854] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  439.943791] page dumped because: kasan: bad access detected
[  439.945342] 
[  439.945779] Memory state around the buggy address:
[  439.946833]  ffff911dc31f6b00: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[  439.947706]  ffff911dc31f6b80: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[  439.949174] >ffff911dc31f6c00: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[  439.949951]                       ^
[  439.950835]  ffff911dc31f6c80: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[  439.952019]  ffff911dc31f6d00: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[  439.952857] ==================================================================

test log snippet boot parser 4

[  439.913277] ==================================================================
[  439.915347] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  439.916251] Read of size 12 at addr ffff911dc31f6c00 by task kunit_try_catch/2841
[  439.917123] 
[  439.919559] CPU: 0 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G      D          N 6.13.0 #1
[  439.919788] Tainted: [D]=DIE, [N]=TEST
[  439.919891] Hardware name: linux,dummy-virt (DT)
[  439.919997] Call trace:
[  439.920085]  show_stack+0x18/0x24 (C)
[  439.920246]  __dump_stack+0x28/0x38
[  439.920402]  dump_stack_lvl+0x54/0x6c
[  439.920553]  print_address_description+0x90/0x220
[  439.920703]  print_report+0x68/0x84
[  439.920825]  kasan_report+0xd8/0x134
[  439.920955]  kasan_check_range+0x264/0x2a4
[  439.921084]  __asan_memcpy+0x3c/0x84
[  439.921206]  cs_dsp_mock_bin_add_name_or_info+0x144/0x620
[  439.921333]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  439.921413]  bin_patch_name_and_info+0xfc/0x550
[  439.921496]  kunit_try_run_case+0x118/0x31c
[  439.921584]  kunit_generic_run_threadfn_adapter+0x84/0x104
[  439.921670]  kthread+0x3f4/0x518
[  439.921749]  ret_from_fork+0x10/0x20
[  439.921866] 
[  439.931719] The buggy address belongs to the variable:
[  439.933052]  .str.279+0x0/0x20
[  439.933677] 
[  439.934284] The buggy address belongs to the virtual mapping at
[  439.934284]  [ffff911dc23f0000, ffff911dc3ad0000) created by:
[  439.934284]  declare_kernel_vmas+0x54/0xb4
[  439.935783] 
[  439.937428] The buggy address belongs to the physical page:
[  439.938665] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x43bf6
[  439.939753] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  439.941924] raw: 03fffe0000002000 ffffc585ed0efd88 ffffc585ed0efd88 0000000000000000
[  439.942854] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  439.943791] page dumped because: kasan: bad access detected
[  439.945342] 
[  439.945779] Memory state around the buggy address:
[  439.946833]  ffff911dc31f6b00: 00 00 f9 f9 00 00 f9 f9 00 00 00 00 00 00 00 00
[  439.947706]  ffff911dc31f6b80: 00 00 f9 f9 f9 f9 f9 f9 03 f9 f9 f9 00 01 f9 f9
[  439.949174] >ffff911dc31f6c00: 00 02 f9 f9 00 00 f9 f9 00 f9 f9 f9 00 06 f9 f9
[  439.949951]                       ^
[  439.950835]  ffff911dc31f6c80: 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9
[  439.952019]  ffff911dc31f6d00: f9 f9 f9 f9 00 00 f9 f9 00 00 00 f9 f9 f9 f9 f9
[  439.952857] ==================================================================

test log snippet boot parser 5

[   57.195181] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[   57.196367] Modules linked in:
[   57.200517] CPU: 1 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G                 N 6.13.0 #1
[   57.202246] Tainted: [N]=TEST
[   57.202620] Hardware name: linux,dummy-virt (DT)
[   57.203948] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[   57.205332] pc : kunit_test_null_dereference+0x68/0x160
[   57.207448] lr : kunit_generic_run_threadfn_adapter+0x80/0xec
[   57.208436] sp : ffff800080fb7d30
[   57.209045] x29: ffff800080fb7d90 x28: 0000000000000000 x27: 0000000000000000
[   57.210703] x26: 1fff1c5140bcb8c1 x25: fff8e28a07f7b780 x24: 0000000000000004
[   57.211766] x23: fff8e28a07c88b80 x22: ffffa8e3ddbc9f4c x21: fff8e28a07c88b88
[   57.212840] x20: 1ffff000101f6fa6 x19: ffff8000800879b0 x18: 00000000618b3347
[   57.213803] x17: 0000000030006918 x16: 0000000000000100 x15: fff8e28a3f80de40
[   57.215223] x14: 1fff1c51435268cb x13: 00000000f1f1f1f1 x12: fffe9c5140fef7e4
[   57.216715] x11: 1fff1c5140fef7e3 x10: fffe9c5140fef7e3 x9 : dfff800000000000
[   57.218074] x8 : fff8e28a07f7bf1c x7 : 0000000000000001 x6 : 0000000041b58ab3
[   57.219161] x5 : ffff7000101f6fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003
[   57.220181] x2 : dfff800000000000 x1 : fff8e28a07f7b780 x0 : ffff8000800879b0
[   57.222223] Call trace:
[   57.223144]  kunit_test_null_dereference+0x68/0x160 (P)
[   57.224094]  kunit_generic_run_threadfn_adapter+0x80/0xec
[   57.225074]  kthread+0x37c/0x67c
[   57.225955]  ret_from_fork+0x10/0x20
[   57.227026] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) 
[   57.227760] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 6

[  382.991334] ==================================================================
[  382.993032] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[  382.994372] Read of size 12 at addr ffffa8e3e0d2b660 by task kunit_try_catch/2841
[  382.995059] 
[  382.995435] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G      D          N 6.13.0 #1
[  382.995593] Tainted: [D]=DIE, [N]=TEST
[  382.995657] Hardware name: linux,dummy-virt (DT)
[  382.995725] Call trace:
[  382.995793]  show_stack+0x18/0x24 (C)
[  382.995931]  dump_stack_lvl+0x74/0x8c
[  382.996043]  print_report+0x300/0x5e0
[  382.996164]  kasan_report+0xc4/0x108
[  382.996278]  kasan_check_range+0x100/0x1a8
[  382.996419]  __asan_memcpy+0x3c/0x94
[  382.996537]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[  382.996649]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  382.996765]  bin_patch_name_and_info+0x15c/0x6a0
[  382.996864]  kunit_try_run_case+0x144/0x3bc
[  382.996956]  kunit_generic_run_threadfn_adapter+0x80/0xec
[  382.997023]  kthread+0x37c/0x67c
[  382.997088]  ret_from_fork+0x10/0x20
[  382.997175] 
[  383.005422] The buggy address belongs to the variable:
[  383.006113]  __loc.0+0x2c0/0x3a0
[  383.006636] 
[  383.007198] The buggy address belongs to the virtual mapping at
[  383.007198]  [ffffa8e3dfcb0000, ffffa8e3e14f0000) created by:
[  383.007198]  paging_init+0x4d4/0x640
[  383.008745] 
[  383.009212] The buggy address belongs to the physical page:
[  383.010215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4412b
[  383.011634] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  383.013469] raw: 03fffe0000002000 ffffe589e5104ac8 ffffe589e5104ac8 0000000000000000
[  383.014314] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  383.015281] page dumped because: kasan: bad access detected
[  383.016013] 
[  383.016360] Memory state around the buggy address:
[  383.017486]  ffffa8e3e0d2b500: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9
[  383.018417]  ffffa8e3e0d2b580: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9
[  383.019242] >ffffa8e3e0d2b600: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[  383.020065]                                                           ^
[  383.021026]  ffffa8e3e0d2b680: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[  383.021837]  ffffa8e3e0d2b700: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[  383.022674] ==================================================================

test log snippet boot parser 7

[  382.991334] ==================================================================
[  382.993032] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[  382.994372] Read of size 12 at addr ffffa8e3e0d2b660 by task kunit_try_catch/2841
[  382.995059] 
[  382.995435] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G      D          N 6.13.0 #1
[  382.995593] Tainted: [D]=DIE, [N]=TEST
[  382.995657] Hardware name: linux,dummy-virt (DT)
[  382.995725] Call trace:
[  382.995793]  show_stack+0x18/0x24 (C)
[  382.995931]  dump_stack_lvl+0x74/0x8c
[  382.996043]  print_report+0x300/0x5e0
[  382.996164]  kasan_report+0xc4/0x108
[  382.996278]  kasan_check_range+0x100/0x1a8
[  382.996419]  __asan_memcpy+0x3c/0x94
[  382.996537]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x194/0x338
[  382.996649]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  382.996765]  bin_patch_name_and_info+0x15c/0x6a0
[  382.996864]  kunit_try_run_case+0x144/0x3bc
[  382.996956]  kunit_generic_run_threadfn_adapter+0x80/0xec
[  382.997023]  kthread+0x37c/0x67c
[  382.997088]  ret_from_fork+0x10/0x20
[  382.997175] 
[  383.005422] The buggy address belongs to the variable:
[  383.006113]  __loc.0+0x2c0/0x3a0
[  383.006636] 
[  383.007198] The buggy address belongs to the virtual mapping at
[  383.007198]  [ffffa8e3dfcb0000, ffffa8e3e14f0000) created by:
[  383.007198]  paging_init+0x4d4/0x640
[  383.008745] 
[  383.009212] The buggy address belongs to the physical page:
[  383.010215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4412b
[  383.011634] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  383.013469] raw: 03fffe0000002000 ffffe589e5104ac8 ffffe589e5104ac8 0000000000000000
[  383.014314] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  383.015281] page dumped because: kasan: bad access detected
[  383.016013] 
[  383.016360] Memory state around the buggy address:
[  383.017486]  ffffa8e3e0d2b500: f9 f9 f9 f9 00 00 00 01 f9 f9 f9 f9 03 f9 f9 f9
[  383.018417]  ffffa8e3e0d2b580: f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 02 f9 f9 f9
[  383.019242] >ffffa8e3e0d2b600: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[  383.020065]                                                           ^
[  383.021026]  ffffa8e3e0d2b680: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[  383.021837]  ffffa8e3e0d2b700: 00 f9 f9 f9 f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9
[  383.022674] ==================================================================

test log snippet boot parser 8

[  417.978486] ==================================================================
[  417.980258] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[  417.981524] Read of size 12 at addr ffffa534daba9180 by task kunit_try_catch/2841
[  417.982287] 
[  417.982715] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G      D          N 6.13.0 #1
[  417.982926] Tainted: [D]=DIE, [N]=TEST
[  417.983015] Hardware name: linux,dummy-virt (DT)
[  417.983114] Call trace:
[  417.984462]  show_stack+0x18/0x24 (C)
[  417.984639]  dump_stack_lvl+0x78/0x90
[  417.984790]  print_report+0x1d4/0x5c8
[  417.984895]  kasan_report+0x78/0xc0
[  417.984974]  kasan_check_range+0x180/0x210
[  417.985050]  memcpy+0x3c/0xa4
[  417.985121]  cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[  417.985228]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  417.985303]  bin_patch_name_and_info+0x164/0x6a8
[  417.985375]  kunit_try_run_case+0x144/0x3bc
[  417.985467]  kunit_generic_run_threadfn_adapter+0x80/0xec
[  417.985548]  kthread+0x3f0/0x744
[  417.985661]  ret_from_fork+0x10/0x20
[  417.985838] 
[  417.995789] The buggy address belongs to the variable:
[  417.996521]  __loc.44021+0x280/0x420
[  417.997234] 
[  417.998283] The buggy address belongs to the virtual mapping at
[  417.998283]  [ffffa534d9b20000, ffffa534db360000) created by:
[  417.998283]  paging_init+0x474/0x61c
[  417.999703] 
[  418.000247] The buggy address belongs to the physical page:
[  418.001296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x441a9
[  418.003124] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  418.005126] raw: 03fffe0000002000 ffffc30a95106a48 ffffc30a95106a48 0000000000000000
[  418.006092] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  418.007081] page dumped because: kasan: bad access detected
[  418.007642] 
[  418.008048] Memory state around the buggy address:
[  418.009305]  ffffa534daba9080: 03 f9 f9 f9 f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9
[  418.010849]  ffffa534daba9100: 02 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9
[  418.011745] >ffffa534daba9180: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 07 f9 f9
[  418.012802]                       ^
[  418.013614]  ffffa534daba9200: f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9 05 f9 f9 f9
[  418.014577]  ffffa534daba9280: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[  418.015456] ==================================================================

test log snippet boot parser 9

[  417.978486] ==================================================================
[  417.980258] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[  417.981524] Read of size 12 at addr ffffa534daba9180 by task kunit_try_catch/2841
[  417.982287] 
[  417.982715] CPU: 1 UID: 0 PID: 2841 Comm: kunit_try_catch Tainted: G      D          N 6.13.0 #1
[  417.982926] Tainted: [D]=DIE, [N]=TEST
[  417.983015] Hardware name: linux,dummy-virt (DT)
[  417.983114] Call trace:
[  417.984462]  show_stack+0x18/0x24 (C)
[  417.984639]  dump_stack_lvl+0x78/0x90
[  417.984790]  print_report+0x1d4/0x5c8
[  417.984895]  kasan_report+0x78/0xc0
[  417.984974]  kasan_check_range+0x180/0x210
[  417.985050]  memcpy+0x3c/0xa4
[  417.985121]  cs_dsp_mock_bin_add_name_or_info.isra.1+0x198/0x33c
[  417.985228]  cs_dsp_mock_bin_add_info+0x10/0x1c
[  417.985303]  bin_patch_name_and_info+0x164/0x6a8
[  417.985375]  kunit_try_run_case+0x144/0x3bc
[  417.985467]  kunit_generic_run_threadfn_adapter+0x80/0xec
[  417.985548]  kthread+0x3f0/0x744
[  417.985661]  ret_from_fork+0x10/0x20
[  417.985838] 
[  417.995789] The buggy address belongs to the variable:
[  417.996521]  __loc.44021+0x280/0x420
[  417.997234] 
[  417.998283] The buggy address belongs to the virtual mapping at
[  417.998283]  [ffffa534d9b20000, ffffa534db360000) created by:
[  417.998283]  paging_init+0x474/0x61c
[  417.999703] 
[  418.000247] The buggy address belongs to the physical page:
[  418.001296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x441a9
[  418.003124] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff)
[  418.005126] raw: 03fffe0000002000 ffffc30a95106a48 ffffc30a95106a48 0000000000000000
[  418.006092] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  418.007081] page dumped because: kasan: bad access detected
[  418.007642] 
[  418.008048] Memory state around the buggy address:
[  418.009305]  ffffa534daba9080: 03 f9 f9 f9 f9 f9 f9 f9 00 00 06 f9 f9 f9 f9 f9
[  418.010849]  ffffa534daba9100: 02 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9
[  418.011745] >ffffa534daba9180: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 07 f9 f9
[  418.012802]                       ^
[  418.013614]  ffffa534daba9200: f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9 05 f9 f9 f9
[  418.014577]  ffffa534daba9280: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[  418.015456] ==================================================================

test log snippet boot parser 10

[   25.557639] ==================================================================
[   25.558603] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x31f/0x380
[   25.559252] Read of size 1 at addr ffff888102ddfc3f by task kunit_try_catch/259
[   25.559771] 
[   25.559987] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.560085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.560104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.560139] Call Trace:
[   25.561138]  <TASK>
[   25.561221]  dump_stack_lvl+0x73/0xb0
[   25.561336]  print_report+0xd1/0x640
[   25.561381]  ? __virt_addr_valid+0x1db/0x2d0
[   25.561419]  ? kasan_addr_to_slab+0x11/0xa0
[   25.561454]  kasan_report+0x102/0x140
[   25.561482]  ? kasan_alloca_oob_left+0x31f/0x380
[   25.561513]  ? kasan_alloca_oob_left+0x31f/0x380
[   25.561549]  __asan_report_load1_noabort+0x18/0x20
[   25.561580]  kasan_alloca_oob_left+0x31f/0x380
[   25.561612]  ? finish_task_switch.isra.0+0x153/0x700
[   25.561648]  ? __vmx_vcpu_run+0x20/0xa0
[   25.561676]  ? trace_hardirqs_on+0x37/0xe0
[   25.561712]  ? __pfx_kasan_alloca_oob_left+0x10/0x10
[   25.561744]  ? __schedule+0xcdc/0x2830
[   25.561777]  ? __pfx_read_tsc+0x10/0x10
[   25.561809]  ? ktime_get_ts64+0x86/0x230
[   25.561843]  kunit_try_run_case+0x1b3/0x490
[   25.561875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.561902]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.561935]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.561967]  ? __kthread_parkme+0x82/0x160
[   25.561999]  ? preempt_count_sub+0x50/0x80
[   25.562030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.562060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.562117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.562177]  kthread+0x324/0x6d0
[   25.562209]  ? trace_preempt_on+0x20/0xc0
[   25.562239]  ? __pfx_kthread+0x10/0x10
[   25.562313]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.562371]  ? calculate_sigpending+0x7b/0xa0
[   25.562407]  ? __pfx_kthread+0x10/0x10
[   25.562437]  ret_from_fork+0x41/0x80
[   25.562466]  ? __pfx_kthread+0x10/0x10
[   25.562495]  ret_from_fork_asm+0x1a/0x30
[   25.562539]  </TASK>
[   25.562556] 
[   25.582317] The buggy address belongs to stack of task kunit_try_catch/259
[   25.583175] 
[   25.583486] The buggy address belongs to the physical page:
[   25.584331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102ddf
[   25.585215] flags: 0x200000000000000(node=0|zone=2)
[   25.585902] raw: 0200000000000000 ffffea00040b77c8 ffffea00040b77c8 0000000000000000
[   25.586863] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   25.587760] page dumped because: kasan: bad access detected
[   25.587956] 
[   25.588039] Memory state around the buggy address:
[   25.588339]  ffff888102ddfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.589027]  ffff888102ddfb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.590078] >ffff888102ddfc00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   25.590974]                                         ^
[   25.591978]  ffff888102ddfc80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   25.592690]  ffff888102ddfd00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   25.593078] ==================================================================

test log snippet boot parser 11

[   25.600189] ==================================================================
[   25.602377] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x328/0x390
[   25.602923] Read of size 1 at addr ffff888102d57c4a by task kunit_try_catch/261
[   25.603992] 
[   25.604757] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.604873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.604906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.604960] Call Trace:
[   25.604980]  <TASK>
[   25.605011]  dump_stack_lvl+0x73/0xb0
[   25.605066]  print_report+0xd1/0x640
[   25.605101]  ? __virt_addr_valid+0x1db/0x2d0
[   25.605523]  ? kasan_addr_to_slab+0x11/0xa0
[   25.605565]  kasan_report+0x102/0x140
[   25.605594]  ? kasan_alloca_oob_right+0x328/0x390
[   25.605628]  ? kasan_alloca_oob_right+0x328/0x390
[   25.605663]  __asan_report_load1_noabort+0x18/0x20
[   25.605695]  kasan_alloca_oob_right+0x328/0x390
[   25.605727]  ? finish_task_switch.isra.0+0x153/0x700
[   25.605763]  ? __vmx_vcpu_run+0x20/0xa0
[   25.605794]  ? trace_hardirqs_on+0x37/0xe0
[   25.605827]  ? __pfx_kasan_alloca_oob_right+0x10/0x10
[   25.605860]  ? __schedule+0xcdc/0x2830
[   25.605891]  ? __pfx_read_tsc+0x10/0x10
[   25.605921]  ? ktime_get_ts64+0x86/0x230
[   25.605956]  kunit_try_run_case+0x1b3/0x490
[   25.605987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.606015]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.606047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.606078]  ? __kthread_parkme+0x82/0x160
[   25.606126]  ? preempt_count_sub+0x50/0x80
[   25.606195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.606240]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.606328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.606389]  kthread+0x324/0x6d0
[   25.606420]  ? trace_preempt_on+0x20/0xc0
[   25.606452]  ? __pfx_kthread+0x10/0x10
[   25.606482]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.606514]  ? calculate_sigpending+0x7b/0xa0
[   25.606545]  ? __pfx_kthread+0x10/0x10
[   25.606576]  ret_from_fork+0x41/0x80
[   25.606602]  ? __pfx_kthread+0x10/0x10
[   25.606631]  ret_from_fork_asm+0x1a/0x30
[   25.606677]  </TASK>
[   25.606695] 
[   25.625682] The buggy address belongs to stack of task kunit_try_catch/261
[   25.626905] 
[   25.627394] The buggy address belongs to the physical page:
[   25.627729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d57
[   25.628703] flags: 0x200000000000000(node=0|zone=2)
[   25.629946] raw: 0200000000000000 ffffea00040b55c8 ffffea00040b55c8 0000000000000000
[   25.630413] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   25.631194] page dumped because: kasan: bad access detected
[   25.631520] 
[   25.631732] Memory state around the buggy address:
[   25.632660]  ffff888102d57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.633274]  ffff888102d57b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.633700] >ffff888102d57c00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb
[   25.634644]                                               ^
[   25.635038]  ffff888102d57c80: 00 00 00 f1 f1 f1 f1 01 f2 04 f2 00 f2 f2 f2 00
[   25.635835]  ffff888102d57d00: 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 f1
[   25.636575] ==================================================================

test log snippet boot parser 12

[   23.345558] ==================================================================
[   23.346509] BUG: KASAN: double-free in kfree_sensitive+0x2e/0x90
[   23.347195] Free of addr ffff8881027b6340 by task kunit_try_catch/200
[   23.347743] 
[   23.348194] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   23.348442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.348500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.348561] Call Trace:
[   23.348594]  <TASK>
[   23.348635]  dump_stack_lvl+0x73/0xb0
[   23.348718]  print_report+0xd1/0x640
[   23.348775]  ? __virt_addr_valid+0x1db/0x2d0
[   23.348827]  ? kfree_sensitive+0x2e/0x90
[   23.348873]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.348936]  ? kfree_sensitive+0x2e/0x90
[   23.348983]  kasan_report_invalid_free+0xc0/0xf0
[   23.349063]  ? kfree_sensitive+0x2e/0x90
[   23.349186]  ? kfree_sensitive+0x2e/0x90
[   23.349382]  check_slab_allocation+0x101/0x130
[   23.349472]  __kasan_slab_pre_free+0x28/0x40
[   23.349539]  kfree+0xf1/0x3f0
[   23.349644]  ? kfree_sensitive+0x2e/0x90
[   23.349677]  kfree_sensitive+0x2e/0x90
[   23.349704]  kmalloc_double_kzfree+0x19d/0x360
[   23.349735]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   23.349768]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   23.349803]  kunit_try_run_case+0x1b3/0x490
[   23.349833]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.349861]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.349895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.349926]  ? __kthread_parkme+0x82/0x160
[   23.349957]  ? preempt_count_sub+0x50/0x80
[   23.349992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.350022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.350055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.350106]  kthread+0x324/0x6d0
[   23.350153]  ? trace_preempt_on+0x20/0xc0
[   23.350208]  ? __pfx_kthread+0x10/0x10
[   23.350237]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.350305]  ? calculate_sigpending+0x7b/0xa0
[   23.350366]  ? __pfx_kthread+0x10/0x10
[   23.350406]  ret_from_fork+0x41/0x80
[   23.350433]  ? __pfx_kthread+0x10/0x10
[   23.350463]  ret_from_fork_asm+0x1a/0x30
[   23.350508]  </TASK>
[   23.350524] 
[   23.370763] Allocated by task 200:
[   23.371390]  kasan_save_stack+0x3d/0x60
[   23.371931]  kasan_save_track+0x18/0x40
[   23.372457]  kasan_save_alloc_info+0x3b/0x50
[   23.373149]  __kasan_kmalloc+0xb7/0xc0
[   23.373718]  __kmalloc_cache_noprof+0x184/0x410
[   23.374255]  kmalloc_double_kzfree+0xaa/0x360
[   23.374866]  kunit_try_run_case+0x1b3/0x490
[   23.375482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.376324]  kthread+0x324/0x6d0
[   23.376656]  ret_from_fork+0x41/0x80
[   23.377022]  ret_from_fork_asm+0x1a/0x30
[   23.377324] 
[   23.378248] Freed by task 200:
[   23.378842]  kasan_save_stack+0x3d/0x60
[   23.379723]  kasan_save_track+0x18/0x40
[   23.380046]  kasan_save_free_info+0x3f/0x60
[   23.381062]  __kasan_slab_free+0x56/0x70
[   23.381569]  kfree+0x224/0x3f0
[   23.381922]  kfree_sensitive+0x67/0x90
[   23.382411]  kmalloc_double_kzfree+0x12c/0x360
[   23.382969]  kunit_try_run_case+0x1b3/0x490
[   23.383513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.384053]  kthread+0x324/0x6d0
[   23.384440]  ret_from_fork+0x41/0x80
[   23.384811]  ret_from_fork_asm+0x1a/0x30
[   23.386182] 
[   23.386687] The buggy address belongs to the object at ffff8881027b6340
[   23.386687]  which belongs to the cache kmalloc-16 of size 16
[   23.387575] The buggy address is located 0 bytes inside of
[   23.387575]  16-byte region [ffff8881027b6340, ffff8881027b6350)
[   23.388625] 
[   23.388854] The buggy address belongs to the physical page:
[   23.389858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   23.390526] flags: 0x200000000000000(node=0|zone=2)
[   23.391398] page_type: f5(slab)
[   23.391792] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.392536] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.393040] page dumped because: kasan: bad access detected
[   23.393740] 
[   23.393960] Memory state around the buggy address:
[   23.395034]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   23.395763]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   23.396558] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   23.397058]                                            ^
[   23.397760]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.398216]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.398994] ==================================================================

test log snippet boot parser 13

[   25.245918] ==================================================================
[   25.246976] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   25.248142] Free of addr ffff888102da0000 by task kunit_try_catch/245
[   25.249246] 
[   25.249855] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.249978] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.250014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.250074] Call Trace:
[   25.250106]  <TASK>
[   25.250238]  dump_stack_lvl+0x73/0xb0
[   25.250523]  print_report+0xd1/0x640
[   25.250559]  ? __virt_addr_valid+0x1db/0x2d0
[   25.250595]  ? mempool_double_free_helper+0x185/0x370
[   25.250628]  ? kasan_addr_to_slab+0x11/0xa0
[   25.250663]  ? mempool_double_free_helper+0x185/0x370
[   25.250695]  kasan_report_invalid_free+0xc0/0xf0
[   25.250728]  ? mempool_double_free_helper+0x185/0x370
[   25.250764]  ? mempool_double_free_helper+0x185/0x370
[   25.250795]  __kasan_mempool_poison_object+0x1b3/0x1d0
[   25.250828]  mempool_free+0x2ec/0x380
[   25.250868]  mempool_double_free_helper+0x185/0x370
[   25.250900]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.250938]  ? finish_task_switch.isra.0+0x153/0x700
[   25.250976]  mempool_kmalloc_large_double_free+0xb1/0x100
[   25.251010]  ? __pfx_mempool_kmalloc_large_double_free+0x10/0x10
[   25.251043]  ? __switch_to+0x5d9/0xf60
[   25.251077]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.251141]  ? __pfx_mempool_kfree+0x10/0x10
[   25.251201]  ? __pfx_read_tsc+0x10/0x10
[   25.251234]  ? ktime_get_ts64+0x86/0x230
[   25.251288]  kunit_try_run_case+0x1b3/0x490
[   25.251359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.251404]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.251442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.251475]  ? __kthread_parkme+0x82/0x160
[   25.251508]  ? preempt_count_sub+0x50/0x80
[   25.251542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.251574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.251610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.251646]  kthread+0x324/0x6d0
[   25.251675]  ? trace_preempt_on+0x20/0xc0
[   25.251709]  ? __pfx_kthread+0x10/0x10
[   25.251740]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.251769]  ? calculate_sigpending+0x7b/0xa0
[   25.251800]  ? __pfx_kthread+0x10/0x10
[   25.251831]  ret_from_fork+0x41/0x80
[   25.251857]  ? __pfx_kthread+0x10/0x10
[   25.251900]  ret_from_fork_asm+0x1a/0x30
[   25.251947]  </TASK>
[   25.251962] 
[   25.270734] The buggy address belongs to the physical page:
[   25.271819] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102da0
[   25.273074] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   25.274230] flags: 0x200000000000040(head|node=0|zone=2)
[   25.274606] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.274993] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.275646] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   25.276522] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.278013] head: 0200000000000002 ffffea00040b6801 ffffffffffffffff 0000000000000000
[   25.278936] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   25.279942] page dumped because: kasan: bad access detected
[   25.280290] 
[   25.280598] Memory state around the buggy address:
[   25.281907]  ffff888102d9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.283022]  ffff888102d9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.283395] >ffff888102da0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.284420]                    ^
[   25.284850]  ffff888102da0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.285786]  ffff888102da0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.286765] ==================================================================

test log snippet boot parser 14

[   25.294575] ==================================================================
[   25.295279] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   25.297008] Free of addr ffff888102d68000 by task kunit_try_catch/247
[   25.297823] 
[   25.298027] CPU: 1 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.298140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.298188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.298247] Call Trace:
[   25.298281]  <TASK>
[   25.298325]  dump_stack_lvl+0x73/0xb0
[   25.298423]  print_report+0xd1/0x640
[   25.298480]  ? __virt_addr_valid+0x1db/0x2d0
[   25.298542]  ? mempool_double_free_helper+0x185/0x370
[   25.298603]  ? kasan_addr_to_slab+0x11/0xa0
[   25.298660]  ? mempool_double_free_helper+0x185/0x370
[   25.298879]  kasan_report_invalid_free+0xc0/0xf0
[   25.298949]  ? mempool_double_free_helper+0x185/0x370
[   25.299018]  ? mempool_double_free_helper+0x185/0x370
[   25.299072]  __kasan_mempool_poison_pages+0x115/0x130
[   25.299124]  mempool_free+0x290/0x380
[   25.299189]  mempool_double_free_helper+0x185/0x370
[   25.299224]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.299292]  ? finish_task_switch.isra.0+0x153/0x700
[   25.299369]  mempool_page_alloc_double_free+0xac/0x100
[   25.299408]  ? __pfx_mempool_page_alloc_double_free+0x10/0x10
[   25.299442]  ? __switch_to+0x5d9/0xf60
[   25.299478]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   25.299512]  ? __pfx_mempool_free_pages+0x10/0x10
[   25.299549]  ? __pfx_read_tsc+0x10/0x10
[   25.299584]  ? ktime_get_ts64+0x86/0x230
[   25.299642]  kunit_try_run_case+0x1b3/0x490
[   25.299678]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.299707]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.299745]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.299778]  ? __kthread_parkme+0x82/0x160
[   25.299811]  ? preempt_count_sub+0x50/0x80
[   25.299844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.299874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.299925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.299961]  kthread+0x324/0x6d0
[   25.299989]  ? trace_preempt_on+0x20/0xc0
[   25.300023]  ? __pfx_kthread+0x10/0x10
[   25.300053]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.300084]  ? calculate_sigpending+0x7b/0xa0
[   25.300148]  ? __pfx_kthread+0x10/0x10
[   25.300203]  ret_from_fork+0x41/0x80
[   25.300231]  ? __pfx_kthread+0x10/0x10
[   25.300271]  ret_from_fork_asm+0x1a/0x30
[   25.300344]  </TASK>
[   25.300373] 
[   25.322472] The buggy address belongs to the physical page:
[   25.323488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d68
[   25.324139] flags: 0x200000000000000(node=0|zone=2)
[   25.324830] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   25.325210] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.325947] page dumped because: kasan: bad access detected
[   25.326767] 
[   25.326980] Memory state around the buggy address:
[   25.327649]  ffff888102d67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.328569]  ffff888102d67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.329711] >ffff888102d68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.330367]                    ^
[   25.330952]  ffff888102d68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.331569]  ffff888102d68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.332214] ==================================================================

test log snippet boot parser 15

[   25.189805] ==================================================================
[   25.190585] BUG: KASAN: double-free in mempool_double_free_helper+0x185/0x370
[   25.191443] Free of addr ffff888102a5fd00 by task kunit_try_catch/243
[   25.191995] 
[   25.193080] CPU: 1 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.193255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.193291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.193715] Call Trace:
[   25.193763]  <TASK>
[   25.193797]  dump_stack_lvl+0x73/0xb0
[   25.193859]  print_report+0xd1/0x640
[   25.193892]  ? __virt_addr_valid+0x1db/0x2d0
[   25.193927]  ? mempool_double_free_helper+0x185/0x370
[   25.193959]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.193994]  ? mempool_double_free_helper+0x185/0x370
[   25.194024]  kasan_report_invalid_free+0xc0/0xf0
[   25.194056]  ? mempool_double_free_helper+0x185/0x370
[   25.194096]  ? mempool_double_free_helper+0x185/0x370
[   25.194180]  ? mempool_double_free_helper+0x185/0x370
[   25.194216]  check_slab_allocation+0x101/0x130
[   25.194252]  __kasan_mempool_poison_object+0x91/0x1d0
[   25.194285]  mempool_free+0x2ec/0x380
[   25.194323]  mempool_double_free_helper+0x185/0x370
[   25.194355]  ? __pfx_mempool_double_free_helper+0x10/0x10
[   25.194392]  ? finish_task_switch.isra.0+0x153/0x700
[   25.194430]  mempool_kmalloc_double_free+0xb1/0x100
[   25.194462]  ? __pfx_mempool_kmalloc_double_free+0x10/0x10
[   25.194492]  ? __switch_to+0x5d9/0xf60
[   25.194527]  ? __pfx_mempool_kmalloc+0x10/0x10
[   25.194558]  ? __pfx_mempool_kfree+0x10/0x10
[   25.194592]  ? __pfx_read_tsc+0x10/0x10
[   25.194621]  ? ktime_get_ts64+0x86/0x230
[   25.194657]  kunit_try_run_case+0x1b3/0x490
[   25.194690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.194720]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.194754]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.194787]  ? __kthread_parkme+0x82/0x160
[   25.194820]  ? preempt_count_sub+0x50/0x80
[   25.194854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.194886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.194921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.194958]  kthread+0x324/0x6d0
[   25.194987]  ? trace_preempt_on+0x20/0xc0
[   25.195021]  ? __pfx_kthread+0x10/0x10
[   25.195052]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.195084]  ? calculate_sigpending+0x7b/0xa0
[   25.195145]  ? __pfx_kthread+0x10/0x10
[   25.195197]  ret_from_fork+0x41/0x80
[   25.195223]  ? __pfx_kthread+0x10/0x10
[   25.195255]  ret_from_fork_asm+0x1a/0x30
[   25.195303]  </TASK>
[   25.195320] 
[   25.213666] Allocated by task 243:
[   25.213950]  kasan_save_stack+0x3d/0x60
[   25.214438]  kasan_save_track+0x18/0x40
[   25.214888]  kasan_save_alloc_info+0x3b/0x50
[   25.215451]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   25.215906]  remove_element+0x11e/0x190
[   25.216254]  mempool_alloc_preallocated+0x4d/0x90
[   25.216788]  mempool_double_free_helper+0x8b/0x370
[   25.217338]  mempool_kmalloc_double_free+0xb1/0x100
[   25.217847]  kunit_try_run_case+0x1b3/0x490
[   25.218283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.218801]  kthread+0x324/0x6d0
[   25.219044]  ret_from_fork+0x41/0x80
[   25.219547]  ret_from_fork_asm+0x1a/0x30
[   25.220471] 
[   25.220696] Freed by task 243:
[   25.221035]  kasan_save_stack+0x3d/0x60
[   25.221466]  kasan_save_track+0x18/0x40
[   25.221729]  kasan_save_free_info+0x3f/0x60
[   25.222038]  __kasan_mempool_poison_object+0x131/0x1d0
[   25.222397]  mempool_free+0x2ec/0x380
[   25.222655]  mempool_double_free_helper+0x10a/0x370
[   25.223175]  mempool_kmalloc_double_free+0xb1/0x100
[   25.223633]  kunit_try_run_case+0x1b3/0x490
[   25.224053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.224448]  kthread+0x324/0x6d0
[   25.224694]  ret_from_fork+0x41/0x80
[   25.224937]  ret_from_fork_asm+0x1a/0x30
[   25.225259] 
[   25.225416] The buggy address belongs to the object at ffff888102a5fd00
[   25.225416]  which belongs to the cache kmalloc-128 of size 128
[   25.226302] The buggy address is located 0 bytes inside of
[   25.226302]  128-byte region [ffff888102a5fd00, ffff888102a5fd80)
[   25.227312] 
[   25.227542] The buggy address belongs to the physical page:
[   25.228048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   25.228692] flags: 0x200000000000000(node=0|zone=2)
[   25.229066] page_type: f5(slab)
[   25.229370] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.229813] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.230403] page dumped because: kasan: bad access detected
[   25.230907] 
[   25.231152] Memory state around the buggy address:
[   25.231603]  ffff888102a5fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.232306]  ffff888102a5fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.232914] >ffff888102a5fd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.233618]                    ^
[   25.233958]  ffff888102a5fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.234556]  ffff888102a5fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.234910] ==================================================================

test log snippet boot parser 16

[  330.498578] ==================================================================
[  330.499398] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[  330.500039] Read of size 12 at addr ffffffff95ec17e0 by task kunit_try_catch/3914
[  330.500323] 
[  330.500432] CPU: 0 UID: 0 PID: 3914 Comm: kunit_try_catch Tainted: G    B D W        N 6.13.0 #1
[  330.500492] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  330.500509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  330.500533] Call Trace:
[  330.500551]  <TASK>
[  330.500583]  dump_stack_lvl+0x73/0xb0
[  330.500629]  print_report+0xd1/0x640
[  330.500663]  ? __virt_addr_valid+0x1db/0x2d0
[  330.500700]  ? kasan_addr_to_slab+0x11/0xa0
[  330.500841]  kasan_report+0x102/0x140
[  330.500893]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[  330.500988]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[  330.501091]  kasan_check_range+0x10c/0x1c0
[  330.501162]  __asan_memcpy+0x27/0x70
[  330.501256]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[  330.501318]  ? __pfx_cs_dsp_mock_bin_add_name_or_info.isra.0+0x10/0x10
[  330.501372]  ? __pfx_cs_dsp_mock_reg_addr_inc_per_unpacked_word+0x10/0x10
[  330.501424]  ? __pfx__cs_dsp_remove_wrapper+0x10/0x10
[  330.501493]  cs_dsp_mock_bin_add_info+0x12/0x20
[  330.501549]  bin_patch_name_and_info+0x1a2/0x8d0
[  330.501615]  ? __pfx_bin_patch_name_and_info+0x10/0x10
[  330.501680]  ? __pfx_kfree_action_wrapper+0x10/0x10
[  330.501793]  ? kunit_add_action_or_reset+0x1d/0x40
[  330.501853]  ? __pfx_read_tsc+0x10/0x10
[  330.501900]  ? ktime_get_ts64+0x86/0x230
[  330.501965]  kunit_try_run_case+0x1b3/0x490
[  330.502018]  ? __pfx_kunit_try_run_case+0x10/0x10
[  330.502060]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  330.502128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  330.502181]  ? __kthread_parkme+0x82/0x160
[  330.502236]  ? preempt_count_sub+0x50/0x80
[  330.502298]  ? __pfx_kunit_try_run_case+0x10/0x10
[  330.502394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  330.502484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  330.502544]  kthread+0x324/0x6d0
[  330.502596]  ? trace_preempt_on+0x20/0xc0
[  330.502658]  ? __pfx_kthread+0x10/0x10
[  330.502715]  ? _raw_spin_unlock_irq+0x47/0x80
[  330.502824]  ? calculate_sigpending+0x7b/0xa0
[  330.502880]  ? __pfx_kthread+0x10/0x10
[  330.502935]  ret_from_fork+0x41/0x80
[  330.502986]  ? __pfx_kthread+0x10/0x10
[  330.503041]  ret_from_fork_asm+0x1a/0x30
[  330.503127]  </TASK>
[  330.503164] 
[  330.523010] The buggy address belongs to the variable:
[  330.523470]  __loc.16+0x80/0x540
[  330.523934] 
[  330.524159] The buggy address belongs to the physical page:
[  330.524592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x386c1
[  330.526088] flags: 0x100000000002000(reserved|node=0|zone=1)
[  330.526936] raw: 0100000000002000 ffffea0000e1b048 ffffea0000e1b048 0000000000000000
[  330.527694] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  330.528556] page dumped because: kasan: bad access detected
[  330.528969] 
[  330.529175] Memory state around the buggy address:
[  330.529622]  ffffffff95ec1680: f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9
[  330.530191]  ffffffff95ec1700: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9
[  330.530674] >ffffffff95ec1780: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[  330.531303]                                                           ^
[  330.531658]  ffffffff95ec1800: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[  330.532261]  ffffffff95ec1880: 00 f9 f9 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9
[  330.532760] ==================================================================

test log snippet boot parser 17

[  330.498578] ==================================================================
[  330.499398] BUG: KASAN: global-out-of-bounds in cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[  330.500039] Read of size 12 at addr ffffffff95ec17e0 by task kunit_try_catch/3914
[  330.500323] 
[  330.500432] CPU: 0 UID: 0 PID: 3914 Comm: kunit_try_catch Tainted: G    B D W        N 6.13.0 #1
[  330.500492] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST
[  330.500509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  330.500533] Call Trace:
[  330.500551]  <TASK>
[  330.500583]  dump_stack_lvl+0x73/0xb0
[  330.500629]  print_report+0xd1/0x640
[  330.500663]  ? __virt_addr_valid+0x1db/0x2d0
[  330.500700]  ? kasan_addr_to_slab+0x11/0xa0
[  330.500841]  kasan_report+0x102/0x140
[  330.500893]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[  330.500988]  ? cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[  330.501091]  kasan_check_range+0x10c/0x1c0
[  330.501162]  __asan_memcpy+0x27/0x70
[  330.501256]  cs_dsp_mock_bin_add_name_or_info.isra.0+0x1c2/0x3d0
[  330.501318]  ? __pfx_cs_dsp_mock_bin_add_name_or_info.isra.0+0x10/0x10
[  330.501372]  ? __pfx_cs_dsp_mock_reg_addr_inc_per_unpacked_word+0x10/0x10
[  330.501424]  ? __pfx__cs_dsp_remove_wrapper+0x10/0x10
[  330.501493]  cs_dsp_mock_bin_add_info+0x12/0x20
[  330.501549]  bin_patch_name_and_info+0x1a2/0x8d0
[  330.501615]  ? __pfx_bin_patch_name_and_info+0x10/0x10
[  330.501680]  ? __pfx_kfree_action_wrapper+0x10/0x10
[  330.501793]  ? kunit_add_action_or_reset+0x1d/0x40
[  330.501853]  ? __pfx_read_tsc+0x10/0x10
[  330.501900]  ? ktime_get_ts64+0x86/0x230
[  330.501965]  kunit_try_run_case+0x1b3/0x490
[  330.502018]  ? __pfx_kunit_try_run_case+0x10/0x10
[  330.502060]  ? _raw_spin_lock_irqsave+0xa2/0x110
[  330.502128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[  330.502181]  ? __kthread_parkme+0x82/0x160
[  330.502236]  ? preempt_count_sub+0x50/0x80
[  330.502298]  ? __pfx_kunit_try_run_case+0x10/0x10
[  330.502394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[  330.502484]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[  330.502544]  kthread+0x324/0x6d0
[  330.502596]  ? trace_preempt_on+0x20/0xc0
[  330.502658]  ? __pfx_kthread+0x10/0x10
[  330.502715]  ? _raw_spin_unlock_irq+0x47/0x80
[  330.502824]  ? calculate_sigpending+0x7b/0xa0
[  330.502880]  ? __pfx_kthread+0x10/0x10
[  330.502935]  ret_from_fork+0x41/0x80
[  330.502986]  ? __pfx_kthread+0x10/0x10
[  330.503041]  ret_from_fork_asm+0x1a/0x30
[  330.503127]  </TASK>
[  330.503164] 
[  330.523010] The buggy address belongs to the variable:
[  330.523470]  __loc.16+0x80/0x540
[  330.523934] 
[  330.524159] The buggy address belongs to the physical page:
[  330.524592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x386c1
[  330.526088] flags: 0x100000000002000(reserved|node=0|zone=1)
[  330.526936] raw: 0100000000002000 ffffea0000e1b048 ffffea0000e1b048 0000000000000000
[  330.527694] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  330.528556] page dumped because: kasan: bad access detected
[  330.528969] 
[  330.529175] Memory state around the buggy address:
[  330.529622]  ffffffff95ec1680: f9 f9 f9 f9 00 00 00 f9 f9 f9 f9 f9 00 00 f9 f9
[  330.530191]  ffffffff95ec1700: f9 f9 f9 f9 00 00 f9 f9 f9 f9 f9 f9 00 00 f9 f9
[  330.530674] >ffffffff95ec1780: f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 00 02 f9 f9
[  330.531303]                                                           ^
[  330.531658]  ffffffff95ec1800: f9 f9 f9 f9 00 00 00 00 00 07 f9 f9 f9 f9 f9 f9
[  330.532261]  ffffffff95ec1880: 00 f9 f9 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9
[  330.532760] ==================================================================

test log snippet boot parser 18

[   25.460582] ==================================================================
[   25.461375] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x288/0x2d0
[   25.462310] Read of size 1 at addr ffffffff97c89ced by task kunit_try_catch/253
[   25.463753] 
[   25.464148] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.464273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.464295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.464329] Call Trace:
[   25.464349]  <TASK>
[   25.464377]  dump_stack_lvl+0x73/0xb0
[   25.464431]  print_report+0xd1/0x640
[   25.464461]  ? __virt_addr_valid+0x1db/0x2d0
[   25.464495]  ? kasan_addr_to_slab+0x11/0xa0
[   25.464531]  kasan_report+0x102/0x140
[   25.464558]  ? kasan_global_oob_right+0x288/0x2d0
[   25.464592]  ? kasan_global_oob_right+0x288/0x2d0
[   25.464633]  __asan_report_load1_noabort+0x18/0x20
[   25.464663]  kasan_global_oob_right+0x288/0x2d0
[   25.464715]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   25.464777]  ? __pfx_kasan_global_oob_right+0x10/0x10
[   25.464837]  kunit_try_run_case+0x1b3/0x490
[   25.464886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.464928]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.464977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.465026]  ? __kthread_parkme+0x82/0x160
[   25.465074]  ? preempt_count_sub+0x50/0x80
[   25.465128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.465244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.465321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.465384]  kthread+0x324/0x6d0
[   25.465439]  ? trace_preempt_on+0x20/0xc0
[   25.465505]  ? __pfx_kthread+0x10/0x10
[   25.465563]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.465682]  ? calculate_sigpending+0x7b/0xa0
[   25.465761]  ? __pfx_kthread+0x10/0x10
[   25.465823]  ret_from_fork+0x41/0x80
[   25.465876]  ? __pfx_kthread+0x10/0x10
[   25.465934]  ret_from_fork_asm+0x1a/0x30
[   25.466014]  </TASK>
[   25.466046] 
[   25.483529] The buggy address belongs to the variable:
[   25.484066]  global_array+0xd/0x40
[   25.485300] 
[   25.485580] The buggy address belongs to the physical page:
[   25.486735] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x3a489
[   25.488000] flags: 0x100000000002000(reserved|node=0|zone=1)
[   25.489039] raw: 0100000000002000 ffffea0000e92248 ffffea0000e92248 0000000000000000
[   25.489452] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.489722] page dumped because: kasan: bad access detected
[   25.489893] 
[   25.489972] Memory state around the buggy address:
[   25.490128]  ffffffff97c89b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.491377]  ffffffff97c89c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.493270] >ffffffff97c89c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
[   25.493900]                                                           ^
[   25.494528]  ffffffff97c89d00: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
[   25.494790]  ffffffff97c89d80: f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
[   25.494996] ==================================================================

test log snippet boot parser 19

[   23.006667] ==================================================================
[   23.007615] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x172/0x330
[   23.008418] Read of size 18446744073709551614 at addr ffff888101b8fd04 by task kunit_try_catch/188
[   23.009752] 
[   23.009949] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   23.010061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.010129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.010213] Call Trace:
[   23.010247]  <TASK>
[   23.010334]  dump_stack_lvl+0x73/0xb0
[   23.010425]  print_report+0xd1/0x640
[   23.010481]  ? __virt_addr_valid+0x1db/0x2d0
[   23.010539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.010642]  kasan_report+0x102/0x140
[   23.010698]  ? kmalloc_memmove_negative_size+0x172/0x330
[   23.010762]  ? kmalloc_memmove_negative_size+0x172/0x330
[   23.010835]  kasan_check_range+0x10c/0x1c0
[   23.010894]  __asan_memmove+0x27/0x70
[   23.010953]  kmalloc_memmove_negative_size+0x172/0x330
[   23.011014]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   23.011082]  ? __pfx_kmalloc_memmove_negative_size+0x10/0x10
[   23.011222]  kunit_try_run_case+0x1b3/0x490
[   23.011325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.011380]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.011423]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.011456]  ? __kthread_parkme+0x82/0x160
[   23.011487]  ? preempt_count_sub+0x50/0x80
[   23.011523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.011552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.011587]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.011621]  kthread+0x324/0x6d0
[   23.011648]  ? trace_preempt_on+0x20/0xc0
[   23.011680]  ? __pfx_kthread+0x10/0x10
[   23.011709]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.011739]  ? calculate_sigpending+0x7b/0xa0
[   23.011769]  ? __pfx_kthread+0x10/0x10
[   23.011798]  ret_from_fork+0x41/0x80
[   23.011823]  ? __pfx_kthread+0x10/0x10
[   23.011852]  ret_from_fork_asm+0x1a/0x30
[   23.011908]  </TASK>
[   23.011924] 
[   23.027991] Allocated by task 188:
[   23.028541]  kasan_save_stack+0x3d/0x60
[   23.028896]  kasan_save_track+0x18/0x40
[   23.029309]  kasan_save_alloc_info+0x3b/0x50
[   23.029709]  __kasan_kmalloc+0xb7/0xc0
[   23.030030]  __kmalloc_cache_noprof+0x184/0x410
[   23.030578]  kmalloc_memmove_negative_size+0xad/0x330
[   23.031047]  kunit_try_run_case+0x1b3/0x490
[   23.031572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.031837]  kthread+0x324/0x6d0
[   23.032037]  ret_from_fork+0x41/0x80
[   23.032493]  ret_from_fork_asm+0x1a/0x30
[   23.032905] 
[   23.033182] The buggy address belongs to the object at ffff888101b8fd00
[   23.033182]  which belongs to the cache kmalloc-64 of size 64
[   23.034291] The buggy address is located 4 bytes inside of
[   23.034291]  64-byte region [ffff888101b8fd00, ffff888101b8fd40)
[   23.034955] 
[   23.035152] The buggy address belongs to the physical page:
[   23.035683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b8f
[   23.036629] flags: 0x200000000000000(node=0|zone=2)
[   23.037484] page_type: f5(slab)
[   23.037757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.041295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.042111] page dumped because: kasan: bad access detected
[   23.042768] 
[   23.042994] Memory state around the buggy address:
[   23.043756]  ffff888101b8fc00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc
[   23.044531]  ffff888101b8fc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.045064] >ffff888101b8fd00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   23.045531]                    ^
[   23.045889]  ffff888101b8fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.046526]  ffff888101b8fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.046878] ==================================================================

test log snippet boot parser 20

[   29.475031] ==================================================================
[   29.476132] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x225/0x260
[   29.476918] Read of size 8 at addr ffff888101bab178 by task kunit_try_catch/289
[   29.477380] 
[   29.477640] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.477802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.477842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.477902] Call Trace:
[   29.477940]  <TASK>
[   29.477987]  dump_stack_lvl+0x73/0xb0
[   29.478074]  print_report+0xd1/0x640
[   29.478243]  ? __virt_addr_valid+0x1db/0x2d0
[   29.478349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.478427]  kasan_report+0x102/0x140
[   29.478488]  ? copy_to_kernel_nofault+0x225/0x260
[   29.478560]  ? copy_to_kernel_nofault+0x225/0x260
[   29.478640]  __asan_report_load8_noabort+0x18/0x20
[   29.478706]  copy_to_kernel_nofault+0x225/0x260
[   29.478835]  copy_to_kernel_nofault_oob+0x179/0x4e0
[   29.478909]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   29.479352]  ? irqentry_exit+0x2a/0x60
[   29.479443]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   29.479513]  ? trace_hardirqs_on+0x37/0xe0
[   29.479591]  ? __pfx_read_tsc+0x10/0x10
[   29.479629]  ? ktime_get_ts64+0x86/0x230
[   29.479715]  kunit_try_run_case+0x1b3/0x490
[   29.479752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.479783]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.479819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.479854]  ? __kthread_parkme+0x82/0x160
[   29.479896]  ? preempt_count_sub+0x50/0x80
[   29.479935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.479967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.480004]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.480041]  kthread+0x324/0x6d0
[   29.480071]  ? trace_preempt_on+0x20/0xc0
[   29.480128]  ? __pfx_kthread+0x10/0x10
[   29.480182]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.480219]  ? calculate_sigpending+0x7b/0xa0
[   29.480257]  ? __pfx_kthread+0x10/0x10
[   29.480340]  ret_from_fork+0x41/0x80
[   29.480387]  ? __pfx_kthread+0x10/0x10
[   29.480433]  ret_from_fork_asm+0x1a/0x30
[   29.480504]  </TASK>
[   29.480531] 
[   29.500540] Allocated by task 289:
[   29.501376]  kasan_save_stack+0x3d/0x60
[   29.501826]  kasan_save_track+0x18/0x40
[   29.502313]  kasan_save_alloc_info+0x3b/0x50
[   29.502728]  __kasan_kmalloc+0xb7/0xc0
[   29.503005]  __kmalloc_cache_noprof+0x184/0x410
[   29.504406]  copy_to_kernel_nofault_oob+0xc5/0x4e0
[   29.504834]  kunit_try_run_case+0x1b3/0x490
[   29.505565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.506667]  kthread+0x324/0x6d0
[   29.506917]  ret_from_fork+0x41/0x80
[   29.507664]  ret_from_fork_asm+0x1a/0x30
[   29.508077] 
[   29.508402] The buggy address belongs to the object at ffff888101bab100
[   29.508402]  which belongs to the cache kmalloc-128 of size 128
[   29.509089] The buggy address is located 0 bytes to the right of
[   29.509089]  allocated 120-byte region [ffff888101bab100, ffff888101bab178)
[   29.510761] 
[   29.511624] The buggy address belongs to the physical page:
[   29.511946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bab
[   29.513067] flags: 0x200000000000000(node=0|zone=2)
[   29.513638] page_type: f5(slab)
[   29.514182] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.514907] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.516007] page dumped because: kasan: bad access detected
[   29.516481] 
[   29.517218] Memory state around the buggy address:
[   29.517820]  ffff888101bab000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.518796]  ffff888101bab080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.519460] >ffff888101bab100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.520197]                                                                 ^
[   29.520879]  ffff888101bab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.522422]  ffff888101bab200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.522870] ==================================================================

test log snippet boot parser 21

[   29.524047] ==================================================================
[   29.525504] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x99/0x260
[   29.526737] Write of size 8 at addr ffff888101bab178 by task kunit_try_catch/289
[   29.527575] 
[   29.528329] CPU: 0 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.528481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.528520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.528576] Call Trace:
[   29.528617]  <TASK>
[   29.528666]  dump_stack_lvl+0x73/0xb0
[   29.528798]  print_report+0xd1/0x640
[   29.528834]  ? __virt_addr_valid+0x1db/0x2d0
[   29.528889]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.528945]  kasan_report+0x102/0x140
[   29.528974]  ? copy_to_kernel_nofault+0x99/0x260
[   29.529012]  ? copy_to_kernel_nofault+0x99/0x260
[   29.529054]  kasan_check_range+0x10c/0x1c0
[   29.529086]  __kasan_check_write+0x18/0x20
[   29.529206]  copy_to_kernel_nofault+0x99/0x260
[   29.529292]  copy_to_kernel_nofault_oob+0x214/0x4e0
[   29.529366]  ? __pfx_copy_to_kernel_nofault_oob+0x10/0x10
[   29.529426]  ? irqentry_exit+0x2a/0x60
[   29.529476]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   29.529530]  ? trace_hardirqs_on+0x37/0xe0
[   29.529596]  ? __pfx_read_tsc+0x10/0x10
[   29.529684]  ? ktime_get_ts64+0x86/0x230
[   29.529744]  kunit_try_run_case+0x1b3/0x490
[   29.529794]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.529837]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.529889]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.529925]  ? __kthread_parkme+0x82/0x160
[   29.529960]  ? preempt_count_sub+0x50/0x80
[   29.529997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.530030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.530068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.530119]  kthread+0x324/0x6d0
[   29.530153]  ? trace_preempt_on+0x20/0xc0
[   29.530209]  ? __pfx_kthread+0x10/0x10
[   29.530242]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.530329]  ? calculate_sigpending+0x7b/0xa0
[   29.530383]  ? __pfx_kthread+0x10/0x10
[   29.530418]  ret_from_fork+0x41/0x80
[   29.530448]  ? __pfx_kthread+0x10/0x10
[   29.530480]  ret_from_fork_asm+0x1a/0x30
[   29.530527]  </TASK>
[   29.530545] 
[   29.549439] Allocated by task 289:
[   29.550121]  kasan_save_stack+0x3d/0x60
[   29.550809]  kasan_save_track+0x18/0x40
[   29.551659]  kasan_save_alloc_info+0x3b/0x50
[   29.551939]  __kasan_kmalloc+0xb7/0xc0
[   29.552807]  __kmalloc_cache_noprof+0x184/0x410
[   29.553548]  copy_to_kernel_nofault_oob+0xc5/0x4e0
[   29.553957]  kunit_try_run_case+0x1b3/0x490
[   29.554653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.555030]  kthread+0x324/0x6d0
[   29.555652]  ret_from_fork+0x41/0x80
[   29.555910]  ret_from_fork_asm+0x1a/0x30
[   29.556411] 
[   29.557503] The buggy address belongs to the object at ffff888101bab100
[   29.557503]  which belongs to the cache kmalloc-128 of size 128
[   29.558484] The buggy address is located 0 bytes to the right of
[   29.558484]  allocated 120-byte region [ffff888101bab100, ffff888101bab178)
[   29.560129] 
[   29.560696] The buggy address belongs to the physical page:
[   29.561036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bab
[   29.562354] flags: 0x200000000000000(node=0|zone=2)
[   29.562914] page_type: f5(slab)
[   29.563793] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.564711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.565455] page dumped because: kasan: bad access detected
[   29.566133] 
[   29.566787] Memory state around the buggy address:
[   29.567599]  ffff888101bab000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.568114]  ffff888101bab080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.569525] >ffff888101bab100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.569974]                                                                 ^
[   29.570876]  ffff888101bab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.572063]  ffff888101bab200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.573189] ==================================================================

test log snippet boot parser 22

[   28.933817] ==================================================================
[   28.935507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450
[   28.936238] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.936844] 
[   28.937048] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.937132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.937153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.937207] Call Trace:
[   28.937232]  <TASK>
[   28.937261]  dump_stack_lvl+0x73/0xb0
[   28.937312]  print_report+0xd1/0x640
[   28.937343]  ? __virt_addr_valid+0x1db/0x2d0
[   28.937376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.937416]  kasan_report+0x102/0x140
[   28.937442]  ? kasan_atomics_helper+0x1eab/0x5450
[   28.937479]  ? kasan_atomics_helper+0x1eab/0x5450
[   28.937521]  kasan_check_range+0x10c/0x1c0
[   28.937553]  __kasan_check_write+0x18/0x20
[   28.937584]  kasan_atomics_helper+0x1eab/0x5450
[   28.937620]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.937655]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.937690]  ? kasan_atomics+0x153/0x310
[   28.937726]  kasan_atomics+0x1dd/0x310
[   28.937757]  ? __pfx_kasan_atomics+0x10/0x10
[   28.937788]  ? __pfx_read_tsc+0x10/0x10
[   28.937819]  ? ktime_get_ts64+0x86/0x230
[   28.937855]  kunit_try_run_case+0x1b3/0x490
[   28.937886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.937916]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.937950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.937984]  ? __kthread_parkme+0x82/0x160
[   28.938015]  ? preempt_count_sub+0x50/0x80
[   28.938051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.938083]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.938204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.938281]  kthread+0x324/0x6d0
[   28.938675]  ? trace_preempt_on+0x20/0xc0
[   28.938774]  ? __pfx_kthread+0x10/0x10
[   28.938888]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.938972]  ? calculate_sigpending+0x7b/0xa0
[   28.939039]  ? __pfx_kthread+0x10/0x10
[   28.939104]  ret_from_fork+0x41/0x80
[   28.939180]  ? __pfx_kthread+0x10/0x10
[   28.939361]  ret_from_fork_asm+0x1a/0x30
[   28.939441]  </TASK>
[   28.939465] 
[   28.958392] Allocated by task 273:
[   28.958712]  kasan_save_stack+0x3d/0x60
[   28.959269]  kasan_save_track+0x18/0x40
[   28.959610]  kasan_save_alloc_info+0x3b/0x50
[   28.960154]  __kasan_kmalloc+0xb7/0xc0
[   28.960603]  __kmalloc_cache_noprof+0x184/0x410
[   28.961020]  kasan_atomics+0x96/0x310
[   28.961448]  kunit_try_run_case+0x1b3/0x490
[   28.961724]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.962386]  kthread+0x324/0x6d0
[   28.962847]  ret_from_fork+0x41/0x80
[   28.963367]  ret_from_fork_asm+0x1a/0x30
[   28.963898] 
[   28.964216] The buggy address belongs to the object at ffff888102a6c880
[   28.964216]  which belongs to the cache kmalloc-64 of size 64
[   28.965452] The buggy address is located 0 bytes to the right of
[   28.965452]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.966682] 
[   28.966929] The buggy address belongs to the physical page:
[   28.967590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.968187] flags: 0x200000000000000(node=0|zone=2)
[   28.968783] page_type: f5(slab)
[   28.969278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.970098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.970638] page dumped because: kasan: bad access detected
[   28.970948] 
[   28.971207] Memory state around the buggy address:
[   28.971582]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.972098]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.972654] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.973018]                                      ^
[   28.973535]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.974262]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.974912] ==================================================================
---
[   29.339903] ==================================================================
[   29.341218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450
[   29.341816] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   29.342408] 
[   29.342660] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.342776] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.342812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.342878] Call Trace:
[   29.342920]  <TASK>
[   29.342970]  dump_stack_lvl+0x73/0xb0
[   29.343056]  print_report+0xd1/0x640
[   29.343208]  ? __virt_addr_valid+0x1db/0x2d0
[   29.343276]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.343352]  kasan_report+0x102/0x140
[   29.343405]  ? kasan_atomics_helper+0x224d/0x5450
[   29.343476]  ? kasan_atomics_helper+0x224d/0x5450
[   29.343557]  kasan_check_range+0x10c/0x1c0
[   29.343622]  __kasan_check_write+0x18/0x20
[   29.343681]  kasan_atomics_helper+0x224d/0x5450
[   29.343745]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.343812]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.343890]  ? kasan_atomics+0x153/0x310
[   29.344005]  kasan_atomics+0x1dd/0x310
[   29.344071]  ? __pfx_kasan_atomics+0x10/0x10
[   29.344201]  ? __pfx_read_tsc+0x10/0x10
[   29.344263]  ? ktime_get_ts64+0x86/0x230
[   29.344356]  kunit_try_run_case+0x1b3/0x490
[   29.344443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.344502]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.344562]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.344616]  ? __kthread_parkme+0x82/0x160
[   29.344653]  ? preempt_count_sub+0x50/0x80
[   29.344692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.344725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.344763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.344801]  kthread+0x324/0x6d0
[   29.344831]  ? trace_preempt_on+0x20/0xc0
[   29.344867]  ? __pfx_kthread+0x10/0x10
[   29.344898]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.344931]  ? calculate_sigpending+0x7b/0xa0
[   29.344964]  ? __pfx_kthread+0x10/0x10
[   29.344997]  ret_from_fork+0x41/0x80
[   29.345024]  ? __pfx_kthread+0x10/0x10
[   29.345056]  ret_from_fork_asm+0x1a/0x30
[   29.345130]  </TASK>
[   29.345151] 
[   29.362711] Allocated by task 273:
[   29.363297]  kasan_save_stack+0x3d/0x60
[   29.363934]  kasan_save_track+0x18/0x40
[   29.364354]  kasan_save_alloc_info+0x3b/0x50
[   29.364936]  __kasan_kmalloc+0xb7/0xc0
[   29.365644]  __kmalloc_cache_noprof+0x184/0x410
[   29.366085]  kasan_atomics+0x96/0x310
[   29.366441]  kunit_try_run_case+0x1b3/0x490
[   29.367135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.368287]  kthread+0x324/0x6d0
[   29.368827]  ret_from_fork+0x41/0x80
[   29.369341]  ret_from_fork_asm+0x1a/0x30
[   29.369714] 
[   29.369893] The buggy address belongs to the object at ffff888102a6c880
[   29.369893]  which belongs to the cache kmalloc-64 of size 64
[   29.370541] The buggy address is located 0 bytes to the right of
[   29.370541]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.371266] 
[   29.371434] The buggy address belongs to the physical page:
[   29.372269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.372979] flags: 0x200000000000000(node=0|zone=2)
[   29.374010] page_type: f5(slab)
[   29.374900] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.375578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.376222] page dumped because: kasan: bad access detected
[   29.376724] 
[   29.376891] Memory state around the buggy address:
[   29.377861]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.378564]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.379398] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.380052]                                      ^
[   29.380574]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.381351]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.381572] ==================================================================
---
[   28.642757] ==================================================================
[   28.643444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450
[   28.643847] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.644303] 
[   28.644479] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.644589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.644624] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.644714] Call Trace:
[   28.644760]  <TASK>
[   28.644808]  dump_stack_lvl+0x73/0xb0
[   28.644887]  print_report+0xd1/0x640
[   28.644947]  ? __virt_addr_valid+0x1db/0x2d0
[   28.645010]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.645121]  kasan_report+0x102/0x140
[   28.645214]  ? kasan_atomics_helper+0x1a80/0x5450
[   28.645288]  ? kasan_atomics_helper+0x1a80/0x5450
[   28.645369]  kasan_check_range+0x10c/0x1c0
[   28.645432]  __kasan_check_write+0x18/0x20
[   28.645494]  kasan_atomics_helper+0x1a80/0x5450
[   28.645562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.645627]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.645696]  ? kasan_atomics+0x153/0x310
[   28.645764]  kasan_atomics+0x1dd/0x310
[   28.645823]  ? __pfx_kasan_atomics+0x10/0x10
[   28.645889]  ? __pfx_read_tsc+0x10/0x10
[   28.645950]  ? ktime_get_ts64+0x86/0x230
[   28.646019]  kunit_try_run_case+0x1b3/0x490
[   28.646081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.648308]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.648380]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.648451]  ? __kthread_parkme+0x82/0x160
[   28.648515]  ? preempt_count_sub+0x50/0x80
[   28.648586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.648649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.648722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.648794]  kthread+0x324/0x6d0
[   28.648854]  ? trace_preempt_on+0x20/0xc0
[   28.648920]  ? __pfx_kthread+0x10/0x10
[   28.648984]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.649043]  ? calculate_sigpending+0x7b/0xa0
[   28.649299]  ? __pfx_kthread+0x10/0x10
[   28.649381]  ret_from_fork+0x41/0x80
[   28.649431]  ? __pfx_kthread+0x10/0x10
[   28.649490]  ret_from_fork_asm+0x1a/0x30
[   28.649572]  </TASK>
[   28.649603] 
[   28.666862] Allocated by task 273:
[   28.667201]  kasan_save_stack+0x3d/0x60
[   28.667677]  kasan_save_track+0x18/0x40
[   28.668216]  kasan_save_alloc_info+0x3b/0x50
[   28.668707]  __kasan_kmalloc+0xb7/0xc0
[   28.669205]  __kmalloc_cache_noprof+0x184/0x410
[   28.669752]  kasan_atomics+0x96/0x310
[   28.670241]  kunit_try_run_case+0x1b3/0x490
[   28.670715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.671348]  kthread+0x324/0x6d0
[   28.671756]  ret_from_fork+0x41/0x80
[   28.672252]  ret_from_fork_asm+0x1a/0x30
[   28.672711] 
[   28.672953] The buggy address belongs to the object at ffff888102a6c880
[   28.672953]  which belongs to the cache kmalloc-64 of size 64
[   28.674078] The buggy address is located 0 bytes to the right of
[   28.674078]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.675317] 
[   28.675558] The buggy address belongs to the physical page:
[   28.676138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.676804] flags: 0x200000000000000(node=0|zone=2)
[   28.677183] page_type: f5(slab)
[   28.677548] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.678070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.678640] page dumped because: kasan: bad access detected
[   28.678962] 
[   28.679250] Memory state around the buggy address:
[   28.679714]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.680248]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.680883] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.681319]                                      ^
[   28.681769]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.682815]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.683825] ==================================================================
---
[   28.026889] ==================================================================
[   28.028013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450
[   28.028862] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.029461] 
[   28.030395] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.030470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.030491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.030526] Call Trace:
[   28.030550]  <TASK>
[   28.030577]  dump_stack_lvl+0x73/0xb0
[   28.030624]  print_report+0xd1/0x640
[   28.030655]  ? __virt_addr_valid+0x1db/0x2d0
[   28.030688]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.030727]  kasan_report+0x102/0x140
[   28.030755]  ? kasan_atomics_helper+0x12e7/0x5450
[   28.030791]  ? kasan_atomics_helper+0x12e7/0x5450
[   28.030833]  kasan_check_range+0x10c/0x1c0
[   28.030865]  __kasan_check_write+0x18/0x20
[   28.030896]  kasan_atomics_helper+0x12e7/0x5450
[   28.030932]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.030968]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.031003]  ? kasan_atomics+0x153/0x310
[   28.031039]  kasan_atomics+0x1dd/0x310
[   28.031070]  ? __pfx_kasan_atomics+0x10/0x10
[   28.031115]  ? __pfx_read_tsc+0x10/0x10
[   28.031198]  ? ktime_get_ts64+0x86/0x230
[   28.031240]  kunit_try_run_case+0x1b3/0x490
[   28.031274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.031304]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.031339]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.031373]  ? __kthread_parkme+0x82/0x160
[   28.031405]  ? preempt_count_sub+0x50/0x80
[   28.031443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.031474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.031511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.031548]  kthread+0x324/0x6d0
[   28.031579]  ? trace_preempt_on+0x20/0xc0
[   28.031614]  ? __pfx_kthread+0x10/0x10
[   28.031646]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.031678]  ? calculate_sigpending+0x7b/0xa0
[   28.031709]  ? __pfx_kthread+0x10/0x10
[   28.031742]  ret_from_fork+0x41/0x80
[   28.031770]  ? __pfx_kthread+0x10/0x10
[   28.031801]  ret_from_fork_asm+0x1a/0x30
[   28.031847]  </TASK>
[   28.031863] 
[   28.051444] Allocated by task 273:
[   28.051834]  kasan_save_stack+0x3d/0x60
[   28.053688]  kasan_save_track+0x18/0x40
[   28.054411]  kasan_save_alloc_info+0x3b/0x50
[   28.054704]  __kasan_kmalloc+0xb7/0xc0
[   28.054970]  __kmalloc_cache_noprof+0x184/0x410
[   28.057051]  kasan_atomics+0x96/0x310
[   28.058475]  kunit_try_run_case+0x1b3/0x490
[   28.059861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.060732]  kthread+0x324/0x6d0
[   28.062112]  ret_from_fork+0x41/0x80
[   28.062754]  ret_from_fork_asm+0x1a/0x30
[   28.063140] 
[   28.063368] The buggy address belongs to the object at ffff888102a6c880
[   28.063368]  which belongs to the cache kmalloc-64 of size 64
[   28.064393] The buggy address is located 0 bytes to the right of
[   28.064393]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.065488] 
[   28.066303] The buggy address belongs to the physical page:
[   28.066759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.067289] flags: 0x200000000000000(node=0|zone=2)
[   28.068093] page_type: f5(slab)
[   28.068615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.069430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.070013] page dumped because: kasan: bad access detected
[   28.070666] 
[   28.070962] Memory state around the buggy address:
[   28.071440]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.072076]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.072683] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.073242]                                      ^
[   28.073710]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.074097]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.074809] ==================================================================
---
[   27.858570] ==================================================================
[   27.859857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450
[   27.860452] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.861038] 
[   27.861322] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.861434] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.861473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.861532] Call Trace:
[   27.861574]  <TASK>
[   27.861622]  dump_stack_lvl+0x73/0xb0
[   27.861709]  print_report+0xd1/0x640
[   27.861773]  ? __virt_addr_valid+0x1db/0x2d0
[   27.861920]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.862000]  kasan_report+0x102/0x140
[   27.862059]  ? kasan_atomics_helper+0x1149/0x5450
[   27.862127]  ? kasan_atomics_helper+0x1149/0x5450
[   27.862221]  kasan_check_range+0x10c/0x1c0
[   27.862287]  __kasan_check_write+0x18/0x20
[   27.862349]  kasan_atomics_helper+0x1149/0x5450
[   27.862420]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.862488]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.862557]  ? kasan_atomics+0x153/0x310
[   27.862628]  kasan_atomics+0x1dd/0x310
[   27.862688]  ? __pfx_kasan_atomics+0x10/0x10
[   27.862754]  ? __pfx_read_tsc+0x10/0x10
[   27.862815]  ? ktime_get_ts64+0x86/0x230
[   27.862885]  kunit_try_run_case+0x1b3/0x490
[   27.862949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.863006]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.863076]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.863198]  ? __kthread_parkme+0x82/0x160
[   27.863249]  ? preempt_count_sub+0x50/0x80
[   27.863291]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.863324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.863363]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.863401]  kthread+0x324/0x6d0
[   27.863430]  ? trace_preempt_on+0x20/0xc0
[   27.863466]  ? __pfx_kthread+0x10/0x10
[   27.863498]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.863531]  ? calculate_sigpending+0x7b/0xa0
[   27.863563]  ? __pfx_kthread+0x10/0x10
[   27.863595]  ret_from_fork+0x41/0x80
[   27.863623]  ? __pfx_kthread+0x10/0x10
[   27.863655]  ret_from_fork_asm+0x1a/0x30
[   27.863701]  </TASK>
[   27.863719] 
[   27.879678] Allocated by task 273:
[   27.880215]  kasan_save_stack+0x3d/0x60
[   27.880747]  kasan_save_track+0x18/0x40
[   27.881295]  kasan_save_alloc_info+0x3b/0x50
[   27.881809]  __kasan_kmalloc+0xb7/0xc0
[   27.882350]  __kmalloc_cache_noprof+0x184/0x410
[   27.882861]  kasan_atomics+0x96/0x310
[   27.883373]  kunit_try_run_case+0x1b3/0x490
[   27.883874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.884576]  kthread+0x324/0x6d0
[   27.885019]  ret_from_fork+0x41/0x80
[   27.885536]  ret_from_fork_asm+0x1a/0x30
[   27.886019] 
[   27.886324] The buggy address belongs to the object at ffff888102a6c880
[   27.886324]  which belongs to the cache kmalloc-64 of size 64
[   27.887217] The buggy address is located 0 bytes to the right of
[   27.887217]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.888486] 
[   27.888655] The buggy address belongs to the physical page:
[   27.889299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.890049] flags: 0x200000000000000(node=0|zone=2)
[   27.890730] page_type: f5(slab)
[   27.891460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.892187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.892847] page dumped because: kasan: bad access detected
[   27.893844] 
[   27.894104] Memory state around the buggy address:
[   27.894616]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.895202]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.896021] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.896687]                                      ^
[   27.897093]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.897901]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.898633] ==================================================================
---
[   29.170023] ==================================================================
[   29.170934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450
[   29.171577] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   29.172202] 
[   29.172513] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.172653] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.172693] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.172754] Call Trace:
[   29.172797]  <TASK>
[   29.172846]  dump_stack_lvl+0x73/0xb0
[   29.172933]  print_report+0xd1/0x640
[   29.172991]  ? __virt_addr_valid+0x1db/0x2d0
[   29.173057]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.173127]  kasan_report+0x102/0x140
[   29.173205]  ? kasan_atomics_helper+0x20c9/0x5450
[   29.173327]  ? kasan_atomics_helper+0x20c9/0x5450
[   29.173452]  kasan_check_range+0x10c/0x1c0
[   29.173599]  __kasan_check_write+0x18/0x20
[   29.173725]  kasan_atomics_helper+0x20c9/0x5450
[   29.173871]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.174017]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.174126]  ? kasan_atomics+0x153/0x310
[   29.174222]  kasan_atomics+0x1dd/0x310
[   29.174288]  ? __pfx_kasan_atomics+0x10/0x10
[   29.174352]  ? __pfx_read_tsc+0x10/0x10
[   29.174411]  ? ktime_get_ts64+0x86/0x230
[   29.174501]  kunit_try_run_case+0x1b3/0x490
[   29.174559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.174617]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.174682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.174750]  ? __kthread_parkme+0x82/0x160
[   29.174813]  ? preempt_count_sub+0x50/0x80
[   29.174884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.174948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.175020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.175093]  kthread+0x324/0x6d0
[   29.175760]  ? trace_preempt_on+0x20/0xc0
[   29.175927]  ? __pfx_kthread+0x10/0x10
[   29.175989]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.178319]  ? calculate_sigpending+0x7b/0xa0
[   29.178421]  ? __pfx_kthread+0x10/0x10
[   29.178490]  ret_from_fork+0x41/0x80
[   29.178548]  ? __pfx_kthread+0x10/0x10
[   29.178611]  ret_from_fork_asm+0x1a/0x30
[   29.178702]  </TASK>
[   29.178736] 
[   29.204039] Allocated by task 273:
[   29.205270]  kasan_save_stack+0x3d/0x60
[   29.205649]  kasan_save_track+0x18/0x40
[   29.206127]  kasan_save_alloc_info+0x3b/0x50
[   29.206728]  __kasan_kmalloc+0xb7/0xc0
[   29.207268]  __kmalloc_cache_noprof+0x184/0x410
[   29.207705]  kasan_atomics+0x96/0x310
[   29.208065]  kunit_try_run_case+0x1b3/0x490
[   29.208567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.209042]  kthread+0x324/0x6d0
[   29.209457]  ret_from_fork+0x41/0x80
[   29.209920]  ret_from_fork_asm+0x1a/0x30
[   29.210302] 
[   29.210471] The buggy address belongs to the object at ffff888102a6c880
[   29.210471]  which belongs to the cache kmalloc-64 of size 64
[   29.211470] The buggy address is located 0 bytes to the right of
[   29.211470]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.212396] 
[   29.212666] The buggy address belongs to the physical page:
[   29.213035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.213706] flags: 0x200000000000000(node=0|zone=2)
[   29.214194] page_type: f5(slab)
[   29.214590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.215218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.215714] page dumped because: kasan: bad access detected
[   29.216330] 
[   29.216547] Memory state around the buggy address:
[   29.217036]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.217513]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.218149] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.218534]                                      ^
[   29.218814]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.219553]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.220300] ==================================================================
---
[   27.326182] ==================================================================
[   27.326524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450
[   27.327269] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.327724] 
[   27.327918] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.328033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.328072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.328133] Call Trace:
[   27.328247]  <TASK>
[   27.328297]  dump_stack_lvl+0x73/0xb0
[   27.328832]  print_report+0xd1/0x640
[   27.328915]  ? __virt_addr_valid+0x1db/0x2d0
[   27.328987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.329064]  kasan_report+0x102/0x140
[   27.329579]  ? kasan_atomics_helper+0xa2c/0x5450
[   27.329670]  ? kasan_atomics_helper+0xa2c/0x5450
[   27.329757]  kasan_check_range+0x10c/0x1c0
[   27.329822]  __kasan_check_write+0x18/0x20
[   27.329883]  kasan_atomics_helper+0xa2c/0x5450
[   27.329955]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.330024]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.330132]  ? kasan_atomics+0x153/0x310
[   27.330207]  kasan_atomics+0x1dd/0x310
[   27.330241]  ? __pfx_kasan_atomics+0x10/0x10
[   27.330276]  ? __pfx_read_tsc+0x10/0x10
[   27.330308]  ? ktime_get_ts64+0x86/0x230
[   27.330347]  kunit_try_run_case+0x1b3/0x490
[   27.330380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.330410]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.330447]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.330482]  ? __kthread_parkme+0x82/0x160
[   27.330514]  ? preempt_count_sub+0x50/0x80
[   27.330550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.330582]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.330620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.330657]  kthread+0x324/0x6d0
[   27.330688]  ? trace_preempt_on+0x20/0xc0
[   27.330721]  ? __pfx_kthread+0x10/0x10
[   27.330753]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.330785]  ? calculate_sigpending+0x7b/0xa0
[   27.330816]  ? __pfx_kthread+0x10/0x10
[   27.330848]  ret_from_fork+0x41/0x80
[   27.330874]  ? __pfx_kthread+0x10/0x10
[   27.330905]  ret_from_fork_asm+0x1a/0x30
[   27.330951]  </TASK>
[   27.330969] 
[   27.348023] Allocated by task 273:
[   27.348426]  kasan_save_stack+0x3d/0x60
[   27.348722]  kasan_save_track+0x18/0x40
[   27.348974]  kasan_save_alloc_info+0x3b/0x50
[   27.349545]  __kasan_kmalloc+0xb7/0xc0
[   27.350069]  __kmalloc_cache_noprof+0x184/0x410
[   27.350842]  kasan_atomics+0x96/0x310
[   27.351412]  kunit_try_run_case+0x1b3/0x490
[   27.351903]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.352519]  kthread+0x324/0x6d0
[   27.352842]  ret_from_fork+0x41/0x80
[   27.353191]  ret_from_fork_asm+0x1a/0x30
[   27.353649] 
[   27.353876] The buggy address belongs to the object at ffff888102a6c880
[   27.353876]  which belongs to the cache kmalloc-64 of size 64
[   27.354916] The buggy address is located 0 bytes to the right of
[   27.354916]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.355854] 
[   27.356030] The buggy address belongs to the physical page:
[   27.356535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.357416] flags: 0x200000000000000(node=0|zone=2)
[   27.357951] page_type: f5(slab)
[   27.358426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.359013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.359935] page dumped because: kasan: bad access detected
[   27.360612] 
[   27.360926] Memory state around the buggy address:
[   27.361591]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.362483]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.363375] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.364149]                                      ^
[   27.364674]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.365362]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.365929] ==================================================================
---
[   27.611990] ==================================================================
[   27.614632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450
[   27.615334] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.615995] 
[   27.616771] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.616891] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.616930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.616992] Call Trace:
[   27.617036]  <TASK>
[   27.618132]  dump_stack_lvl+0x73/0xb0
[   27.618275]  print_report+0xd1/0x640
[   27.618342]  ? __virt_addr_valid+0x1db/0x2d0
[   27.618408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.618478]  kasan_report+0x102/0x140
[   27.618531]  ? kasan_atomics_helper+0xe79/0x5450
[   27.618598]  ? kasan_atomics_helper+0xe79/0x5450
[   27.618678]  kasan_check_range+0x10c/0x1c0
[   27.618741]  __kasan_check_write+0x18/0x20
[   27.618801]  kasan_atomics_helper+0xe79/0x5450
[   27.618868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.618932]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.619005]  ? kasan_atomics+0x153/0x310
[   27.619077]  kasan_atomics+0x1dd/0x310
[   27.619568]  ? __pfx_kasan_atomics+0x10/0x10
[   27.619670]  ? __pfx_read_tsc+0x10/0x10
[   27.619733]  ? ktime_get_ts64+0x86/0x230
[   27.619809]  kunit_try_run_case+0x1b3/0x490
[   27.619875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.619945]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.619988]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.620024]  ? __kthread_parkme+0x82/0x160
[   27.620058]  ? preempt_count_sub+0x50/0x80
[   27.620118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.621235]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.621315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.621389]  kthread+0x324/0x6d0
[   27.621450]  ? trace_preempt_on+0x20/0xc0
[   27.621518]  ? __pfx_kthread+0x10/0x10
[   27.621581]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.621643]  ? calculate_sigpending+0x7b/0xa0
[   27.621680]  ? __pfx_kthread+0x10/0x10
[   27.621715]  ret_from_fork+0x41/0x80
[   27.621745]  ? __pfx_kthread+0x10/0x10
[   27.621778]  ret_from_fork_asm+0x1a/0x30
[   27.621824]  </TASK>
[   27.621842] 
[   27.634985] Allocated by task 273:
[   27.635429]  kasan_save_stack+0x3d/0x60
[   27.635859]  kasan_save_track+0x18/0x40
[   27.637504]  kasan_save_alloc_info+0x3b/0x50
[   27.637804]  __kasan_kmalloc+0xb7/0xc0
[   27.638062]  __kmalloc_cache_noprof+0x184/0x410
[   27.638366]  kasan_atomics+0x96/0x310
[   27.638604]  kunit_try_run_case+0x1b3/0x490
[   27.638765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.638944]  kthread+0x324/0x6d0
[   27.639076]  ret_from_fork+0x41/0x80
[   27.639491]  ret_from_fork_asm+0x1a/0x30
[   27.640144] 
[   27.640415] The buggy address belongs to the object at ffff888102a6c880
[   27.640415]  which belongs to the cache kmalloc-64 of size 64
[   27.641949] The buggy address is located 0 bytes to the right of
[   27.641949]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.643333] 
[   27.643660] The buggy address belongs to the physical page:
[   27.644342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.645103] flags: 0x200000000000000(node=0|zone=2)
[   27.645730] page_type: f5(slab)
[   27.646234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.647017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.647907] page dumped because: kasan: bad access detected
[   27.648577] 
[   27.648814] Memory state around the buggy address:
[   27.649472]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.650364]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.651199] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.651830]                                      ^
[   27.652621]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.653494]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.654402] ==================================================================
---
[   27.456724] ==================================================================
[   27.457878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450
[   27.458300] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.459089] 
[   27.460385] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.460533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.460567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.460615] Call Trace:
[   27.460654]  <TASK>
[   27.460695]  dump_stack_lvl+0x73/0xb0
[   27.460763]  print_report+0xd1/0x640
[   27.460797]  ? __virt_addr_valid+0x1db/0x2d0
[   27.460838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.460899]  kasan_report+0x102/0x140
[   27.460929]  ? kasan_atomics_helper+0xc71/0x5450
[   27.460967]  ? kasan_atomics_helper+0xc71/0x5450
[   27.461008]  kasan_check_range+0x10c/0x1c0
[   27.461042]  __kasan_check_write+0x18/0x20
[   27.461073]  kasan_atomics_helper+0xc71/0x5450
[   27.461124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.461185]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.461252]  ? kasan_atomics+0x153/0x310
[   27.461320]  kasan_atomics+0x1dd/0x310
[   27.461378]  ? __pfx_kasan_atomics+0x10/0x10
[   27.461415]  ? __pfx_read_tsc+0x10/0x10
[   27.461448]  ? ktime_get_ts64+0x86/0x230
[   27.461487]  kunit_try_run_case+0x1b3/0x490
[   27.461521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.461550]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.461584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.461619]  ? __kthread_parkme+0x82/0x160
[   27.461650]  ? preempt_count_sub+0x50/0x80
[   27.461687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.461718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.461755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.461792]  kthread+0x324/0x6d0
[   27.461823]  ? trace_preempt_on+0x20/0xc0
[   27.461857]  ? __pfx_kthread+0x10/0x10
[   27.461888]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.461921]  ? calculate_sigpending+0x7b/0xa0
[   27.461952]  ? __pfx_kthread+0x10/0x10
[   27.461984]  ret_from_fork+0x41/0x80
[   27.462012]  ? __pfx_kthread+0x10/0x10
[   27.462045]  ret_from_fork_asm+0x1a/0x30
[   27.462098]  </TASK>
[   27.462145] 
[   27.478863] Allocated by task 273:
[   27.479364]  kasan_save_stack+0x3d/0x60
[   27.479830]  kasan_save_track+0x18/0x40
[   27.480444]  kasan_save_alloc_info+0x3b/0x50
[   27.480824]  __kasan_kmalloc+0xb7/0xc0
[   27.481404]  __kmalloc_cache_noprof+0x184/0x410
[   27.481782]  kasan_atomics+0x96/0x310
[   27.482269]  kunit_try_run_case+0x1b3/0x490
[   27.482712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.483291]  kthread+0x324/0x6d0
[   27.483544]  ret_from_fork+0x41/0x80
[   27.483984]  ret_from_fork_asm+0x1a/0x30
[   27.484603] 
[   27.484869] The buggy address belongs to the object at ffff888102a6c880
[   27.484869]  which belongs to the cache kmalloc-64 of size 64
[   27.485692] The buggy address is located 0 bytes to the right of
[   27.485692]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.486909] 
[   27.487190] The buggy address belongs to the physical page:
[   27.487768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.488315] flags: 0x200000000000000(node=0|zone=2)
[   27.488843] page_type: f5(slab)
[   27.489357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.490130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.490755] page dumped because: kasan: bad access detected
[   27.491352] 
[   27.491510] Memory state around the buggy address:
[   27.491786]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.492338]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.492994] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.493700]                                      ^
[   27.494179]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.494553]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.495254] ==================================================================
---
[   27.768645] ==================================================================
[   27.769375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450
[   27.770050] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.770818] 
[   27.771120] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.771320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.771363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.771427] Call Trace:
[   27.771470]  <TASK>
[   27.771519]  dump_stack_lvl+0x73/0xb0
[   27.771693]  print_report+0xd1/0x640
[   27.771759]  ? __virt_addr_valid+0x1db/0x2d0
[   27.771818]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.771904]  kasan_report+0x102/0x140
[   27.772027]  ? kasan_atomics_helper+0x107a/0x5450
[   27.772172]  ? kasan_atomics_helper+0x107a/0x5450
[   27.772264]  kasan_check_range+0x10c/0x1c0
[   27.772330]  __kasan_check_write+0x18/0x20
[   27.772473]  kasan_atomics_helper+0x107a/0x5450
[   27.772548]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.772616]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.772682]  ? kasan_atomics+0x153/0x310
[   27.772832]  kasan_atomics+0x1dd/0x310
[   27.772896]  ? __pfx_kasan_atomics+0x10/0x10
[   27.772961]  ? __pfx_read_tsc+0x10/0x10
[   27.773019]  ? ktime_get_ts64+0x86/0x230
[   27.773216]  kunit_try_run_case+0x1b3/0x490
[   27.773304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.773361]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.773428]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.773573]  ? __kthread_parkme+0x82/0x160
[   27.773637]  ? preempt_count_sub+0x50/0x80
[   27.773707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.773771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.773905]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.773994]  kthread+0x324/0x6d0
[   27.774056]  ? trace_preempt_on+0x20/0xc0
[   27.774187]  ? __pfx_kthread+0x10/0x10
[   27.774326]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.774393]  ? calculate_sigpending+0x7b/0xa0
[   27.774457]  ? __pfx_kthread+0x10/0x10
[   27.774518]  ret_from_fork+0x41/0x80
[   27.774629]  ? __pfx_kthread+0x10/0x10
[   27.774708]  ret_from_fork_asm+0x1a/0x30
[   27.774800]  </TASK>
[   27.774833] 
[   27.788775] Allocated by task 273:
[   27.789329]  kasan_save_stack+0x3d/0x60
[   27.789747]  kasan_save_track+0x18/0x40
[   27.790277]  kasan_save_alloc_info+0x3b/0x50
[   27.790783]  __kasan_kmalloc+0xb7/0xc0
[   27.791154]  __kmalloc_cache_noprof+0x184/0x410
[   27.791649]  kasan_atomics+0x96/0x310
[   27.792065]  kunit_try_run_case+0x1b3/0x490
[   27.792780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.793333]  kthread+0x324/0x6d0
[   27.793584]  ret_from_fork+0x41/0x80
[   27.793839]  ret_from_fork_asm+0x1a/0x30
[   27.794102] 
[   27.794449] The buggy address belongs to the object at ffff888102a6c880
[   27.794449]  which belongs to the cache kmalloc-64 of size 64
[   27.795499] The buggy address is located 0 bytes to the right of
[   27.795499]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.796607] 
[   27.796900] The buggy address belongs to the physical page:
[   27.797480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.798194] flags: 0x200000000000000(node=0|zone=2)
[   27.798639] page_type: f5(slab)
[   27.799079] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.799710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.800405] page dumped because: kasan: bad access detected
[   27.800885] 
[   27.801248] Memory state around the buggy address:
[   27.801728]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.802336]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.802927] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.803558]                                      ^
[   27.804071]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.804726]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.805453] ==================================================================
---
[   28.845652] ==================================================================
[   28.846718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450
[   28.847492] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.848220] 
[   28.848498] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.848615] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.848652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.848718] Call Trace:
[   28.848763]  <TASK>
[   28.848809]  dump_stack_lvl+0x73/0xb0
[   28.848891]  print_report+0xd1/0x640
[   28.848948]  ? __virt_addr_valid+0x1db/0x2d0
[   28.849007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.849140]  kasan_report+0x102/0x140
[   28.849231]  ? kasan_atomics_helper+0x1d7b/0x5450
[   28.849299]  ? kasan_atomics_helper+0x1d7b/0x5450
[   28.849378]  kasan_check_range+0x10c/0x1c0
[   28.849439]  __kasan_check_write+0x18/0x20
[   28.849545]  kasan_atomics_helper+0x1d7b/0x5450
[   28.849619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.849738]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.849808]  ? kasan_atomics+0x153/0x310
[   28.849901]  kasan_atomics+0x1dd/0x310
[   28.849990]  ? __pfx_kasan_atomics+0x10/0x10
[   28.850052]  ? __pfx_read_tsc+0x10/0x10
[   28.850173]  ? ktime_get_ts64+0x86/0x230
[   28.850268]  kunit_try_run_case+0x1b3/0x490
[   28.850361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.850424]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.850488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.850554]  ? __kthread_parkme+0x82/0x160
[   28.850612]  ? preempt_count_sub+0x50/0x80
[   28.850728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.850797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.850865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.850931]  kthread+0x324/0x6d0
[   28.850990]  ? trace_preempt_on+0x20/0xc0
[   28.851067]  ? __pfx_kthread+0x10/0x10
[   28.851216]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.851288]  ? calculate_sigpending+0x7b/0xa0
[   28.851326]  ? __pfx_kthread+0x10/0x10
[   28.851361]  ret_from_fork+0x41/0x80
[   28.851391]  ? __pfx_kthread+0x10/0x10
[   28.851423]  ret_from_fork_asm+0x1a/0x30
[   28.851469]  </TASK>
[   28.851488] 
[   28.864442] Allocated by task 273:
[   28.864879]  kasan_save_stack+0x3d/0x60
[   28.865326]  kasan_save_track+0x18/0x40
[   28.865695]  kasan_save_alloc_info+0x3b/0x50
[   28.866118]  __kasan_kmalloc+0xb7/0xc0
[   28.866573]  __kmalloc_cache_noprof+0x184/0x410
[   28.866977]  kasan_atomics+0x96/0x310
[   28.867458]  kunit_try_run_case+0x1b3/0x490
[   28.867761]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.868321]  kthread+0x324/0x6d0
[   28.868743]  ret_from_fork+0x41/0x80
[   28.869042]  ret_from_fork_asm+0x1a/0x30
[   28.869488] 
[   28.869799] The buggy address belongs to the object at ffff888102a6c880
[   28.869799]  which belongs to the cache kmalloc-64 of size 64
[   28.870630] The buggy address is located 0 bytes to the right of
[   28.870630]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.871483] 
[   28.871711] The buggy address belongs to the physical page:
[   28.872118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.872693] flags: 0x200000000000000(node=0|zone=2)
[   28.873249] page_type: f5(slab)
[   28.873528] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.874118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.874687] page dumped because: kasan: bad access detected
[   28.875213] 
[   28.875424] Memory state around the buggy address:
[   28.875908]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.876487]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.877198] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.877690]                                      ^
[   28.878246]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.878732]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.879456] ==================================================================
---
[   27.272522] ==================================================================
[   27.273246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450
[   27.274034] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.274937] 
[   27.275293] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.275404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.275493] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.275558] Call Trace:
[   27.275599]  <TASK>
[   27.275650]  dump_stack_lvl+0x73/0xb0
[   27.275734]  print_report+0xd1/0x640
[   27.275791]  ? __virt_addr_valid+0x1db/0x2d0
[   27.275854]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.275944]  kasan_report+0x102/0x140
[   27.276001]  ? kasan_atomics_helper+0x993/0x5450
[   27.276073]  ? kasan_atomics_helper+0x993/0x5450
[   27.276243]  kasan_check_range+0x10c/0x1c0
[   27.276322]  __kasan_check_write+0x18/0x20
[   27.276386]  kasan_atomics_helper+0x993/0x5450
[   27.276456]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.276526]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.276596]  ? kasan_atomics+0x153/0x310
[   27.276668]  kasan_atomics+0x1dd/0x310
[   27.276731]  ? __pfx_kasan_atomics+0x10/0x10
[   27.276797]  ? __pfx_read_tsc+0x10/0x10
[   27.276859]  ? ktime_get_ts64+0x86/0x230
[   27.276929]  kunit_try_run_case+0x1b3/0x490
[   27.276994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.277052]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.277118]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.277224]  ? __kthread_parkme+0x82/0x160
[   27.277286]  ? preempt_count_sub+0x50/0x80
[   27.277436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.277563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.277696]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.277787]  kthread+0x324/0x6d0
[   27.277848]  ? trace_preempt_on+0x20/0xc0
[   27.277988]  ? __pfx_kthread+0x10/0x10
[   27.278052]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.278117]  ? calculate_sigpending+0x7b/0xa0
[   27.278224]  ? __pfx_kthread+0x10/0x10
[   27.278287]  ret_from_fork+0x41/0x80
[   27.278343]  ? __pfx_kthread+0x10/0x10
[   27.278404]  ret_from_fork_asm+0x1a/0x30
[   27.278493]  </TASK>
[   27.278528] 
[   27.305557] Allocated by task 273:
[   27.306010]  kasan_save_stack+0x3d/0x60
[   27.306488]  kasan_save_track+0x18/0x40
[   27.306795]  kasan_save_alloc_info+0x3b/0x50
[   27.307330]  __kasan_kmalloc+0xb7/0xc0
[   27.307751]  __kmalloc_cache_noprof+0x184/0x410
[   27.308189]  kasan_atomics+0x96/0x310
[   27.308552]  kunit_try_run_case+0x1b3/0x490
[   27.308898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.309574]  kthread+0x324/0x6d0
[   27.309921]  ret_from_fork+0x41/0x80
[   27.310451]  ret_from_fork_asm+0x1a/0x30
[   27.310758] 
[   27.311023] The buggy address belongs to the object at ffff888102a6c880
[   27.311023]  which belongs to the cache kmalloc-64 of size 64
[   27.311627] The buggy address is located 0 bytes to the right of
[   27.311627]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.312329] 
[   27.312558] The buggy address belongs to the physical page:
[   27.313062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.313770] flags: 0x200000000000000(node=0|zone=2)
[   27.314070] page_type: f5(slab)
[   27.314513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.315433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.316106] page dumped because: kasan: bad access detected
[   27.316592] 
[   27.316750] Memory state around the buggy address:
[   27.317027]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.317909]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.318853] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.320925]                                      ^
[   27.321432]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.322081]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.323777] ==================================================================
---
[   28.365919] ==================================================================
[   28.367579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450
[   28.367999] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.370739] 
[   28.370946] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.371063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.371101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.371437] Call Trace:
[   28.371626]  <TASK>
[   28.371674]  dump_stack_lvl+0x73/0xb0
[   28.371759]  print_report+0xd1/0x640
[   28.371814]  ? __virt_addr_valid+0x1db/0x2d0
[   28.371873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.371955]  kasan_report+0x102/0x140
[   28.372007]  ? kasan_atomics_helper+0x1650/0x5450
[   28.372072]  ? kasan_atomics_helper+0x1650/0x5450
[   28.372447]  kasan_check_range+0x10c/0x1c0
[   28.372527]  __kasan_check_write+0x18/0x20
[   28.372586]  kasan_atomics_helper+0x1650/0x5450
[   28.372651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.372712]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.372768]  ? kasan_atomics+0x153/0x310
[   28.372834]  kasan_atomics+0x1dd/0x310
[   28.372889]  ? __pfx_kasan_atomics+0x10/0x10
[   28.372951]  ? __pfx_read_tsc+0x10/0x10
[   28.373006]  ? ktime_get_ts64+0x86/0x230
[   28.373072]  kunit_try_run_case+0x1b3/0x490
[   28.373146]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.373220]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.373280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.373338]  ? __kthread_parkme+0x82/0x160
[   28.373388]  ? preempt_count_sub+0x50/0x80
[   28.373451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.373500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.373561]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.373617]  kthread+0x324/0x6d0
[   28.373663]  ? trace_preempt_on+0x20/0xc0
[   28.373719]  ? __pfx_kthread+0x10/0x10
[   28.373771]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.373823]  ? calculate_sigpending+0x7b/0xa0
[   28.373874]  ? __pfx_kthread+0x10/0x10
[   28.373928]  ret_from_fork+0x41/0x80
[   28.373979]  ? __pfx_kthread+0x10/0x10
[   28.374031]  ret_from_fork_asm+0x1a/0x30
[   28.374115]  </TASK>
[   28.374145] 
[   28.389687] Allocated by task 273:
[   28.390196]  kasan_save_stack+0x3d/0x60
[   28.390752]  kasan_save_track+0x18/0x40
[   28.391289]  kasan_save_alloc_info+0x3b/0x50
[   28.391801]  __kasan_kmalloc+0xb7/0xc0
[   28.392372]  __kmalloc_cache_noprof+0x184/0x410
[   28.392697]  kasan_atomics+0x96/0x310
[   28.393263]  kunit_try_run_case+0x1b3/0x490
[   28.393766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.394462]  kthread+0x324/0x6d0
[   28.394902]  ret_from_fork+0x41/0x80
[   28.395251]  ret_from_fork_asm+0x1a/0x30
[   28.395714] 
[   28.395953] The buggy address belongs to the object at ffff888102a6c880
[   28.395953]  which belongs to the cache kmalloc-64 of size 64
[   28.396571] The buggy address is located 0 bytes to the right of
[   28.396571]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.397248] 
[   28.397483] The buggy address belongs to the physical page:
[   28.397992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.398741] flags: 0x200000000000000(node=0|zone=2)
[   28.399309] page_type: f5(slab)
[   28.399735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.400480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.401051] page dumped because: kasan: bad access detected
[   28.401623] 
[   28.401872] Memory state around the buggy address:
[   28.402360]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.402928]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.403579] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.403952]                                      ^
[   28.404283]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.404646]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.405375] ==================================================================
---
[   27.947334] ==================================================================
[   27.947938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450
[   27.949466] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.949865] 
[   27.950706] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.950787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.950808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.950842] Call Trace:
[   27.950866]  <TASK>
[   27.950895]  dump_stack_lvl+0x73/0xb0
[   27.950949]  print_report+0xd1/0x640
[   27.950982]  ? __virt_addr_valid+0x1db/0x2d0
[   27.951016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.951055]  kasan_report+0x102/0x140
[   27.951083]  ? kasan_atomics_helper+0x1218/0x5450
[   27.951197]  ? kasan_atomics_helper+0x1218/0x5450
[   27.951240]  kasan_check_range+0x10c/0x1c0
[   27.951274]  __kasan_check_write+0x18/0x20
[   27.951305]  kasan_atomics_helper+0x1218/0x5450
[   27.951342]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.951377]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.951414]  ? kasan_atomics+0x153/0x310
[   27.951450]  kasan_atomics+0x1dd/0x310
[   27.951479]  ? __pfx_kasan_atomics+0x10/0x10
[   27.951513]  ? __pfx_read_tsc+0x10/0x10
[   27.951544]  ? ktime_get_ts64+0x86/0x230
[   27.951582]  kunit_try_run_case+0x1b3/0x490
[   27.951615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.951645]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.951681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.951715]  ? __kthread_parkme+0x82/0x160
[   27.951746]  ? preempt_count_sub+0x50/0x80
[   27.951781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.951813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.951850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.951897]  kthread+0x324/0x6d0
[   27.951928]  ? trace_preempt_on+0x20/0xc0
[   27.951963]  ? __pfx_kthread+0x10/0x10
[   27.951995]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.952027]  ? calculate_sigpending+0x7b/0xa0
[   27.952059]  ? __pfx_kthread+0x10/0x10
[   27.952095]  ret_from_fork+0x41/0x80
[   27.952148]  ? __pfx_kthread+0x10/0x10
[   27.952203]  ret_from_fork_asm+0x1a/0x30
[   27.952249]  </TASK>
[   27.952269] 
[   27.968643] Allocated by task 273:
[   27.969042]  kasan_save_stack+0x3d/0x60
[   27.969579]  kasan_save_track+0x18/0x40
[   27.969895]  kasan_save_alloc_info+0x3b/0x50
[   27.970393]  __kasan_kmalloc+0xb7/0xc0
[   27.970768]  __kmalloc_cache_noprof+0x184/0x410
[   27.971271]  kasan_atomics+0x96/0x310
[   27.971626]  kunit_try_run_case+0x1b3/0x490
[   27.971965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.972504]  kthread+0x324/0x6d0
[   27.972905]  ret_from_fork+0x41/0x80
[   27.973340]  ret_from_fork_asm+0x1a/0x30
[   27.973706] 
[   27.973871] The buggy address belongs to the object at ffff888102a6c880
[   27.973871]  which belongs to the cache kmalloc-64 of size 64
[   27.975114] The buggy address is located 0 bytes to the right of
[   27.975114]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.976146] 
[   27.976335] The buggy address belongs to the physical page:
[   27.976901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.977595] flags: 0x200000000000000(node=0|zone=2)
[   27.977927] page_type: f5(slab)
[   27.978395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.979051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.979735] page dumped because: kasan: bad access detected
[   27.980322] 
[   27.980503] Memory state around the buggy address:
[   27.981059]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.981864]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.982662] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.983312]                                      ^
[   27.983829]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.984399]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.985188] ==================================================================
---
[   27.235984] ==================================================================
[   27.236682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450
[   27.237451] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.238339] 
[   27.238582] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.238701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.238739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.238799] Call Trace:
[   27.238842]  <TASK>
[   27.238891]  dump_stack_lvl+0x73/0xb0
[   27.238971]  print_report+0xd1/0x640
[   27.239028]  ? __virt_addr_valid+0x1db/0x2d0
[   27.239095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.239220]  kasan_report+0x102/0x140
[   27.239315]  ? kasan_atomics_helper+0x8fa/0x5450
[   27.239401]  ? kasan_atomics_helper+0x8fa/0x5450
[   27.239479]  kasan_check_range+0x10c/0x1c0
[   27.239542]  __kasan_check_write+0x18/0x20
[   27.239707]  kasan_atomics_helper+0x8fa/0x5450
[   27.239794]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.239906]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.240009]  ? kasan_atomics+0x153/0x310
[   27.240078]  kasan_atomics+0x1dd/0x310
[   27.240194]  ? __pfx_kasan_atomics+0x10/0x10
[   27.240291]  ? __pfx_read_tsc+0x10/0x10
[   27.240379]  ? ktime_get_ts64+0x86/0x230
[   27.240478]  kunit_try_run_case+0x1b3/0x490
[   27.240553]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.240639]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.240729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.240802]  ? __kthread_parkme+0x82/0x160
[   27.240863]  ? preempt_count_sub+0x50/0x80
[   27.240932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.240996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.241069]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.241143]  kthread+0x324/0x6d0
[   27.241226]  ? trace_preempt_on+0x20/0xc0
[   27.241293]  ? __pfx_kthread+0x10/0x10
[   27.241357]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.241423]  ? calculate_sigpending+0x7b/0xa0
[   27.241487]  ? __pfx_kthread+0x10/0x10
[   27.241551]  ret_from_fork+0x41/0x80
[   27.241606]  ? __pfx_kthread+0x10/0x10
[   27.241669]  ret_from_fork_asm+0x1a/0x30
[   27.241758]  </TASK>
[   27.241791] 
[   27.255270] Allocated by task 273:
[   27.255533]  kasan_save_stack+0x3d/0x60
[   27.255812]  kasan_save_track+0x18/0x40
[   27.256077]  kasan_save_alloc_info+0x3b/0x50
[   27.256537]  __kasan_kmalloc+0xb7/0xc0
[   27.257070]  __kmalloc_cache_noprof+0x184/0x410
[   27.257635]  kasan_atomics+0x96/0x310
[   27.258039]  kunit_try_run_case+0x1b3/0x490
[   27.258575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.259088]  kthread+0x324/0x6d0
[   27.259485]  ret_from_fork+0x41/0x80
[   27.259982]  ret_from_fork_asm+0x1a/0x30
[   27.260542] 
[   27.260828] The buggy address belongs to the object at ffff888102a6c880
[   27.260828]  which belongs to the cache kmalloc-64 of size 64
[   27.262371] The buggy address is located 0 bytes to the right of
[   27.262371]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.262949] 
[   27.263107] The buggy address belongs to the physical page:
[   27.263423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.263814] flags: 0x200000000000000(node=0|zone=2)
[   27.264118] page_type: f5(slab)
[   27.264545] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.265348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.266257] page dumped because: kasan: bad access detected
[   27.266909] 
[   27.267223] Memory state around the buggy address:
[   27.267915]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.268798]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.269696] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.270320]                                      ^
[   27.270743]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271112]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.271491] ==================================================================
---
[   27.573554] ==================================================================
[   27.574305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450
[   27.574948] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.575802] 
[   27.576062] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.576247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.576283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.576340] Call Trace:
[   27.576384]  <TASK>
[   27.576431]  dump_stack_lvl+0x73/0xb0
[   27.576520]  print_report+0xd1/0x640
[   27.576581]  ? __virt_addr_valid+0x1db/0x2d0
[   27.576647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.576722]  kasan_report+0x102/0x140
[   27.576778]  ? kasan_atomics_helper+0xde1/0x5450
[   27.576849]  ? kasan_atomics_helper+0xde1/0x5450
[   27.576929]  kasan_check_range+0x10c/0x1c0
[   27.576992]  __kasan_check_write+0x18/0x20
[   27.577054]  kasan_atomics_helper+0xde1/0x5450
[   27.577196]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.577263]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.577323]  ? kasan_atomics+0x153/0x310
[   27.577381]  kasan_atomics+0x1dd/0x310
[   27.577427]  ? __pfx_kasan_atomics+0x10/0x10
[   27.577475]  ? __pfx_read_tsc+0x10/0x10
[   27.577530]  ? ktime_get_ts64+0x86/0x230
[   27.577591]  kunit_try_run_case+0x1b3/0x490
[   27.577647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.577700]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.577765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.577828]  ? __kthread_parkme+0x82/0x160
[   27.577889]  ? preempt_count_sub+0x50/0x80
[   27.577962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.578026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.578153]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.578262]  kthread+0x324/0x6d0
[   27.578328]  ? trace_preempt_on+0x20/0xc0
[   27.578398]  ? __pfx_kthread+0x10/0x10
[   27.578462]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.578527]  ? calculate_sigpending+0x7b/0xa0
[   27.578593]  ? __pfx_kthread+0x10/0x10
[   27.578657]  ret_from_fork+0x41/0x80
[   27.578711]  ? __pfx_kthread+0x10/0x10
[   27.578777]  ret_from_fork_asm+0x1a/0x30
[   27.578866]  </TASK>
[   27.578904] 
[   27.590924] Allocated by task 273:
[   27.591372]  kasan_save_stack+0x3d/0x60
[   27.591679]  kasan_save_track+0x18/0x40
[   27.591949]  kasan_save_alloc_info+0x3b/0x50
[   27.592454]  __kasan_kmalloc+0xb7/0xc0
[   27.592868]  __kmalloc_cache_noprof+0x184/0x410
[   27.593387]  kasan_atomics+0x96/0x310
[   27.593789]  kunit_try_run_case+0x1b3/0x490
[   27.594222]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.594550]  kthread+0x324/0x6d0
[   27.594838]  ret_from_fork+0x41/0x80
[   27.595067]  ret_from_fork_asm+0x1a/0x30
[   27.595555] 
[   27.595779] The buggy address belongs to the object at ffff888102a6c880
[   27.595779]  which belongs to the cache kmalloc-64 of size 64
[   27.596537] The buggy address is located 0 bytes to the right of
[   27.596537]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.597591] 
[   27.597763] The buggy address belongs to the physical page:
[   27.598288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.598684] flags: 0x200000000000000(node=0|zone=2)
[   27.598985] page_type: f5(slab)
[   27.599361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.599977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.600716] page dumped because: kasan: bad access detected
[   27.601255] 
[   27.601478] Memory state around the buggy address:
[   27.601915]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.604478]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.604857] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.606867]                                      ^
[   27.607407]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.608054]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.609721] ==================================================================
---
[   28.976054] ==================================================================
[   28.977122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450
[   28.977745] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.978458] 
[   28.978693] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.978807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.978848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.978909] Call Trace:
[   28.978951]  <TASK>
[   28.979001]  dump_stack_lvl+0x73/0xb0
[   28.979186]  print_report+0xd1/0x640
[   28.979259]  ? __virt_addr_valid+0x1db/0x2d0
[   28.979323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.979399]  kasan_report+0x102/0x140
[   28.979454]  ? kasan_atomics_helper+0x1f44/0x5450
[   28.979524]  ? kasan_atomics_helper+0x1f44/0x5450
[   28.979604]  kasan_check_range+0x10c/0x1c0
[   28.979718]  __kasan_check_write+0x18/0x20
[   28.979783]  kasan_atomics_helper+0x1f44/0x5450
[   28.979849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.979929]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.980033]  ? kasan_atomics+0x153/0x310
[   28.980154]  kasan_atomics+0x1dd/0x310
[   28.980241]  ? __pfx_kasan_atomics+0x10/0x10
[   28.980307]  ? __pfx_read_tsc+0x10/0x10
[   28.980397]  ? ktime_get_ts64+0x86/0x230
[   28.980476]  kunit_try_run_case+0x1b3/0x490
[   28.980541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.980599]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.980698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.980773]  ? __kthread_parkme+0x82/0x160
[   28.980836]  ? preempt_count_sub+0x50/0x80
[   28.980908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.980973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.981042]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.981147]  kthread+0x324/0x6d0
[   28.981211]  ? trace_preempt_on+0x20/0xc0
[   28.981251]  ? __pfx_kthread+0x10/0x10
[   28.981285]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.981320]  ? calculate_sigpending+0x7b/0xa0
[   28.981353]  ? __pfx_kthread+0x10/0x10
[   28.981387]  ret_from_fork+0x41/0x80
[   28.981415]  ? __pfx_kthread+0x10/0x10
[   28.981447]  ret_from_fork_asm+0x1a/0x30
[   28.981494]  </TASK>
[   28.981511] 
[   28.999511] Allocated by task 273:
[   29.000485]  kasan_save_stack+0x3d/0x60
[   29.001350]  kasan_save_track+0x18/0x40
[   29.002324]  kasan_save_alloc_info+0x3b/0x50
[   29.002924]  __kasan_kmalloc+0xb7/0xc0
[   29.003457]  __kmalloc_cache_noprof+0x184/0x410
[   29.003824]  kasan_atomics+0x96/0x310
[   29.004305]  kunit_try_run_case+0x1b3/0x490
[   29.005408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.005910]  kthread+0x324/0x6d0
[   29.006265]  ret_from_fork+0x41/0x80
[   29.007460]  ret_from_fork_asm+0x1a/0x30
[   29.007938] 
[   29.008260] The buggy address belongs to the object at ffff888102a6c880
[   29.008260]  which belongs to the cache kmalloc-64 of size 64
[   29.008943] The buggy address is located 0 bytes to the right of
[   29.008943]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.011460] 
[   29.011716] The buggy address belongs to the physical page:
[   29.012356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.013272] flags: 0x200000000000000(node=0|zone=2)
[   29.014188] page_type: f5(slab)
[   29.014594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.015325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.016661] page dumped because: kasan: bad access detected
[   29.016967] 
[   29.017106] Memory state around the buggy address:
[   29.017404]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.017764]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.018125] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.020396]                                      ^
[   29.020919]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.022252]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.022951] ==================================================================
---
[   28.603966] ==================================================================
[   28.605011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450
[   28.605620] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.605995] 
[   28.606251] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.606361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.606400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.606461] Call Trace:
[   28.606505]  <TASK>
[   28.606555]  dump_stack_lvl+0x73/0xb0
[   28.606636]  print_report+0xd1/0x640
[   28.606696]  ? __virt_addr_valid+0x1db/0x2d0
[   28.606757]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.606829]  kasan_report+0x102/0x140
[   28.606884]  ? kasan_atomics_helper+0x19e4/0x5450
[   28.606955]  ? kasan_atomics_helper+0x19e4/0x5450
[   28.607036]  kasan_check_range+0x10c/0x1c0
[   28.607145]  __kasan_check_write+0x18/0x20
[   28.607240]  kasan_atomics_helper+0x19e4/0x5450
[   28.607314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.607384]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.607452]  ? kasan_atomics+0x153/0x310
[   28.607521]  kasan_atomics+0x1dd/0x310
[   28.607576]  ? __pfx_kasan_atomics+0x10/0x10
[   28.607636]  ? __pfx_read_tsc+0x10/0x10
[   28.607693]  ? ktime_get_ts64+0x86/0x230
[   28.607759]  kunit_try_run_case+0x1b3/0x490
[   28.607823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.607884]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.607952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.608014]  ? __kthread_parkme+0x82/0x160
[   28.608069]  ? preempt_count_sub+0x50/0x80
[   28.608208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.608273]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.608341]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.608409]  kthread+0x324/0x6d0
[   28.608465]  ? trace_preempt_on+0x20/0xc0
[   28.608531]  ? __pfx_kthread+0x10/0x10
[   28.608592]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.608652]  ? calculate_sigpending+0x7b/0xa0
[   28.608709]  ? __pfx_kthread+0x10/0x10
[   28.608755]  ret_from_fork+0x41/0x80
[   28.608785]  ? __pfx_kthread+0x10/0x10
[   28.608817]  ret_from_fork_asm+0x1a/0x30
[   28.608869]  </TASK>
[   28.608898] 
[   28.622378] Allocated by task 273:
[   28.622699]  kasan_save_stack+0x3d/0x60
[   28.623018]  kasan_save_track+0x18/0x40
[   28.625389]  kasan_save_alloc_info+0x3b/0x50
[   28.625720]  __kasan_kmalloc+0xb7/0xc0
[   28.626135]  __kmalloc_cache_noprof+0x184/0x410
[   28.626541]  kasan_atomics+0x96/0x310
[   28.626925]  kunit_try_run_case+0x1b3/0x490
[   28.627380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.627727]  kthread+0x324/0x6d0
[   28.628139]  ret_from_fork+0x41/0x80
[   28.628552]  ret_from_fork_asm+0x1a/0x30
[   28.628838] 
[   28.629055] The buggy address belongs to the object at ffff888102a6c880
[   28.629055]  which belongs to the cache kmalloc-64 of size 64
[   28.629814] The buggy address is located 0 bytes to the right of
[   28.629814]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.630802] 
[   28.631032] The buggy address belongs to the physical page:
[   28.631575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.632152] flags: 0x200000000000000(node=0|zone=2)
[   28.632597] page_type: f5(slab)
[   28.632834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.633475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.634174] page dumped because: kasan: bad access detected
[   28.634557] 
[   28.634709] Memory state around the buggy address:
[   28.635194]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.635822]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.636508] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.636920]                                      ^
[   28.637451]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.637816]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.640331] ==================================================================
---
[   26.906634] ==================================================================
[   26.908507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450
[   26.909684] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   26.912658] 
[   26.912853] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.912971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.913008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.913071] Call Trace:
[   26.913117]  <TASK>
[   26.913188]  dump_stack_lvl+0x73/0xb0
[   26.913279]  print_report+0xd1/0x640
[   26.913340]  ? __virt_addr_valid+0x1db/0x2d0
[   26.913404]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.913480]  kasan_report+0x102/0x140
[   26.913536]  ? kasan_atomics_helper+0x4a1/0x5450
[   26.913607]  ? kasan_atomics_helper+0x4a1/0x5450
[   26.913687]  kasan_check_range+0x10c/0x1c0
[   26.913857]  __kasan_check_write+0x18/0x20
[   26.914010]  kasan_atomics_helper+0x4a1/0x5450
[   26.914094]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.914475]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.914555]  ? kasan_atomics+0x153/0x310
[   26.914626]  kasan_atomics+0x1dd/0x310
[   26.914690]  ? __pfx_kasan_atomics+0x10/0x10
[   26.914754]  ? __pfx_read_tsc+0x10/0x10
[   26.914813]  ? ktime_get_ts64+0x86/0x230
[   26.914886]  kunit_try_run_case+0x1b3/0x490
[   26.914950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.915009]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.915075]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.916866]  ? __kthread_parkme+0x82/0x160
[   26.916950]  ? preempt_count_sub+0x50/0x80
[   26.917025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.917093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.917209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.917286]  kthread+0x324/0x6d0
[   26.917347]  ? trace_preempt_on+0x20/0xc0
[   26.917415]  ? __pfx_kthread+0x10/0x10
[   26.917477]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.917542]  ? calculate_sigpending+0x7b/0xa0
[   26.917604]  ? __pfx_kthread+0x10/0x10
[   26.917668]  ret_from_fork+0x41/0x80
[   26.917721]  ? __pfx_kthread+0x10/0x10
[   26.917785]  ret_from_fork_asm+0x1a/0x30
[   26.917872]  </TASK>
[   26.917906] 
[   26.934152] Allocated by task 273:
[   26.934591]  kasan_save_stack+0x3d/0x60
[   26.935023]  kasan_save_track+0x18/0x40
[   26.935508]  kasan_save_alloc_info+0x3b/0x50
[   26.935835]  __kasan_kmalloc+0xb7/0xc0
[   26.936267]  __kmalloc_cache_noprof+0x184/0x410
[   26.936723]  kasan_atomics+0x96/0x310
[   26.937179]  kunit_try_run_case+0x1b3/0x490
[   26.937612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.938215]  kthread+0x324/0x6d0
[   26.938466]  ret_from_fork+0x41/0x80
[   26.938874]  ret_from_fork_asm+0x1a/0x30
[   26.939381] 
[   26.939608] The buggy address belongs to the object at ffff888102a6c880
[   26.939608]  which belongs to the cache kmalloc-64 of size 64
[   26.940520] The buggy address is located 0 bytes to the right of
[   26.940520]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   26.941296] 
[   26.941512] The buggy address belongs to the physical page:
[   26.941904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   26.942653] flags: 0x200000000000000(node=0|zone=2)
[   26.943186] page_type: f5(slab)
[   26.943562] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.944295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.944869] page dumped because: kasan: bad access detected
[   26.945274] 
[   26.945505] Memory state around the buggy address:
[   26.945950]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.946713]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.947127] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.947618]                                      ^
[   26.948204]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.948862]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.949408] ==================================================================
---
[   27.032064] ==================================================================
[   27.032969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450
[   27.033879] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.034431] 
[   27.034644] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.034759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.034796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.034860] Call Trace:
[   27.034902]  <TASK>
[   27.034950]  dump_stack_lvl+0x73/0xb0
[   27.035029]  print_report+0xd1/0x640
[   27.035091]  ? __virt_addr_valid+0x1db/0x2d0
[   27.035210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.035315]  kasan_report+0x102/0x140
[   27.035382]  ? kasan_atomics_helper+0x5ff/0x5450
[   27.035486]  ? kasan_atomics_helper+0x5ff/0x5450
[   27.035594]  kasan_check_range+0x10c/0x1c0
[   27.035687]  __kasan_check_write+0x18/0x20
[   27.035775]  kasan_atomics_helper+0x5ff/0x5450
[   27.035856]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.035973]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.036075]  ? kasan_atomics+0x153/0x310
[   27.036198]  kasan_atomics+0x1dd/0x310
[   27.036272]  ? __pfx_kasan_atomics+0x10/0x10
[   27.036338]  ? __pfx_read_tsc+0x10/0x10
[   27.036398]  ? ktime_get_ts64+0x86/0x230
[   27.036470]  kunit_try_run_case+0x1b3/0x490
[   27.036536]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.036596]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.036664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.036731]  ? __kthread_parkme+0x82/0x160
[   27.036793]  ? preempt_count_sub+0x50/0x80
[   27.036864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.036928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.037001]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.037073]  kthread+0x324/0x6d0
[   27.037179]  ? trace_preempt_on+0x20/0xc0
[   27.037290]  ? __pfx_kthread+0x10/0x10
[   27.037367]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.037431]  ? calculate_sigpending+0x7b/0xa0
[   27.037537]  ? __pfx_kthread+0x10/0x10
[   27.037599]  ret_from_fork+0x41/0x80
[   27.037654]  ? __pfx_kthread+0x10/0x10
[   27.037750]  ret_from_fork_asm+0x1a/0x30
[   27.037845]  </TASK>
[   27.037880] 
[   27.050733] Allocated by task 273:
[   27.051151]  kasan_save_stack+0x3d/0x60
[   27.053615]  kasan_save_track+0x18/0x40
[   27.053999]  kasan_save_alloc_info+0x3b/0x50
[   27.056135]  __kasan_kmalloc+0xb7/0xc0
[   27.058545]  __kmalloc_cache_noprof+0x184/0x410
[   27.059098]  kasan_atomics+0x96/0x310
[   27.059591]  kunit_try_run_case+0x1b3/0x490
[   27.060046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.060840]  kthread+0x324/0x6d0
[   27.061694]  ret_from_fork+0x41/0x80
[   27.061950]  ret_from_fork_asm+0x1a/0x30
[   27.063251] 
[   27.063894] The buggy address belongs to the object at ffff888102a6c880
[   27.063894]  which belongs to the cache kmalloc-64 of size 64
[   27.065456] The buggy address is located 0 bytes to the right of
[   27.065456]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.066025] 
[   27.066228] The buggy address belongs to the physical page:
[   27.066528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.068222] flags: 0x200000000000000(node=0|zone=2)
[   27.068701] page_type: f5(slab)
[   27.069061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.069875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.070597] page dumped because: kasan: bad access detected
[   27.071222] 
[   27.071526] Memory state around the buggy address:
[   27.071997]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.072743]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.073340] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.073971]                                      ^
[   27.074505]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.075190]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.075801] ==================================================================
---
[   28.685229] ==================================================================
[   28.685806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450
[   28.688153] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.688812] 
[   28.689330] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.689408] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.689429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.689463] Call Trace:
[   28.689497]  <TASK>
[   28.689538]  dump_stack_lvl+0x73/0xb0
[   28.689588]  print_report+0xd1/0x640
[   28.689618]  ? __virt_addr_valid+0x1db/0x2d0
[   28.689670]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.689712]  kasan_report+0x102/0x140
[   28.689741]  ? kasan_atomics_helper+0x1b23/0x5450
[   28.689777]  ? kasan_atomics_helper+0x1b23/0x5450
[   28.689820]  kasan_check_range+0x10c/0x1c0
[   28.689853]  __kasan_check_write+0x18/0x20
[   28.689885]  kasan_atomics_helper+0x1b23/0x5450
[   28.689921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.689957]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.689992]  ? kasan_atomics+0x153/0x310
[   28.690028]  kasan_atomics+0x1dd/0x310
[   28.690058]  ? __pfx_kasan_atomics+0x10/0x10
[   28.690098]  ? __pfx_read_tsc+0x10/0x10
[   28.690211]  ? ktime_get_ts64+0x86/0x230
[   28.690286]  kunit_try_run_case+0x1b3/0x490
[   28.690350]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.690408]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.690449]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.690485]  ? __kthread_parkme+0x82/0x160
[   28.690516]  ? preempt_count_sub+0x50/0x80
[   28.690552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.690585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.690624]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.690661]  kthread+0x324/0x6d0
[   28.690691]  ? trace_preempt_on+0x20/0xc0
[   28.690727]  ? __pfx_kthread+0x10/0x10
[   28.690758]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.690791]  ? calculate_sigpending+0x7b/0xa0
[   28.690822]  ? __pfx_kthread+0x10/0x10
[   28.690855]  ret_from_fork+0x41/0x80
[   28.690881]  ? __pfx_kthread+0x10/0x10
[   28.690914]  ret_from_fork_asm+0x1a/0x30
[   28.690958]  </TASK>
[   28.690976] 
[   28.707450] Allocated by task 273:
[   28.707850]  kasan_save_stack+0x3d/0x60
[   28.708424]  kasan_save_track+0x18/0x40
[   28.708844]  kasan_save_alloc_info+0x3b/0x50
[   28.709521]  __kasan_kmalloc+0xb7/0xc0
[   28.710185]  __kmalloc_cache_noprof+0x184/0x410
[   28.710518]  kasan_atomics+0x96/0x310
[   28.710778]  kunit_try_run_case+0x1b3/0x490
[   28.711041]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.711721]  kthread+0x324/0x6d0
[   28.712236]  ret_from_fork+0x41/0x80
[   28.712849]  ret_from_fork_asm+0x1a/0x30
[   28.713360] 
[   28.713595] The buggy address belongs to the object at ffff888102a6c880
[   28.713595]  which belongs to the cache kmalloc-64 of size 64
[   28.714674] The buggy address is located 0 bytes to the right of
[   28.714674]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.715314] 
[   28.715742] The buggy address belongs to the physical page:
[   28.716716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.717564] flags: 0x200000000000000(node=0|zone=2)
[   28.718042] page_type: f5(slab)
[   28.718539] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.719436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.719824] page dumped because: kasan: bad access detected
[   28.720202] 
[   28.720417] Memory state around the buggy address:
[   28.721044]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.721968]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.722664] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.723344]                                      ^
[   28.724000]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.724522]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.725399] ==================================================================
---
[   28.809174] ==================================================================
[   28.809762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450
[   28.810501] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.811293] 
[   28.812108] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.812223] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.812253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.812300] Call Trace:
[   28.812337]  <TASK>
[   28.812375]  dump_stack_lvl+0x73/0xb0
[   28.812445]  print_report+0xd1/0x640
[   28.812488]  ? __virt_addr_valid+0x1db/0x2d0
[   28.812536]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.812595]  kasan_report+0x102/0x140
[   28.812646]  ? kasan_atomics_helper+0x1ce2/0x5450
[   28.812709]  ? kasan_atomics_helper+0x1ce2/0x5450
[   28.812787]  kasan_check_range+0x10c/0x1c0
[   28.812852]  __kasan_check_write+0x18/0x20
[   28.812914]  kasan_atomics_helper+0x1ce2/0x5450
[   28.812987]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.813057]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.813127]  ? kasan_atomics+0x153/0x310
[   28.813218]  kasan_atomics+0x1dd/0x310
[   28.813772]  ? __pfx_kasan_atomics+0x10/0x10
[   28.813853]  ? __pfx_read_tsc+0x10/0x10
[   28.813916]  ? ktime_get_ts64+0x86/0x230
[   28.813989]  kunit_try_run_case+0x1b3/0x490
[   28.814055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.814185]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.814249]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.814287]  ? __kthread_parkme+0x82/0x160
[   28.814321]  ? preempt_count_sub+0x50/0x80
[   28.814360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.814393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.814433]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.814471]  kthread+0x324/0x6d0
[   28.814502]  ? trace_preempt_on+0x20/0xc0
[   28.814536]  ? __pfx_kthread+0x10/0x10
[   28.814568]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.814600]  ? calculate_sigpending+0x7b/0xa0
[   28.814632]  ? __pfx_kthread+0x10/0x10
[   28.814664]  ret_from_fork+0x41/0x80
[   28.814693]  ? __pfx_kthread+0x10/0x10
[   28.814725]  ret_from_fork_asm+0x1a/0x30
[   28.814771]  </TASK>
[   28.814788] 
[   28.829245] Allocated by task 273:
[   28.829540]  kasan_save_stack+0x3d/0x60
[   28.829895]  kasan_save_track+0x18/0x40
[   28.830415]  kasan_save_alloc_info+0x3b/0x50
[   28.831025]  __kasan_kmalloc+0xb7/0xc0
[   28.831568]  __kmalloc_cache_noprof+0x184/0x410
[   28.832042]  kasan_atomics+0x96/0x310
[   28.832498]  kunit_try_run_case+0x1b3/0x490
[   28.832934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.833548]  kthread+0x324/0x6d0
[   28.833936]  ret_from_fork+0x41/0x80
[   28.834260]  ret_from_fork_asm+0x1a/0x30
[   28.834531] 
[   28.834686] The buggy address belongs to the object at ffff888102a6c880
[   28.834686]  which belongs to the cache kmalloc-64 of size 64
[   28.835771] The buggy address is located 0 bytes to the right of
[   28.835771]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.836868] 
[   28.837146] The buggy address belongs to the physical page:
[   28.837594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.838174] flags: 0x200000000000000(node=0|zone=2)
[   28.838648] page_type: f5(slab)
[   28.838985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.839573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.840308] page dumped because: kasan: bad access detected
[   28.840717] 
[   28.840874] Memory state around the buggy address:
[   28.841417]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.842134]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.842678] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.843195]                                      ^
[   28.843488]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.843856]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.844374] ==================================================================
---
[   29.261520] ==================================================================
[   29.262434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450
[   29.263072] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   29.263755] 
[   29.264050] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.264220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.264261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.264324] Call Trace:
[   29.264366]  <TASK>
[   29.264416]  dump_stack_lvl+0x73/0xb0
[   29.264506]  print_report+0xd1/0x640
[   29.264566]  ? __virt_addr_valid+0x1db/0x2d0
[   29.264629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.264762]  kasan_report+0x102/0x140
[   29.264855]  ? kasan_atomics_helper+0x218b/0x5450
[   29.264928]  ? kasan_atomics_helper+0x218b/0x5450
[   29.265009]  kasan_check_range+0x10c/0x1c0
[   29.265072]  __kasan_check_write+0x18/0x20
[   29.265208]  kasan_atomics_helper+0x218b/0x5450
[   29.265281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.265353]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.265422]  ? kasan_atomics+0x153/0x310
[   29.265493]  kasan_atomics+0x1dd/0x310
[   29.265555]  ? __pfx_kasan_atomics+0x10/0x10
[   29.265618]  ? __pfx_read_tsc+0x10/0x10
[   29.265677]  ? ktime_get_ts64+0x86/0x230
[   29.265751]  kunit_try_run_case+0x1b3/0x490
[   29.265814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.265871]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.265933]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.265995]  ? __kthread_parkme+0x82/0x160
[   29.266053]  ? preempt_count_sub+0x50/0x80
[   29.266261]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.266326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.266483]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.266562]  kthread+0x324/0x6d0
[   29.266625]  ? trace_preempt_on+0x20/0xc0
[   29.266676]  ? __pfx_kthread+0x10/0x10
[   29.266712]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.266747]  ? calculate_sigpending+0x7b/0xa0
[   29.266780]  ? __pfx_kthread+0x10/0x10
[   29.266814]  ret_from_fork+0x41/0x80
[   29.266841]  ? __pfx_kthread+0x10/0x10
[   29.266874]  ret_from_fork_asm+0x1a/0x30
[   29.266921]  </TASK>
[   29.266939] 
[   29.280525] Allocated by task 273:
[   29.280947]  kasan_save_stack+0x3d/0x60
[   29.281605]  kasan_save_track+0x18/0x40
[   29.281910]  kasan_save_alloc_info+0x3b/0x50
[   29.282480]  __kasan_kmalloc+0xb7/0xc0
[   29.282747]  __kmalloc_cache_noprof+0x184/0x410
[   29.283026]  kasan_atomics+0x96/0x310
[   29.283525]  kunit_try_run_case+0x1b3/0x490
[   29.284033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.284746]  kthread+0x324/0x6d0
[   29.285135]  ret_from_fork+0x41/0x80
[   29.285532]  ret_from_fork_asm+0x1a/0x30
[   29.285807] 
[   29.285967] The buggy address belongs to the object at ffff888102a6c880
[   29.285967]  which belongs to the cache kmalloc-64 of size 64
[   29.286929] The buggy address is located 0 bytes to the right of
[   29.286929]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.288109] 
[   29.288486] The buggy address belongs to the physical page:
[   29.288990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.289612] flags: 0x200000000000000(node=0|zone=2)
[   29.290103] page_type: f5(slab)
[   29.290577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.291142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.291676] page dumped because: kasan: bad access detected
[   29.291991] 
[   29.292153] Memory state around the buggy address:
[   29.292453]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.292820]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.293203] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.293824]                                      ^
[   29.294374]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.295088]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.295759] ==================================================================
---
[   28.205403] ==================================================================
[   28.205748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450
[   28.206122] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.207602] 
[   28.207810] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.207934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.207973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.208034] Call Trace:
[   28.208064]  <TASK>
[   28.208098]  dump_stack_lvl+0x73/0xb0
[   28.208181]  print_report+0xd1/0x640
[   28.208282]  ? __virt_addr_valid+0x1db/0x2d0
[   28.208334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.208374]  kasan_report+0x102/0x140
[   28.208403]  ? kasan_atomics_helper+0x1468/0x5450
[   28.208440]  ? kasan_atomics_helper+0x1468/0x5450
[   28.208481]  kasan_check_range+0x10c/0x1c0
[   28.208514]  __kasan_check_write+0x18/0x20
[   28.208545]  kasan_atomics_helper+0x1468/0x5450
[   28.208582]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.208617]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.208651]  ? kasan_atomics+0x153/0x310
[   28.208688]  kasan_atomics+0x1dd/0x310
[   28.208718]  ? __pfx_kasan_atomics+0x10/0x10
[   28.208751]  ? __pfx_read_tsc+0x10/0x10
[   28.208782]  ? ktime_get_ts64+0x86/0x230
[   28.208818]  kunit_try_run_case+0x1b3/0x490
[   28.208850]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.208881]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.208915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.208950]  ? __kthread_parkme+0x82/0x160
[   28.208982]  ? preempt_count_sub+0x50/0x80
[   28.209018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.209051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.209094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.209216]  kthread+0x324/0x6d0
[   28.209276]  ? trace_preempt_on+0x20/0xc0
[   28.209344]  ? __pfx_kthread+0x10/0x10
[   28.209405]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.209472]  ? calculate_sigpending+0x7b/0xa0
[   28.209532]  ? __pfx_kthread+0x10/0x10
[   28.209597]  ret_from_fork+0x41/0x80
[   28.209695]  ? __pfx_kthread+0x10/0x10
[   28.209739]  ret_from_fork_asm+0x1a/0x30
[   28.209788]  </TASK>
[   28.209806] 
[   28.229371] Allocated by task 273:
[   28.229877]  kasan_save_stack+0x3d/0x60
[   28.230459]  kasan_save_track+0x18/0x40
[   28.230950]  kasan_save_alloc_info+0x3b/0x50
[   28.231533]  __kasan_kmalloc+0xb7/0xc0
[   28.231834]  __kmalloc_cache_noprof+0x184/0x410
[   28.232466]  kasan_atomics+0x96/0x310
[   28.232935]  kunit_try_run_case+0x1b3/0x490
[   28.233510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.233902]  kthread+0x324/0x6d0
[   28.234225]  ret_from_fork+0x41/0x80
[   28.234522]  ret_from_fork_asm+0x1a/0x30
[   28.234941] 
[   28.235214] The buggy address belongs to the object at ffff888102a6c880
[   28.235214]  which belongs to the cache kmalloc-64 of size 64
[   28.236045] The buggy address is located 0 bytes to the right of
[   28.236045]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.237154] 
[   28.237409] The buggy address belongs to the physical page:
[   28.237927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.238394] flags: 0x200000000000000(node=0|zone=2)
[   28.238920] page_type: f5(slab)
[   28.239356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.240073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.240618] page dumped because: kasan: bad access detected
[   28.241220] 
[   28.241440] Memory state around the buggy address:
[   28.241809]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.242476]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.243046] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.243582]                                      ^
[   28.244081]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.244606]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.245189] ==================================================================
---
[   27.655810] ==================================================================
[   27.656406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450
[   27.657047] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.657625] 
[   27.657830] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.657898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.657918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.657952] Call Trace:
[   27.657976]  <TASK>
[   27.658006]  dump_stack_lvl+0x73/0xb0
[   27.658054]  print_report+0xd1/0x640
[   27.658084]  ? __virt_addr_valid+0x1db/0x2d0
[   27.658136]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.658212]  kasan_report+0x102/0x140
[   27.658263]  ? kasan_atomics_helper+0xf11/0x5450
[   27.658390]  ? kasan_atomics_helper+0xf11/0x5450
[   27.658506]  kasan_check_range+0x10c/0x1c0
[   27.658569]  __kasan_check_write+0x18/0x20
[   27.658632]  kasan_atomics_helper+0xf11/0x5450
[   27.658754]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.658857]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.658926]  ? kasan_atomics+0x153/0x310
[   27.658987]  kasan_atomics+0x1dd/0x310
[   27.659048]  ? __pfx_kasan_atomics+0x10/0x10
[   27.659109]  ? __pfx_read_tsc+0x10/0x10
[   27.659492]  ? ktime_get_ts64+0x86/0x230
[   27.659576]  kunit_try_run_case+0x1b3/0x490
[   27.659709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.659776]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.659844]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.659923]  ? __kthread_parkme+0x82/0x160
[   27.659986]  ? preempt_count_sub+0x50/0x80
[   27.660056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.660188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.660269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.660339]  kthread+0x324/0x6d0
[   27.660399]  ? trace_preempt_on+0x20/0xc0
[   27.660465]  ? __pfx_kthread+0x10/0x10
[   27.660519]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.660575]  ? calculate_sigpending+0x7b/0xa0
[   27.660635]  ? __pfx_kthread+0x10/0x10
[   27.660697]  ret_from_fork+0x41/0x80
[   27.660751]  ? __pfx_kthread+0x10/0x10
[   27.660813]  ret_from_fork_asm+0x1a/0x30
[   27.660902]  </TASK>
[   27.660934] 
[   27.676461] Allocated by task 273:
[   27.676925]  kasan_save_stack+0x3d/0x60
[   27.677488]  kasan_save_track+0x18/0x40
[   27.677938]  kasan_save_alloc_info+0x3b/0x50
[   27.678486]  __kasan_kmalloc+0xb7/0xc0
[   27.678930]  __kmalloc_cache_noprof+0x184/0x410
[   27.679485]  kasan_atomics+0x96/0x310
[   27.680020]  kunit_try_run_case+0x1b3/0x490
[   27.680546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.680874]  kthread+0x324/0x6d0
[   27.681181]  ret_from_fork+0x41/0x80
[   27.681570]  ret_from_fork_asm+0x1a/0x30
[   27.681843] 
[   27.682063] The buggy address belongs to the object at ffff888102a6c880
[   27.682063]  which belongs to the cache kmalloc-64 of size 64
[   27.683004] The buggy address is located 0 bytes to the right of
[   27.683004]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.683695] 
[   27.683858] The buggy address belongs to the physical page:
[   27.684441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.685195] flags: 0x200000000000000(node=0|zone=2)
[   27.685606] page_type: f5(slab)
[   27.685846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.686573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.687291] page dumped because: kasan: bad access detected
[   27.687639] 
[   27.687796] Memory state around the buggy address:
[   27.688138]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.688810]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.689497] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.690248]                                      ^
[   27.690661]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.691040]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.691716] ==================================================================
---
[   28.726806] ==================================================================
[   28.727495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450
[   28.728318] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.729012] 
[   28.729273] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.729390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.729428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.729493] Call Trace:
[   28.729536]  <TASK>
[   28.729584]  dump_stack_lvl+0x73/0xb0
[   28.729668]  print_report+0xd1/0x640
[   28.729730]  ? __virt_addr_valid+0x1db/0x2d0
[   28.729793]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.729863]  kasan_report+0x102/0x140
[   28.729919]  ? kasan_atomics_helper+0x1c19/0x5450
[   28.730067]  ? kasan_atomics_helper+0x1c19/0x5450
[   28.730318]  kasan_check_range+0x10c/0x1c0
[   28.730396]  __kasan_check_write+0x18/0x20
[   28.730525]  kasan_atomics_helper+0x1c19/0x5450
[   28.730706]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.730787]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.730859]  ? kasan_atomics+0x153/0x310
[   28.730933]  kasan_atomics+0x1dd/0x310
[   28.730996]  ? __pfx_kasan_atomics+0x10/0x10
[   28.731061]  ? __pfx_read_tsc+0x10/0x10
[   28.731184]  ? ktime_get_ts64+0x86/0x230
[   28.731234]  kunit_try_run_case+0x1b3/0x490
[   28.731270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.731303]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.731338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.731373]  ? __kthread_parkme+0x82/0x160
[   28.731405]  ? preempt_count_sub+0x50/0x80
[   28.731440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.731472]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.731507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.731545]  kthread+0x324/0x6d0
[   28.731576]  ? trace_preempt_on+0x20/0xc0
[   28.731608]  ? __pfx_kthread+0x10/0x10
[   28.731641]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.731672]  ? calculate_sigpending+0x7b/0xa0
[   28.731705]  ? __pfx_kthread+0x10/0x10
[   28.731737]  ret_from_fork+0x41/0x80
[   28.731764]  ? __pfx_kthread+0x10/0x10
[   28.731796]  ret_from_fork_asm+0x1a/0x30
[   28.731840]  </TASK>
[   28.731860] 
[   28.748327] Allocated by task 273:
[   28.748815]  kasan_save_stack+0x3d/0x60
[   28.749404]  kasan_save_track+0x18/0x40
[   28.749911]  kasan_save_alloc_info+0x3b/0x50
[   28.750491]  __kasan_kmalloc+0xb7/0xc0
[   28.750964]  __kmalloc_cache_noprof+0x184/0x410
[   28.751570]  kasan_atomics+0x96/0x310
[   28.751993]  kunit_try_run_case+0x1b3/0x490
[   28.752462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.753079]  kthread+0x324/0x6d0
[   28.753602]  ret_from_fork+0x41/0x80
[   28.754133]  ret_from_fork_asm+0x1a/0x30
[   28.754682] 
[   28.754901] The buggy address belongs to the object at ffff888102a6c880
[   28.754901]  which belongs to the cache kmalloc-64 of size 64
[   28.755817] The buggy address is located 0 bytes to the right of
[   28.755817]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.756683] 
[   28.756987] The buggy address belongs to the physical page:
[   28.757354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.757975] flags: 0x200000000000000(node=0|zone=2)
[   28.758581] page_type: f5(slab)
[   28.758949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.759753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.760389] page dumped because: kasan: bad access detected
[   28.760727] 
[   28.760883] Memory state around the buggy address:
[   28.761234]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.762001]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.762763] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.763446]                                      ^
[   28.763732]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.764252]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.765026] ==================================================================
---
[   27.119454] ==================================================================
[   27.119975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450
[   27.120411] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.120995] 
[   27.121288] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.121436] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.121478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.121552] Call Trace:
[   27.121613]  <TASK>
[   27.121664]  dump_stack_lvl+0x73/0xb0
[   27.121743]  print_report+0xd1/0x640
[   27.121803]  ? __virt_addr_valid+0x1db/0x2d0
[   27.121861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.121932]  kasan_report+0x102/0x140
[   27.121986]  ? kasan_atomics_helper+0x730/0x5450
[   27.122064]  ? kasan_atomics_helper+0x730/0x5450
[   27.122222]  kasan_check_range+0x10c/0x1c0
[   27.122289]  __kasan_check_write+0x18/0x20
[   27.122354]  kasan_atomics_helper+0x730/0x5450
[   27.122420]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.122533]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.122608]  ? kasan_atomics+0x153/0x310
[   27.122670]  kasan_atomics+0x1dd/0x310
[   27.122725]  ? __pfx_kasan_atomics+0x10/0x10
[   27.122788]  ? __pfx_read_tsc+0x10/0x10
[   27.122845]  ? ktime_get_ts64+0x86/0x230
[   27.122936]  kunit_try_run_case+0x1b3/0x490
[   27.123022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.123082]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.123218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.123290]  ? __kthread_parkme+0x82/0x160
[   27.123355]  ? preempt_count_sub+0x50/0x80
[   27.123426]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.123489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.123580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.123680]  kthread+0x324/0x6d0
[   27.123748]  ? trace_preempt_on+0x20/0xc0
[   27.123814]  ? __pfx_kthread+0x10/0x10
[   27.123872]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.123948]  ? calculate_sigpending+0x7b/0xa0
[   27.124012]  ? __pfx_kthread+0x10/0x10
[   27.124074]  ret_from_fork+0x41/0x80
[   27.124191]  ? __pfx_kthread+0x10/0x10
[   27.124259]  ret_from_fork_asm+0x1a/0x30
[   27.124384]  </TASK>
[   27.124428] 
[   27.140940] Allocated by task 273:
[   27.141466]  kasan_save_stack+0x3d/0x60
[   27.141905]  kasan_save_track+0x18/0x40
[   27.142565]  kasan_save_alloc_info+0x3b/0x50
[   27.143446]  __kasan_kmalloc+0xb7/0xc0
[   27.143872]  __kmalloc_cache_noprof+0x184/0x410
[   27.144436]  kasan_atomics+0x96/0x310
[   27.144834]  kunit_try_run_case+0x1b3/0x490
[   27.145125]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.145634]  kthread+0x324/0x6d0
[   27.145962]  ret_from_fork+0x41/0x80
[   27.146309]  ret_from_fork_asm+0x1a/0x30
[   27.146792] 
[   27.147039] The buggy address belongs to the object at ffff888102a6c880
[   27.147039]  which belongs to the cache kmalloc-64 of size 64
[   27.148127] The buggy address is located 0 bytes to the right of
[   27.148127]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.149141] 
[   27.149429] The buggy address belongs to the physical page:
[   27.150036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.150874] flags: 0x200000000000000(node=0|zone=2)
[   27.151605] page_type: f5(slab)
[   27.152014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.152553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.153051] page dumped because: kasan: bad access detected
[   27.153498] 
[   27.153716] Memory state around the buggy address:
[   27.154220]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.154693]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.155410] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.155794]                                      ^
[   27.156327]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.156814]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.157445] ==================================================================
---
[   26.997719] ==================================================================
[   26.998856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450
[   26.999668] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.000637] 
[   27.001043] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.001148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.001198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.001251] Call Trace:
[   27.001294]  <TASK>
[   27.001335]  dump_stack_lvl+0x73/0xb0
[   27.001409]  print_report+0xd1/0x640
[   27.002278]  ? __virt_addr_valid+0x1db/0x2d0
[   27.002349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.002425]  kasan_report+0x102/0x140
[   27.002480]  ? kasan_atomics_helper+0x566/0x5450
[   27.002550]  ? kasan_atomics_helper+0x566/0x5450
[   27.002613]  kasan_check_range+0x10c/0x1c0
[   27.002662]  __kasan_check_write+0x18/0x20
[   27.002696]  kasan_atomics_helper+0x566/0x5450
[   27.002735]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.002794]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.002833]  ? kasan_atomics+0x153/0x310
[   27.002871]  kasan_atomics+0x1dd/0x310
[   27.002902]  ? __pfx_kasan_atomics+0x10/0x10
[   27.002936]  ? __pfx_read_tsc+0x10/0x10
[   27.002967]  ? ktime_get_ts64+0x86/0x230
[   27.003004]  kunit_try_run_case+0x1b3/0x490
[   27.003036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.003067]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.003115]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.003201]  ? __kthread_parkme+0x82/0x160
[   27.003264]  ? preempt_count_sub+0x50/0x80
[   27.003332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.003395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.003466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.003535]  kthread+0x324/0x6d0
[   27.003591]  ? trace_preempt_on+0x20/0xc0
[   27.003653]  ? __pfx_kthread+0x10/0x10
[   27.003705]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.003761]  ? calculate_sigpending+0x7b/0xa0
[   27.003817]  ? __pfx_kthread+0x10/0x10
[   27.003872]  ret_from_fork+0x41/0x80
[   27.003933]  ? __pfx_kthread+0x10/0x10
[   27.003986]  ret_from_fork_asm+0x1a/0x30
[   27.004066]  </TASK>
[   27.004100] 
[   27.014082] Allocated by task 273:
[   27.014436]  kasan_save_stack+0x3d/0x60
[   27.014699]  kasan_save_track+0x18/0x40
[   27.014946]  kasan_save_alloc_info+0x3b/0x50
[   27.017794]  __kasan_kmalloc+0xb7/0xc0
[   27.018067]  __kmalloc_cache_noprof+0x184/0x410
[   27.018406]  kasan_atomics+0x96/0x310
[   27.018665]  kunit_try_run_case+0x1b3/0x490
[   27.018937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.019286]  kthread+0x324/0x6d0
[   27.019539]  ret_from_fork+0x41/0x80
[   27.019789]  ret_from_fork_asm+0x1a/0x30
[   27.020077] 
[   27.020359] The buggy address belongs to the object at ffff888102a6c880
[   27.020359]  which belongs to the cache kmalloc-64 of size 64
[   27.020906] The buggy address is located 0 bytes to the right of
[   27.020906]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.021657] 
[   27.021808] The buggy address belongs to the physical page:
[   27.022089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.022753] flags: 0x200000000000000(node=0|zone=2)
[   27.023062] page_type: f5(slab)
[   27.023321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.023703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.024080] page dumped because: kasan: bad access detected
[   27.024586] 
[   27.024792] Memory state around the buggy address:
[   27.025259]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.027338]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.028312] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.029200]                                      ^
[   27.029672]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.030466]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.030955] ==================================================================
---
[   27.077463] ==================================================================
[   27.078238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450
[   27.078954] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.079809] 
[   27.080010] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.080139] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.080196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.080257] Call Trace:
[   27.080300]  <TASK>
[   27.080346]  dump_stack_lvl+0x73/0xb0
[   27.080430]  print_report+0xd1/0x640
[   27.080488]  ? __virt_addr_valid+0x1db/0x2d0
[   27.080553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.080629]  kasan_report+0x102/0x140
[   27.080680]  ? kasan_atomics_helper+0x698/0x5450
[   27.080750]  ? kasan_atomics_helper+0x698/0x5450
[   27.080830]  kasan_check_range+0x10c/0x1c0
[   27.080895]  __kasan_check_write+0x18/0x20
[   27.080959]  kasan_atomics_helper+0x698/0x5450
[   27.081030]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.081100]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.081191]  ? kasan_atomics+0x153/0x310
[   27.081267]  kasan_atomics+0x1dd/0x310
[   27.081327]  ? __pfx_kasan_atomics+0x10/0x10
[   27.081393]  ? __pfx_read_tsc+0x10/0x10
[   27.081454]  ? ktime_get_ts64+0x86/0x230
[   27.081526]  kunit_try_run_case+0x1b3/0x490
[   27.081585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.081627]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.081673]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.081722]  ? __kthread_parkme+0x82/0x160
[   27.081767]  ? preempt_count_sub+0x50/0x80
[   27.081818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.081863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.081917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.081970]  kthread+0x324/0x6d0
[   27.082018]  ? trace_preempt_on+0x20/0xc0
[   27.082080]  ? __pfx_kthread+0x10/0x10
[   27.082136]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.082324]  ? calculate_sigpending+0x7b/0xa0
[   27.082398]  ? __pfx_kthread+0x10/0x10
[   27.082463]  ret_from_fork+0x41/0x80
[   27.082559]  ? __pfx_kthread+0x10/0x10
[   27.082652]  ret_from_fork_asm+0x1a/0x30
[   27.082924]  </TASK>
[   27.082995] 
[   27.100406] Allocated by task 273:
[   27.100808]  kasan_save_stack+0x3d/0x60
[   27.101353]  kasan_save_track+0x18/0x40
[   27.101775]  kasan_save_alloc_info+0x3b/0x50
[   27.102346]  __kasan_kmalloc+0xb7/0xc0
[   27.102721]  __kmalloc_cache_noprof+0x184/0x410
[   27.103327]  kasan_atomics+0x96/0x310
[   27.103683]  kunit_try_run_case+0x1b3/0x490
[   27.103973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.104621]  kthread+0x324/0x6d0
[   27.105001]  ret_from_fork+0x41/0x80
[   27.105911]  ret_from_fork_asm+0x1a/0x30
[   27.106910] 
[   27.107561] The buggy address belongs to the object at ffff888102a6c880
[   27.107561]  which belongs to the cache kmalloc-64 of size 64
[   27.108490] The buggy address is located 0 bytes to the right of
[   27.108490]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.109902] 
[   27.110143] The buggy address belongs to the physical page:
[   27.110764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.111335] flags: 0x200000000000000(node=0|zone=2)
[   27.111843] page_type: f5(slab)
[   27.112306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.112853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.113414] page dumped because: kasan: bad access detected
[   27.113948] 
[   27.114144] Memory state around the buggy address:
[   27.114666]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.115221]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.115857] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.116416]                                      ^
[   27.116872]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.117494]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.118068] ==================================================================
---
[   27.414636] ==================================================================
[   27.415042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450
[   27.415929] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.417813] 
[   27.417977] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.418050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.418085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.418146] Call Trace:
[   27.418249]  <TASK>
[   27.418442]  dump_stack_lvl+0x73/0xb0
[   27.418555]  print_report+0xd1/0x640
[   27.418592]  ? __virt_addr_valid+0x1db/0x2d0
[   27.418628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.418669]  kasan_report+0x102/0x140
[   27.418696]  ? kasan_atomics_helper+0xb6b/0x5450
[   27.418733]  ? kasan_atomics_helper+0xb6b/0x5450
[   27.418775]  kasan_check_range+0x10c/0x1c0
[   27.418807]  __kasan_check_write+0x18/0x20
[   27.418839]  kasan_atomics_helper+0xb6b/0x5450
[   27.418875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.418911]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.418946]  ? kasan_atomics+0x153/0x310
[   27.418983]  kasan_atomics+0x1dd/0x310
[   27.419014]  ? __pfx_kasan_atomics+0x10/0x10
[   27.419047]  ? __pfx_read_tsc+0x10/0x10
[   27.419078]  ? ktime_get_ts64+0x86/0x230
[   27.419153]  kunit_try_run_case+0x1b3/0x490
[   27.419211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.419242]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.419277]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.419312]  ? __kthread_parkme+0x82/0x160
[   27.419344]  ? preempt_count_sub+0x50/0x80
[   27.419381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.419412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.419449]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.419486]  kthread+0x324/0x6d0
[   27.419516]  ? trace_preempt_on+0x20/0xc0
[   27.419550]  ? __pfx_kthread+0x10/0x10
[   27.419581]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.419653]  ? calculate_sigpending+0x7b/0xa0
[   27.419686]  ? __pfx_kthread+0x10/0x10
[   27.419720]  ret_from_fork+0x41/0x80
[   27.419748]  ? __pfx_kthread+0x10/0x10
[   27.419780]  ret_from_fork_asm+0x1a/0x30
[   27.419827]  </TASK>
[   27.419845] 
[   27.432990] Allocated by task 273:
[   27.433437]  kasan_save_stack+0x3d/0x60
[   27.434013]  kasan_save_track+0x18/0x40
[   27.434549]  kasan_save_alloc_info+0x3b/0x50
[   27.435068]  __kasan_kmalloc+0xb7/0xc0
[   27.435524]  __kmalloc_cache_noprof+0x184/0x410
[   27.436083]  kasan_atomics+0x96/0x310
[   27.436525]  kunit_try_run_case+0x1b3/0x490
[   27.436948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.437572]  kthread+0x324/0x6d0
[   27.437821]  ret_from_fork+0x41/0x80
[   27.438066]  ret_from_fork_asm+0x1a/0x30
[   27.438630] 
[   27.438979] The buggy address belongs to the object at ffff888102a6c880
[   27.438979]  which belongs to the cache kmalloc-64 of size 64
[   27.440227] The buggy address is located 0 bytes to the right of
[   27.440227]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.440905] 
[   27.441066] The buggy address belongs to the physical page:
[   27.441596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.442406] flags: 0x200000000000000(node=0|zone=2)
[   27.442889] page_type: f5(slab)
[   27.443433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.443928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.444877] page dumped because: kasan: bad access detected
[   27.448242] 
[   27.448885] Memory state around the buggy address:
[   27.449591]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.450030]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.450705] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.451996]                                      ^
[   27.452551]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.453401]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.454491] ==================================================================
---
[   27.159102] ==================================================================
[   27.160461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450
[   27.161249] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.161659] 
[   27.161814] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.161879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.161898] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.161933] Call Trace:
[   27.161955]  <TASK>
[   27.161981]  dump_stack_lvl+0x73/0xb0
[   27.162026]  print_report+0xd1/0x640
[   27.162056]  ? __virt_addr_valid+0x1db/0x2d0
[   27.162089]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.162128]  kasan_report+0x102/0x140
[   27.162218]  ? kasan_atomics_helper+0x7c8/0x5450
[   27.162300]  ? kasan_atomics_helper+0x7c8/0x5450
[   27.162378]  kasan_check_range+0x10c/0x1c0
[   27.162444]  __kasan_check_write+0x18/0x20
[   27.162506]  kasan_atomics_helper+0x7c8/0x5450
[   27.162578]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.162665]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.162766]  ? kasan_atomics+0x153/0x310
[   27.162841]  kasan_atomics+0x1dd/0x310
[   27.162906]  ? __pfx_kasan_atomics+0x10/0x10
[   27.162971]  ? __pfx_read_tsc+0x10/0x10
[   27.163033]  ? ktime_get_ts64+0x86/0x230
[   27.163121]  kunit_try_run_case+0x1b3/0x490
[   27.163210]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.163268]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.163334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.163397]  ? __kthread_parkme+0x82/0x160
[   27.163458]  ? preempt_count_sub+0x50/0x80
[   27.163526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.163584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.163652]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.163720]  kthread+0x324/0x6d0
[   27.163779]  ? trace_preempt_on+0x20/0xc0
[   27.163846]  ? __pfx_kthread+0x10/0x10
[   27.163920]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.164008]  ? calculate_sigpending+0x7b/0xa0
[   27.164067]  ? __pfx_kthread+0x10/0x10
[   27.164117]  ret_from_fork+0x41/0x80
[   27.164149]  ? __pfx_kthread+0x10/0x10
[   27.164203]  ret_from_fork_asm+0x1a/0x30
[   27.164251]  </TASK>
[   27.164269] 
[   27.183040] Allocated by task 273:
[   27.183404]  kasan_save_stack+0x3d/0x60
[   27.184032]  kasan_save_track+0x18/0x40
[   27.184650]  kasan_save_alloc_info+0x3b/0x50
[   27.185455]  __kasan_kmalloc+0xb7/0xc0
[   27.186183]  __kmalloc_cache_noprof+0x184/0x410
[   27.186601]  kasan_atomics+0x96/0x310
[   27.186893]  kunit_try_run_case+0x1b3/0x490
[   27.187657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.188378]  kthread+0x324/0x6d0
[   27.189006]  ret_from_fork+0x41/0x80
[   27.189671]  ret_from_fork_asm+0x1a/0x30
[   27.190059] 
[   27.190641] The buggy address belongs to the object at ffff888102a6c880
[   27.190641]  which belongs to the cache kmalloc-64 of size 64
[   27.191735] The buggy address is located 0 bytes to the right of
[   27.191735]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.192650] 
[   27.192919] The buggy address belongs to the physical page:
[   27.193426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.193934] flags: 0x200000000000000(node=0|zone=2)
[   27.194628] page_type: f5(slab)
[   27.194991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.195405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.196216] page dumped because: kasan: bad access detected
[   27.196607] 
[   27.196760] Memory state around the buggy address:
[   27.197044]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.197741]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.198432] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.198852]                                      ^
[   27.199418]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.199942]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.200694] ==================================================================
---
[   28.406836] ==================================================================
[   28.407989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450
[   28.408718] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.409247] 
[   28.409433] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.409544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.409583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.409682] Call Trace:
[   28.409730]  <TASK>
[   28.409778]  dump_stack_lvl+0x73/0xb0
[   28.409859]  print_report+0xd1/0x640
[   28.409915]  ? __virt_addr_valid+0x1db/0x2d0
[   28.409971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.410038]  kasan_report+0x102/0x140
[   28.410139]  ? kasan_atomics_helper+0x16e8/0x5450
[   28.410241]  ? kasan_atomics_helper+0x16e8/0x5450
[   28.410323]  kasan_check_range+0x10c/0x1c0
[   28.410390]  __kasan_check_write+0x18/0x20
[   28.410451]  kasan_atomics_helper+0x16e8/0x5450
[   28.410524]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.410594]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.410665]  ? kasan_atomics+0x153/0x310
[   28.410736]  kasan_atomics+0x1dd/0x310
[   28.410798]  ? __pfx_kasan_atomics+0x10/0x10
[   28.410860]  ? __pfx_read_tsc+0x10/0x10
[   28.410959]  ? ktime_get_ts64+0x86/0x230
[   28.411038]  kunit_try_run_case+0x1b3/0x490
[   28.411140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.411214]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.411280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.411342]  ? __kthread_parkme+0x82/0x160
[   28.411403]  ? preempt_count_sub+0x50/0x80
[   28.411468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.411531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.411601]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.411672]  kthread+0x324/0x6d0
[   28.411727]  ? trace_preempt_on+0x20/0xc0
[   28.411791]  ? __pfx_kthread+0x10/0x10
[   28.411852]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.411929]  ? calculate_sigpending+0x7b/0xa0
[   28.411988]  ? __pfx_kthread+0x10/0x10
[   28.412045]  ret_from_fork+0x41/0x80
[   28.412142]  ? __pfx_kthread+0x10/0x10
[   28.412235]  ret_from_fork_asm+0x1a/0x30
[   28.412327]  </TASK>
[   28.412364] 
[   28.425282] Allocated by task 273:
[   28.425659]  kasan_save_stack+0x3d/0x60
[   28.426122]  kasan_save_track+0x18/0x40
[   28.426613]  kasan_save_alloc_info+0x3b/0x50
[   28.427123]  __kasan_kmalloc+0xb7/0xc0
[   28.427550]  __kmalloc_cache_noprof+0x184/0x410
[   28.427858]  kasan_atomics+0x96/0x310
[   28.428220]  kunit_try_run_case+0x1b3/0x490
[   28.428705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.429320]  kthread+0x324/0x6d0
[   28.429751]  ret_from_fork+0x41/0x80
[   28.430144]  ret_from_fork_asm+0x1a/0x30
[   28.430674] 
[   28.430847] The buggy address belongs to the object at ffff888102a6c880
[   28.430847]  which belongs to the cache kmalloc-64 of size 64
[   28.431642] The buggy address is located 0 bytes to the right of
[   28.431642]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.432364] 
[   28.432590] The buggy address belongs to the physical page:
[   28.433079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.433863] flags: 0x200000000000000(node=0|zone=2)
[   28.434437] page_type: f5(slab)
[   28.434826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.435468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.436130] page dumped because: kasan: bad access detected
[   28.436545] 
[   28.436778] Memory state around the buggy address:
[   28.437260]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.437631]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.437996] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.438622]                                      ^
[   28.439123]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.439816]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.440536] ==================================================================
---
[   27.366780] ==================================================================
[   27.368681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450
[   27.369326] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.370582] 
[   27.371001] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.371380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.371410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.371446] Call Trace:
[   27.371471]  <TASK>
[   27.371501]  dump_stack_lvl+0x73/0xb0
[   27.371554]  print_report+0xd1/0x640
[   27.371586]  ? __virt_addr_valid+0x1db/0x2d0
[   27.371619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.371659]  kasan_report+0x102/0x140
[   27.371686]  ? kasan_atomics_helper+0xac8/0x5450
[   27.371720]  ? kasan_atomics_helper+0xac8/0x5450
[   27.371762]  kasan_check_range+0x10c/0x1c0
[   27.371793]  __kasan_check_write+0x18/0x20
[   27.371825]  kasan_atomics_helper+0xac8/0x5450
[   27.371860]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.371908]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.371945]  ? kasan_atomics+0x153/0x310
[   27.371981]  kasan_atomics+0x1dd/0x310
[   27.372012]  ? __pfx_kasan_atomics+0x10/0x10
[   27.372044]  ? __pfx_read_tsc+0x10/0x10
[   27.372076]  ? ktime_get_ts64+0x86/0x230
[   27.372180]  kunit_try_run_case+0x1b3/0x490
[   27.372218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.372249]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.372283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.372317]  ? __kthread_parkme+0x82/0x160
[   27.372349]  ? preempt_count_sub+0x50/0x80
[   27.372385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.372416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.372453]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.372490]  kthread+0x324/0x6d0
[   27.372519]  ? trace_preempt_on+0x20/0xc0
[   27.372553]  ? __pfx_kthread+0x10/0x10
[   27.372584]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.372617]  ? calculate_sigpending+0x7b/0xa0
[   27.372647]  ? __pfx_kthread+0x10/0x10
[   27.372680]  ret_from_fork+0x41/0x80
[   27.372706]  ? __pfx_kthread+0x10/0x10
[   27.372738]  ret_from_fork_asm+0x1a/0x30
[   27.372783]  </TASK>
[   27.372802] 
[   27.392088] Allocated by task 273:
[   27.392570]  kasan_save_stack+0x3d/0x60
[   27.393385]  kasan_save_track+0x18/0x40
[   27.393806]  kasan_save_alloc_info+0x3b/0x50
[   27.394286]  __kasan_kmalloc+0xb7/0xc0
[   27.395508]  __kmalloc_cache_noprof+0x184/0x410
[   27.395861]  kasan_atomics+0x96/0x310
[   27.396297]  kunit_try_run_case+0x1b3/0x490
[   27.397031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.397814]  kthread+0x324/0x6d0
[   27.398360]  ret_from_fork+0x41/0x80
[   27.398781]  ret_from_fork_asm+0x1a/0x30
[   27.399537] 
[   27.399693] The buggy address belongs to the object at ffff888102a6c880
[   27.399693]  which belongs to the cache kmalloc-64 of size 64
[   27.401095] The buggy address is located 0 bytes to the right of
[   27.401095]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.402428] 
[   27.402898] The buggy address belongs to the physical page:
[   27.403244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.404223] flags: 0x200000000000000(node=0|zone=2)
[   27.404747] page_type: f5(slab)
[   27.405315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.406143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.406761] page dumped because: kasan: bad access detected
[   27.407067] 
[   27.407795] Memory state around the buggy address:
[   27.408111]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.408734]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.409907] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.410644]                                      ^
[   27.411355]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.412144]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.412764] ==================================================================
---
[   29.080886] ==================================================================
[   29.083710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450
[   29.084585] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   29.085375] 
[   29.085569] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.085688] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.085723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.085781] Call Trace:
[   29.085822]  <TASK>
[   29.085870]  dump_stack_lvl+0x73/0xb0
[   29.085954]  print_report+0xd1/0x640
[   29.086012]  ? __virt_addr_valid+0x1db/0x2d0
[   29.086072]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.087590]  kasan_report+0x102/0x140
[   29.087651]  ? kasan_atomics_helper+0x2007/0x5450
[   29.087721]  ? kasan_atomics_helper+0x2007/0x5450
[   29.087800]  kasan_check_range+0x10c/0x1c0
[   29.087863]  __kasan_check_write+0x18/0x20
[   29.087935]  kasan_atomics_helper+0x2007/0x5450
[   29.088004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.088068]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.088197]  ? kasan_atomics+0x153/0x310
[   29.088271]  kasan_atomics+0x1dd/0x310
[   29.088330]  ? __pfx_kasan_atomics+0x10/0x10
[   29.088393]  ? __pfx_read_tsc+0x10/0x10
[   29.088450]  ? ktime_get_ts64+0x86/0x230
[   29.088522]  kunit_try_run_case+0x1b3/0x490
[   29.088582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.088638]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.088701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.088765]  ? __kthread_parkme+0x82/0x160
[   29.088826]  ? preempt_count_sub+0x50/0x80
[   29.088894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.088954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.089025]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.089139]  kthread+0x324/0x6d0
[   29.089214]  ? trace_preempt_on+0x20/0xc0
[   29.089270]  ? __pfx_kthread+0x10/0x10
[   29.089328]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.089391]  ? calculate_sigpending+0x7b/0xa0
[   29.089451]  ? __pfx_kthread+0x10/0x10
[   29.089512]  ret_from_fork+0x41/0x80
[   29.089565]  ? __pfx_kthread+0x10/0x10
[   29.089623]  ret_from_fork_asm+0x1a/0x30
[   29.089758]  </TASK>
[   29.089788] 
[   29.113922] Allocated by task 273:
[   29.114245]  kasan_save_stack+0x3d/0x60
[   29.114524]  kasan_save_track+0x18/0x40
[   29.114767]  kasan_save_alloc_info+0x3b/0x50
[   29.115292]  __kasan_kmalloc+0xb7/0xc0
[   29.116064]  __kmalloc_cache_noprof+0x184/0x410
[   29.116904]  kasan_atomics+0x96/0x310
[   29.117413]  kunit_try_run_case+0x1b3/0x490
[   29.117883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.118487]  kthread+0x324/0x6d0
[   29.118875]  ret_from_fork+0x41/0x80
[   29.119350]  ret_from_fork_asm+0x1a/0x30
[   29.119860] 
[   29.120148] The buggy address belongs to the object at ffff888102a6c880
[   29.120148]  which belongs to the cache kmalloc-64 of size 64
[   29.121260] The buggy address is located 0 bytes to the right of
[   29.121260]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.122902] 
[   29.123536] The buggy address belongs to the physical page:
[   29.124346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.125148] flags: 0x200000000000000(node=0|zone=2)
[   29.125696] page_type: f5(slab)
[   29.126331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.126718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.127399] page dumped because: kasan: bad access detected
[   29.128015] 
[   29.128275] Memory state around the buggy address:
[   29.128722]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.129574]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.130046] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.130824]                                      ^
[   29.131529]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.132266]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.132763] ==================================================================
---
[   28.561608] ==================================================================
[   28.562247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450
[   28.563317] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.563743] 
[   28.563938] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.564053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.564094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.564152] Call Trace:
[   28.564254]  <TASK>
[   28.564302]  dump_stack_lvl+0x73/0xb0
[   28.564443]  print_report+0xd1/0x640
[   28.564533]  ? __virt_addr_valid+0x1db/0x2d0
[   28.564633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.564735]  kasan_report+0x102/0x140
[   28.564801]  ? kasan_atomics_helper+0x194b/0x5450
[   28.564910]  ? kasan_atomics_helper+0x194b/0x5450
[   28.565064]  kasan_check_range+0x10c/0x1c0
[   28.565218]  __kasan_check_write+0x18/0x20
[   28.565289]  kasan_atomics_helper+0x194b/0x5450
[   28.565363]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.565430]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.565501]  ? kasan_atomics+0x153/0x310
[   28.565570]  kasan_atomics+0x1dd/0x310
[   28.565631]  ? __pfx_kasan_atomics+0x10/0x10
[   28.565697]  ? __pfx_read_tsc+0x10/0x10
[   28.565753]  ? ktime_get_ts64+0x86/0x230
[   28.565827]  kunit_try_run_case+0x1b3/0x490
[   28.565879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.565928]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.565993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.566054]  ? __kthread_parkme+0x82/0x160
[   28.566255]  ? preempt_count_sub+0x50/0x80
[   28.566330]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.566394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.566469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.566535]  kthread+0x324/0x6d0
[   28.566593]  ? trace_preempt_on+0x20/0xc0
[   28.566658]  ? __pfx_kthread+0x10/0x10
[   28.566719]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.566784]  ? calculate_sigpending+0x7b/0xa0
[   28.566900]  ? __pfx_kthread+0x10/0x10
[   28.566996]  ret_from_fork+0x41/0x80
[   28.567054]  ? __pfx_kthread+0x10/0x10
[   28.567179]  ret_from_fork_asm+0x1a/0x30
[   28.567277]  </TASK>
[   28.567314] 
[   28.585205] Allocated by task 273:
[   28.586185]  kasan_save_stack+0x3d/0x60
[   28.586832]  kasan_save_track+0x18/0x40
[   28.587262]  kasan_save_alloc_info+0x3b/0x50
[   28.587816]  __kasan_kmalloc+0xb7/0xc0
[   28.588146]  __kmalloc_cache_noprof+0x184/0x410
[   28.588838]  kasan_atomics+0x96/0x310
[   28.589291]  kunit_try_run_case+0x1b3/0x490
[   28.590113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.590727]  kthread+0x324/0x6d0
[   28.590976]  ret_from_fork+0x41/0x80
[   28.591654]  ret_from_fork_asm+0x1a/0x30
[   28.592362] 
[   28.592558] The buggy address belongs to the object at ffff888102a6c880
[   28.592558]  which belongs to the cache kmalloc-64 of size 64
[   28.593794] The buggy address is located 0 bytes to the right of
[   28.593794]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.595083] 
[   28.595432] The buggy address belongs to the physical page:
[   28.596045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.596682] flags: 0x200000000000000(node=0|zone=2)
[   28.596982] page_type: f5(slab)
[   28.597378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.597932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.598483] page dumped because: kasan: bad access detected
[   28.598901] 
[   28.599181] Memory state around the buggy address:
[   28.599592]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.600229]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.600855] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.601284]                                      ^
[   28.601741]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.602424]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.602924] ==================================================================
---
[   28.324376] ==================================================================
[   28.324913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450
[   28.325574] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.326074] 
[   28.326277] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.326391] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.326427] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.326489] Call Trace:
[   28.326531]  <TASK>
[   28.326577]  dump_stack_lvl+0x73/0xb0
[   28.326656]  print_report+0xd1/0x640
[   28.326715]  ? __virt_addr_valid+0x1db/0x2d0
[   28.326774]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.326849]  kasan_report+0x102/0x140
[   28.326900]  ? kasan_atomics_helper+0x15b7/0x5450
[   28.326956]  ? kasan_atomics_helper+0x15b7/0x5450
[   28.327014]  kasan_check_range+0x10c/0x1c0
[   28.327061]  __kasan_check_write+0x18/0x20
[   28.327105]  kasan_atomics_helper+0x15b7/0x5450
[   28.327178]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.327230]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.327282]  ? kasan_atomics+0x153/0x310
[   28.327332]  kasan_atomics+0x1dd/0x310
[   28.327382]  ? __pfx_kasan_atomics+0x10/0x10
[   28.327438]  ? __pfx_read_tsc+0x10/0x10
[   28.327498]  ? ktime_get_ts64+0x86/0x230
[   28.327611]  kunit_try_run_case+0x1b3/0x490
[   28.327706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.327767]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.327837]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.327914]  ? __kthread_parkme+0x82/0x160
[   28.327976]  ? preempt_count_sub+0x50/0x80
[   28.328051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.328115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.328215]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.328287]  kthread+0x324/0x6d0
[   28.328347]  ? trace_preempt_on+0x20/0xc0
[   28.328458]  ? __pfx_kthread+0x10/0x10
[   28.328525]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.328608]  ? calculate_sigpending+0x7b/0xa0
[   28.328697]  ? __pfx_kthread+0x10/0x10
[   28.328763]  ret_from_fork+0x41/0x80
[   28.328822]  ? __pfx_kthread+0x10/0x10
[   28.328885]  ret_from_fork_asm+0x1a/0x30
[   28.328974]  </TASK>
[   28.329008] 
[   28.346459] Allocated by task 273:
[   28.346935]  kasan_save_stack+0x3d/0x60
[   28.347507]  kasan_save_track+0x18/0x40
[   28.347993]  kasan_save_alloc_info+0x3b/0x50
[   28.348534]  __kasan_kmalloc+0xb7/0xc0
[   28.348944]  __kmalloc_cache_noprof+0x184/0x410
[   28.349527]  kasan_atomics+0x96/0x310
[   28.349909]  kunit_try_run_case+0x1b3/0x490
[   28.350392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.350949]  kthread+0x324/0x6d0
[   28.351393]  ret_from_fork+0x41/0x80
[   28.351785]  ret_from_fork_asm+0x1a/0x30
[   28.352282] 
[   28.352447] The buggy address belongs to the object at ffff888102a6c880
[   28.352447]  which belongs to the cache kmalloc-64 of size 64
[   28.352992] The buggy address is located 0 bytes to the right of
[   28.352992]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.354308] 
[   28.354630] The buggy address belongs to the physical page:
[   28.355195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.356121] flags: 0x200000000000000(node=0|zone=2)
[   28.356627] page_type: f5(slab)
[   28.356869] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.357300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.357957] page dumped because: kasan: bad access detected
[   28.358835] 
[   28.359352] Memory state around the buggy address:
[   28.360148]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.361652]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.362386] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.362911]                                      ^
[   28.363474]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.364035]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.364708] ==================================================================
---
[   27.201864] ==================================================================
[   27.202738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450
[   27.204415] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.204822] 
[   27.205005] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.205116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.205527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.205596] Call Trace:
[   27.205638]  <TASK>
[   27.205687]  dump_stack_lvl+0x73/0xb0
[   27.205770]  print_report+0xd1/0x640
[   27.205830]  ? __virt_addr_valid+0x1db/0x2d0
[   27.205895]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.205972]  kasan_report+0x102/0x140
[   27.206028]  ? kasan_atomics_helper+0x861/0x5450
[   27.206096]  ? kasan_atomics_helper+0x861/0x5450
[   27.206268]  kasan_check_range+0x10c/0x1c0
[   27.206337]  __kasan_check_write+0x18/0x20
[   27.206401]  kasan_atomics_helper+0x861/0x5450
[   27.206470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.206537]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.206604]  ? kasan_atomics+0x153/0x310
[   27.206673]  kasan_atomics+0x1dd/0x310
[   27.206734]  ? __pfx_kasan_atomics+0x10/0x10
[   27.206791]  ? __pfx_read_tsc+0x10/0x10
[   27.206849]  ? ktime_get_ts64+0x86/0x230
[   27.206919]  kunit_try_run_case+0x1b3/0x490
[   27.206981]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.207037]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.207114]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.207200]  ? __kthread_parkme+0x82/0x160
[   27.207264]  ? preempt_count_sub+0x50/0x80
[   27.207337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.207401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.207477]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.207549]  kthread+0x324/0x6d0
[   27.207610]  ? trace_preempt_on+0x20/0xc0
[   27.207673]  ? __pfx_kthread+0x10/0x10
[   27.207735]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.207790]  ? calculate_sigpending+0x7b/0xa0
[   27.207827]  ? __pfx_kthread+0x10/0x10
[   27.207860]  ret_from_fork+0x41/0x80
[   27.207901]  ? __pfx_kthread+0x10/0x10
[   27.207934]  ret_from_fork_asm+0x1a/0x30
[   27.207981]  </TASK>
[   27.207999] 
[   27.219737] Allocated by task 273:
[   27.220185]  kasan_save_stack+0x3d/0x60
[   27.220545]  kasan_save_track+0x18/0x40
[   27.220823]  kasan_save_alloc_info+0x3b/0x50
[   27.221295]  __kasan_kmalloc+0xb7/0xc0
[   27.221562]  __kmalloc_cache_noprof+0x184/0x410
[   27.221843]  kasan_atomics+0x96/0x310
[   27.222092]  kunit_try_run_case+0x1b3/0x490
[   27.222556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.223080]  kthread+0x324/0x6d0
[   27.223494]  ret_from_fork+0x41/0x80
[   27.223872]  ret_from_fork_asm+0x1a/0x30
[   27.224413] 
[   27.224638] The buggy address belongs to the object at ffff888102a6c880
[   27.224638]  which belongs to the cache kmalloc-64 of size 64
[   27.225486] The buggy address is located 0 bytes to the right of
[   27.225486]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.226249] 
[   27.226467] The buggy address belongs to the physical page:
[   27.226994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.227417] flags: 0x200000000000000(node=0|zone=2)
[   27.227710] page_type: f5(slab)
[   27.227956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.228777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.229462] page dumped because: kasan: bad access detected
[   27.230069] 
[   27.230443] Memory state around the buggy address:
[   27.230945]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.231852]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.232763] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.233470]                                      ^
[   27.233801]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.234429]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.234880] ==================================================================
---
[   28.285600] ==================================================================
[   28.286346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450
[   28.286820] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.287384] 
[   28.287641] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.287755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.287793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.287858] Call Trace:
[   28.287911]  <TASK>
[   28.287960]  dump_stack_lvl+0x73/0xb0
[   28.288040]  print_report+0xd1/0x640
[   28.288143]  ? __virt_addr_valid+0x1db/0x2d0
[   28.288235]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.288311]  kasan_report+0x102/0x140
[   28.288368]  ? kasan_atomics_helper+0x151e/0x5450
[   28.288439]  ? kasan_atomics_helper+0x151e/0x5450
[   28.288518]  kasan_check_range+0x10c/0x1c0
[   28.288583]  __kasan_check_write+0x18/0x20
[   28.288645]  kasan_atomics_helper+0x151e/0x5450
[   28.288716]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.288783]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.288849]  ? kasan_atomics+0x153/0x310
[   28.288916]  kasan_atomics+0x1dd/0x310
[   28.289015]  ? __pfx_kasan_atomics+0x10/0x10
[   28.289131]  ? __pfx_read_tsc+0x10/0x10
[   28.289255]  ? ktime_get_ts64+0x86/0x230
[   28.289339]  kunit_try_run_case+0x1b3/0x490
[   28.289403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.289463]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.289529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.289594]  ? __kthread_parkme+0x82/0x160
[   28.289697]  ? preempt_count_sub+0x50/0x80
[   28.289815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.289879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.289948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.290018]  kthread+0x324/0x6d0
[   28.290153]  ? trace_preempt_on+0x20/0xc0
[   28.290277]  ? __pfx_kthread+0x10/0x10
[   28.290340]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.290405]  ? calculate_sigpending+0x7b/0xa0
[   28.290470]  ? __pfx_kthread+0x10/0x10
[   28.290531]  ret_from_fork+0x41/0x80
[   28.290584]  ? __pfx_kthread+0x10/0x10
[   28.290649]  ret_from_fork_asm+0x1a/0x30
[   28.290736]  </TASK>
[   28.290760] 
[   28.305982] Allocated by task 273:
[   28.306534]  kasan_save_stack+0x3d/0x60
[   28.307010]  kasan_save_track+0x18/0x40
[   28.307476]  kasan_save_alloc_info+0x3b/0x50
[   28.307971]  __kasan_kmalloc+0xb7/0xc0
[   28.308426]  __kmalloc_cache_noprof+0x184/0x410
[   28.308929]  kasan_atomics+0x96/0x310
[   28.309388]  kunit_try_run_case+0x1b3/0x490
[   28.309915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.310564]  kthread+0x324/0x6d0
[   28.310976]  ret_from_fork+0x41/0x80
[   28.311601]  ret_from_fork_asm+0x1a/0x30
[   28.312147] 
[   28.312372] The buggy address belongs to the object at ffff888102a6c880
[   28.312372]  which belongs to the cache kmalloc-64 of size 64
[   28.312940] The buggy address is located 0 bytes to the right of
[   28.312940]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.314225] 
[   28.314481] The buggy address belongs to the physical page:
[   28.315303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.316133] flags: 0x200000000000000(node=0|zone=2)
[   28.316731] page_type: f5(slab)
[   28.317216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.318043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.318835] page dumped because: kasan: bad access detected
[   28.319273] 
[   28.319452] Memory state around the buggy address:
[   28.319967]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.320786]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.321782] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.322500]                                      ^
[   28.322674]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.322885]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.323089] ==================================================================
---
[   28.881205] ==================================================================
[   28.881731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450
[   28.882508] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.882980] 
[   28.883338] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.883456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.883492] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.883556] Call Trace:
[   28.883602]  <TASK>
[   28.883651]  dump_stack_lvl+0x73/0xb0
[   28.883740]  print_report+0xd1/0x640
[   28.883803]  ? __virt_addr_valid+0x1db/0x2d0
[   28.883868]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.883959]  kasan_report+0x102/0x140
[   28.884014]  ? kasan_atomics_helper+0x1e13/0x5450
[   28.884127]  ? kasan_atomics_helper+0x1e13/0x5450
[   28.884246]  kasan_check_range+0x10c/0x1c0
[   28.884315]  __kasan_check_write+0x18/0x20
[   28.884380]  kasan_atomics_helper+0x1e13/0x5450
[   28.884452]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.884524]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.884596]  ? kasan_atomics+0x153/0x310
[   28.884670]  kasan_atomics+0x1dd/0x310
[   28.884731]  ? __pfx_kasan_atomics+0x10/0x10
[   28.884799]  ? __pfx_read_tsc+0x10/0x10
[   28.884861]  ? ktime_get_ts64+0x86/0x230
[   28.884933]  kunit_try_run_case+0x1b3/0x490
[   28.884999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.885058]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.885198]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.885271]  ? __kthread_parkme+0x82/0x160
[   28.885331]  ? preempt_count_sub+0x50/0x80
[   28.885403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.885512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.885592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.885665]  kthread+0x324/0x6d0
[   28.885726]  ? trace_preempt_on+0x20/0xc0
[   28.885793]  ? __pfx_kthread+0x10/0x10
[   28.885856]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.885922]  ? calculate_sigpending+0x7b/0xa0
[   28.885986]  ? __pfx_kthread+0x10/0x10
[   28.886049]  ret_from_fork+0x41/0x80
[   28.886150]  ? __pfx_kthread+0x10/0x10
[   28.886244]  ret_from_fork_asm+0x1a/0x30
[   28.886334]  </TASK>
[   28.886369] 
[   28.900997] Allocated by task 273:
[   28.901470]  kasan_save_stack+0x3d/0x60
[   28.901964]  kasan_save_track+0x18/0x40
[   28.902441]  kasan_save_alloc_info+0x3b/0x50
[   28.902888]  __kasan_kmalloc+0xb7/0xc0
[   28.903384]  __kmalloc_cache_noprof+0x184/0x410
[   28.903895]  kasan_atomics+0x96/0x310
[   28.904363]  kunit_try_run_case+0x1b3/0x490
[   28.904841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.905346]  kthread+0x324/0x6d0
[   28.905597]  ret_from_fork+0x41/0x80
[   28.905840]  ret_from_fork_asm+0x1a/0x30
[   28.906146] 
[   28.906395] The buggy address belongs to the object at ffff888102a6c880
[   28.906395]  which belongs to the cache kmalloc-64 of size 64
[   28.907450] The buggy address is located 0 bytes to the right of
[   28.907450]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.910686] 
[   28.910938] The buggy address belongs to the physical page:
[   28.912568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.912968] flags: 0x200000000000000(node=0|zone=2)
[   28.915531] page_type: f5(slab)
[   28.915936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.917832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.921289] page dumped because: kasan: bad access detected
[   28.922386] 
[   28.922659] Memory state around the buggy address:
[   28.923640]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.925808]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.927144] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.928661]                                      ^
[   28.928904]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.930334]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.930945] ==================================================================
---
[   28.441876] ==================================================================
[   28.443351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450
[   28.443917] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.444462] 
[   28.444703] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.444819] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.444858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.444921] Call Trace:
[   28.444962]  <TASK>
[   28.445006]  dump_stack_lvl+0x73/0xb0
[   28.445086]  print_report+0xd1/0x640
[   28.445143]  ? __virt_addr_valid+0x1db/0x2d0
[   28.445482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.445565]  kasan_report+0x102/0x140
[   28.445623]  ? kasan_atomics_helper+0x1780/0x5450
[   28.445691]  ? kasan_atomics_helper+0x1780/0x5450
[   28.445771]  kasan_check_range+0x10c/0x1c0
[   28.445837]  __kasan_check_write+0x18/0x20
[   28.445900]  kasan_atomics_helper+0x1780/0x5450
[   28.445972]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.446039]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.446176]  ? kasan_atomics+0x153/0x310
[   28.446262]  kasan_atomics+0x1dd/0x310
[   28.446326]  ? __pfx_kasan_atomics+0x10/0x10
[   28.446392]  ? __pfx_read_tsc+0x10/0x10
[   28.446452]  ? ktime_get_ts64+0x86/0x230
[   28.446524]  kunit_try_run_case+0x1b3/0x490
[   28.446585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.446645]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.446713]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.446780]  ? __kthread_parkme+0x82/0x160
[   28.446840]  ? preempt_count_sub+0x50/0x80
[   28.446912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.446973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.447047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.447180]  kthread+0x324/0x6d0
[   28.447251]  ? trace_preempt_on+0x20/0xc0
[   28.447316]  ? __pfx_kthread+0x10/0x10
[   28.447379]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.447440]  ? calculate_sigpending+0x7b/0xa0
[   28.447504]  ? __pfx_kthread+0x10/0x10
[   28.447569]  ret_from_fork+0x41/0x80
[   28.447623]  ? __pfx_kthread+0x10/0x10
[   28.447687]  ret_from_fork_asm+0x1a/0x30
[   28.447774]  </TASK>
[   28.447808] 
[   28.464282] Allocated by task 273:
[   28.464690]  kasan_save_stack+0x3d/0x60
[   28.465134]  kasan_save_track+0x18/0x40
[   28.465598]  kasan_save_alloc_info+0x3b/0x50
[   28.466046]  __kasan_kmalloc+0xb7/0xc0
[   28.466465]  __kmalloc_cache_noprof+0x184/0x410
[   28.466753]  kasan_atomics+0x96/0x310
[   28.467176]  kunit_try_run_case+0x1b3/0x490
[   28.467642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.468204]  kthread+0x324/0x6d0
[   28.468528]  ret_from_fork+0x41/0x80
[   28.468936]  ret_from_fork_asm+0x1a/0x30
[   28.469558] 
[   28.470080] The buggy address belongs to the object at ffff888102a6c880
[   28.470080]  which belongs to the cache kmalloc-64 of size 64
[   28.471938] The buggy address is located 0 bytes to the right of
[   28.471938]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.474065] 
[   28.475437] The buggy address belongs to the physical page:
[   28.475906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.476601] flags: 0x200000000000000(node=0|zone=2)
[   28.477259] page_type: f5(slab)
[   28.477484] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.478350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.478906] page dumped because: kasan: bad access detected
[   28.479496] 
[   28.479701] Memory state around the buggy address:
[   28.480265]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.480818]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.481491] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.482195]                                      ^
[   28.482687]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.483261]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.483830] ==================================================================
---
[   28.524730] ==================================================================
[   28.525346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450
[   28.525750] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.526181] 
[   28.526425] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.526534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.526572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.526636] Call Trace:
[   28.526677]  <TASK>
[   28.526723]  dump_stack_lvl+0x73/0xb0
[   28.526806]  print_report+0xd1/0x640
[   28.526867]  ? __virt_addr_valid+0x1db/0x2d0
[   28.526926]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.526995]  kasan_report+0x102/0x140
[   28.527049]  ? kasan_atomics_helper+0x18b2/0x5450
[   28.527194]  ? kasan_atomics_helper+0x18b2/0x5450
[   28.527285]  kasan_check_range+0x10c/0x1c0
[   28.527350]  __kasan_check_write+0x18/0x20
[   28.527415]  kasan_atomics_helper+0x18b2/0x5450
[   28.527484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.527549]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.527619]  ? kasan_atomics+0x153/0x310
[   28.527686]  kasan_atomics+0x1dd/0x310
[   28.527745]  ? __pfx_kasan_atomics+0x10/0x10
[   28.527811]  ? __pfx_read_tsc+0x10/0x10
[   28.527874]  ? ktime_get_ts64+0x86/0x230
[   28.527957]  kunit_try_run_case+0x1b3/0x490
[   28.528019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.528078]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.528214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.528286]  ? __kthread_parkme+0x82/0x160
[   28.528351]  ? preempt_count_sub+0x50/0x80
[   28.528423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.528485]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.528554]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.528624]  kthread+0x324/0x6d0
[   28.528679]  ? trace_preempt_on+0x20/0xc0
[   28.528744]  ? __pfx_kthread+0x10/0x10
[   28.528803]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.528861]  ? calculate_sigpending+0x7b/0xa0
[   28.528921]  ? __pfx_kthread+0x10/0x10
[   28.528980]  ret_from_fork+0x41/0x80
[   28.529033]  ? __pfx_kthread+0x10/0x10
[   28.529129]  ret_from_fork_asm+0x1a/0x30
[   28.529248]  </TASK>
[   28.529288] 
[   28.544503] Allocated by task 273:
[   28.544925]  kasan_save_stack+0x3d/0x60
[   28.545460]  kasan_save_track+0x18/0x40
[   28.545902]  kasan_save_alloc_info+0x3b/0x50
[   28.546461]  __kasan_kmalloc+0xb7/0xc0
[   28.546907]  __kmalloc_cache_noprof+0x184/0x410
[   28.547465]  kasan_atomics+0x96/0x310
[   28.547912]  kunit_try_run_case+0x1b3/0x490
[   28.548440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.549020]  kthread+0x324/0x6d0
[   28.549486]  ret_from_fork+0x41/0x80
[   28.549908]  ret_from_fork_asm+0x1a/0x30
[   28.550436] 
[   28.550615] The buggy address belongs to the object at ffff888102a6c880
[   28.550615]  which belongs to the cache kmalloc-64 of size 64
[   28.551410] The buggy address is located 0 bytes to the right of
[   28.551410]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.551998] 
[   28.552257] The buggy address belongs to the physical page:
[   28.552851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.553719] flags: 0x200000000000000(node=0|zone=2)
[   28.554365] page_type: f5(slab)
[   28.554792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.555615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.556430] page dumped because: kasan: bad access detected
[   28.557027] 
[   28.557380] Memory state around the buggy address:
[   28.557909]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.558705]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.559423] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.559663]                                      ^
[   28.559826]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.560044]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.560404] ==================================================================
---
[   27.533792] ==================================================================
[   27.534608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450
[   27.535311] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.536229] 
[   27.536467] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.536585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.536623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.536685] Call Trace:
[   27.536729]  <TASK>
[   27.536777]  dump_stack_lvl+0x73/0xb0
[   27.536870]  print_report+0xd1/0x640
[   27.536931]  ? __virt_addr_valid+0x1db/0x2d0
[   27.536996]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.537062]  kasan_report+0x102/0x140
[   27.537192]  ? kasan_atomics_helper+0xd48/0x5450
[   27.537270]  ? kasan_atomics_helper+0xd48/0x5450
[   27.537348]  kasan_check_range+0x10c/0x1c0
[   27.537411]  __kasan_check_write+0x18/0x20
[   27.537473]  kasan_atomics_helper+0xd48/0x5450
[   27.537538]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.537604]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.537669]  ? kasan_atomics+0x153/0x310
[   27.537735]  kasan_atomics+0x1dd/0x310
[   27.537797]  ? __pfx_kasan_atomics+0x10/0x10
[   27.537859]  ? __pfx_read_tsc+0x10/0x10
[   27.537915]  ? ktime_get_ts64+0x86/0x230
[   27.537976]  kunit_try_run_case+0x1b3/0x490
[   27.538038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.538145]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.538242]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.538312]  ? __kthread_parkme+0x82/0x160
[   27.538374]  ? preempt_count_sub+0x50/0x80
[   27.538441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.538503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.538572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.538641]  kthread+0x324/0x6d0
[   27.538700]  ? trace_preempt_on+0x20/0xc0
[   27.538769]  ? __pfx_kthread+0x10/0x10
[   27.538825]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.538885]  ? calculate_sigpending+0x7b/0xa0
[   27.538946]  ? __pfx_kthread+0x10/0x10
[   27.539003]  ret_from_fork+0x41/0x80
[   27.539055]  ? __pfx_kthread+0x10/0x10
[   27.539187]  ret_from_fork_asm+0x1a/0x30
[   27.539280]  </TASK>
[   27.539320] 
[   27.553339] Allocated by task 273:
[   27.553647]  kasan_save_stack+0x3d/0x60
[   27.554139]  kasan_save_track+0x18/0x40
[   27.554630]  kasan_save_alloc_info+0x3b/0x50
[   27.555070]  __kasan_kmalloc+0xb7/0xc0
[   27.555389]  __kmalloc_cache_noprof+0x184/0x410
[   27.555655]  kasan_atomics+0x96/0x310
[   27.555942]  kunit_try_run_case+0x1b3/0x490
[   27.556283]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.556806]  kthread+0x324/0x6d0
[   27.558407]  ret_from_fork+0x41/0x80
[   27.558680]  ret_from_fork_asm+0x1a/0x30
[   27.561243] 
[   27.561525] The buggy address belongs to the object at ffff888102a6c880
[   27.561525]  which belongs to the cache kmalloc-64 of size 64
[   27.562810] The buggy address is located 0 bytes to the right of
[   27.562810]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.563450] 
[   27.563603] The buggy address belongs to the physical page:
[   27.563891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.564430] flags: 0x200000000000000(node=0|zone=2)
[   27.564899] page_type: f5(slab)
[   27.565400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.566050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.566490] page dumped because: kasan: bad access detected
[   27.566814] 
[   27.566972] Memory state around the buggy address:
[   27.567309]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.567818]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.568269] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.570567]                                      ^
[   27.571028]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.571712]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.572084] ==================================================================
---
[   27.693040] ==================================================================
[   27.694653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450
[   27.695072] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.695773] 
[   27.696068] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.696242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.696283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.696345] Call Trace:
[   27.696388]  <TASK>
[   27.696435]  dump_stack_lvl+0x73/0xb0
[   27.696521]  print_report+0xd1/0x640
[   27.696581]  ? __virt_addr_valid+0x1db/0x2d0
[   27.696647]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.696722]  kasan_report+0x102/0x140
[   27.696775]  ? kasan_atomics_helper+0xfaa/0x5450
[   27.696847]  ? kasan_atomics_helper+0xfaa/0x5450
[   27.696925]  kasan_check_range+0x10c/0x1c0
[   27.697034]  __kasan_check_write+0x18/0x20
[   27.697143]  kasan_atomics_helper+0xfaa/0x5450
[   27.697239]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.697311]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.697382]  ? kasan_atomics+0x153/0x310
[   27.697455]  kasan_atomics+0x1dd/0x310
[   27.697508]  ? __pfx_kasan_atomics+0x10/0x10
[   27.697569]  ? __pfx_read_tsc+0x10/0x10
[   27.697631]  ? ktime_get_ts64+0x86/0x230
[   27.697700]  kunit_try_run_case+0x1b3/0x490
[   27.697765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.697823]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.697890]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.697958]  ? __kthread_parkme+0x82/0x160
[   27.698020]  ? preempt_count_sub+0x50/0x80
[   27.698126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.698226]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.698301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.698415]  kthread+0x324/0x6d0
[   27.698480]  ? trace_preempt_on+0x20/0xc0
[   27.698543]  ? __pfx_kthread+0x10/0x10
[   27.698602]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.698664]  ? calculate_sigpending+0x7b/0xa0
[   27.698749]  ? __pfx_kthread+0x10/0x10
[   27.698834]  ret_from_fork+0x41/0x80
[   27.698894]  ? __pfx_kthread+0x10/0x10
[   27.698950]  ret_from_fork_asm+0x1a/0x30
[   27.699015]  </TASK>
[   27.699035] 
[   27.712379] Allocated by task 273:
[   27.712807]  kasan_save_stack+0x3d/0x60
[   27.713387]  kasan_save_track+0x18/0x40
[   27.713787]  kasan_save_alloc_info+0x3b/0x50
[   27.714303]  __kasan_kmalloc+0xb7/0xc0
[   27.714720]  __kmalloc_cache_noprof+0x184/0x410
[   27.715302]  kasan_atomics+0x96/0x310
[   27.715646]  kunit_try_run_case+0x1b3/0x490
[   27.716209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.716710]  kthread+0x324/0x6d0
[   27.717123]  ret_from_fork+0x41/0x80
[   27.717556]  ret_from_fork_asm+0x1a/0x30
[   27.717846] 
[   27.718013] The buggy address belongs to the object at ffff888102a6c880
[   27.718013]  which belongs to the cache kmalloc-64 of size 64
[   27.719229] The buggy address is located 0 bytes to the right of
[   27.719229]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.719989] 
[   27.720191] The buggy address belongs to the physical page:
[   27.720708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.721518] flags: 0x200000000000000(node=0|zone=2)
[   27.722016] page_type: f5(slab)
[   27.722454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.723135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.723750] page dumped because: kasan: bad access detected
[   27.724340] 
[   27.724574] Memory state around the buggy address:
[   27.725033]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.725468]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.726032] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.726759]                                      ^
[   27.727400]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.728142]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.728701] ==================================================================
---
[   28.485545] ==================================================================
[   28.486146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450
[   28.486887] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.487519] 
[   28.487775] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.487929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.487994] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.488062] Call Trace:
[   28.488182]  <TASK>
[   28.488243]  dump_stack_lvl+0x73/0xb0
[   28.488356]  print_report+0xd1/0x640
[   28.488425]  ? __virt_addr_valid+0x1db/0x2d0
[   28.488518]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.488617]  kasan_report+0x102/0x140
[   28.488721]  ? kasan_atomics_helper+0x1819/0x5450
[   28.488798]  ? kasan_atomics_helper+0x1819/0x5450
[   28.488881]  kasan_check_range+0x10c/0x1c0
[   28.488947]  __kasan_check_write+0x18/0x20
[   28.489009]  kasan_atomics_helper+0x1819/0x5450
[   28.489079]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.489231]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.489307]  ? kasan_atomics+0x153/0x310
[   28.489378]  kasan_atomics+0x1dd/0x310
[   28.489439]  ? __pfx_kasan_atomics+0x10/0x10
[   28.489482]  ? __pfx_read_tsc+0x10/0x10
[   28.489515]  ? ktime_get_ts64+0x86/0x230
[   28.489555]  kunit_try_run_case+0x1b3/0x490
[   28.489589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.489620]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.489672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.489708]  ? __kthread_parkme+0x82/0x160
[   28.489740]  ? preempt_count_sub+0x50/0x80
[   28.489778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.489810]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.489847]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.489885]  kthread+0x324/0x6d0
[   28.489914]  ? trace_preempt_on+0x20/0xc0
[   28.489948]  ? __pfx_kthread+0x10/0x10
[   28.489979]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.490011]  ? calculate_sigpending+0x7b/0xa0
[   28.490043]  ? __pfx_kthread+0x10/0x10
[   28.490076]  ret_from_fork+0x41/0x80
[   28.490181]  ? __pfx_kthread+0x10/0x10
[   28.490249]  ret_from_fork_asm+0x1a/0x30
[   28.490334]  </TASK>
[   28.490369] 
[   28.507559] Allocated by task 273:
[   28.508055]  kasan_save_stack+0x3d/0x60
[   28.508600]  kasan_save_track+0x18/0x40
[   28.509077]  kasan_save_alloc_info+0x3b/0x50
[   28.509653]  __kasan_kmalloc+0xb7/0xc0
[   28.510195]  __kmalloc_cache_noprof+0x184/0x410
[   28.510756]  kasan_atomics+0x96/0x310
[   28.511282]  kunit_try_run_case+0x1b3/0x490
[   28.511805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.512456]  kthread+0x324/0x6d0
[   28.512996]  ret_from_fork+0x41/0x80
[   28.513278]  ret_from_fork_asm+0x1a/0x30
[   28.513888] 
[   28.514114] The buggy address belongs to the object at ffff888102a6c880
[   28.514114]  which belongs to the cache kmalloc-64 of size 64
[   28.514913] The buggy address is located 0 bytes to the right of
[   28.514913]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.516008] 
[   28.516249] The buggy address belongs to the physical page:
[   28.516786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.517461] flags: 0x200000000000000(node=0|zone=2)
[   28.517929] page_type: f5(slab)
[   28.518391] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.519135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.519571] page dumped because: kasan: bad access detected
[   28.520099] 
[   28.520347] Memory state around the buggy address:
[   28.520675]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.521102]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.521528] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.521972]                                      ^
[   28.522479]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.523136]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.523785] ==================================================================

test log snippet boot parser 23

[   26.760758] ==================================================================
[   26.761827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450
[   26.763325] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   26.763942] 
[   26.764445] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.764562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.764600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.764661] Call Trace:
[   26.764701]  <TASK>
[   26.764747]  dump_stack_lvl+0x73/0xb0
[   26.764831]  print_report+0xd1/0x640
[   26.764918]  ? __virt_addr_valid+0x1db/0x2d0
[   26.764995]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.765069]  kasan_report+0x102/0x140
[   26.765190]  ? kasan_atomics_helper+0x4b8a/0x5450
[   26.765266]  ? kasan_atomics_helper+0x4b8a/0x5450
[   26.765346]  __asan_report_load4_noabort+0x18/0x20
[   26.765410]  kasan_atomics_helper+0x4b8a/0x5450
[   26.765477]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.765543]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.765609]  ? kasan_atomics+0x153/0x310
[   26.765669]  kasan_atomics+0x1dd/0x310
[   26.765728]  ? __pfx_kasan_atomics+0x10/0x10
[   26.765786]  ? __pfx_read_tsc+0x10/0x10
[   26.765839]  ? ktime_get_ts64+0x86/0x230
[   26.765907]  kunit_try_run_case+0x1b3/0x490
[   26.765964]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.766019]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.766082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.766257]  ? __kthread_parkme+0x82/0x160
[   26.766318]  ? preempt_count_sub+0x50/0x80
[   26.766383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.766437]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.766501]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.766568]  kthread+0x324/0x6d0
[   26.766624]  ? trace_preempt_on+0x20/0xc0
[   26.766685]  ? __pfx_kthread+0x10/0x10
[   26.766744]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.766802]  ? calculate_sigpending+0x7b/0xa0
[   26.766862]  ? __pfx_kthread+0x10/0x10
[   26.766910]  ret_from_fork+0x41/0x80
[   26.766937]  ? __pfx_kthread+0x10/0x10
[   26.766970]  ret_from_fork_asm+0x1a/0x30
[   26.767016]  </TASK>
[   26.767032] 
[   26.779668] Allocated by task 273:
[   26.780206]  kasan_save_stack+0x3d/0x60
[   26.780663]  kasan_save_track+0x18/0x40
[   26.781012]  kasan_save_alloc_info+0x3b/0x50
[   26.781392]  __kasan_kmalloc+0xb7/0xc0
[   26.781799]  __kmalloc_cache_noprof+0x184/0x410
[   26.782388]  kasan_atomics+0x96/0x310
[   26.782775]  kunit_try_run_case+0x1b3/0x490
[   26.783190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.783648]  kthread+0x324/0x6d0
[   26.783905]  ret_from_fork+0x41/0x80
[   26.784211]  ret_from_fork_asm+0x1a/0x30
[   26.784613] 
[   26.784866] The buggy address belongs to the object at ffff888102a6c880
[   26.784866]  which belongs to the cache kmalloc-64 of size 64
[   26.785975] The buggy address is located 0 bytes to the right of
[   26.785975]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   26.787020] 
[   26.787309] The buggy address belongs to the physical page:
[   26.787702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   26.788394] flags: 0x200000000000000(node=0|zone=2)
[   26.788917] page_type: f5(slab)
[   26.789287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.789698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.790070] page dumped because: kasan: bad access detected
[   26.790659] 
[   26.790911] Memory state around the buggy address:
[   26.791485]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.792200]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.792805] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.793222]                                      ^
[   26.793737]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.794466]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.794937] ==================================================================
---
[   26.669141] ==================================================================
[   26.670373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450
[   26.671574] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   26.673152] 
[   26.673587] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.673706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.673742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.673806] Call Trace:
[   26.673838]  <TASK>
[   26.673882]  dump_stack_lvl+0x73/0xb0
[   26.673975]  print_report+0xd1/0x640
[   26.674025]  ? __virt_addr_valid+0x1db/0x2d0
[   26.674062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.674109]  kasan_report+0x102/0x140
[   26.674184]  ? kasan_atomics_helper+0x4bbe/0x5450
[   26.674222]  ? kasan_atomics_helper+0x4bbe/0x5450
[   26.674271]  __asan_report_load4_noabort+0x18/0x20
[   26.674355]  kasan_atomics_helper+0x4bbe/0x5450
[   26.674411]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.674461]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.674508]  ? kasan_atomics+0x153/0x310
[   26.674543]  kasan_atomics+0x1dd/0x310
[   26.674573]  ? __pfx_kasan_atomics+0x10/0x10
[   26.674604]  ? __pfx_read_tsc+0x10/0x10
[   26.674636]  ? ktime_get_ts64+0x86/0x230
[   26.674672]  kunit_try_run_case+0x1b3/0x490
[   26.674705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.674733]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.674766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.674799]  ? __kthread_parkme+0x82/0x160
[   26.674831]  ? preempt_count_sub+0x50/0x80
[   26.674865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.674895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.674930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.674965]  kthread+0x324/0x6d0
[   26.674993]  ? trace_preempt_on+0x20/0xc0
[   26.675026]  ? __pfx_kthread+0x10/0x10
[   26.675056]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.675085]  ? calculate_sigpending+0x7b/0xa0
[   26.675175]  ? __pfx_kthread+0x10/0x10
[   26.675211]  ret_from_fork+0x41/0x80
[   26.675238]  ? __pfx_kthread+0x10/0x10
[   26.675280]  ret_from_fork_asm+0x1a/0x30
[   26.675359]  </TASK>
[   26.675380] 
[   26.692762] Allocated by task 273:
[   26.693033]  kasan_save_stack+0x3d/0x60
[   26.693500]  kasan_save_track+0x18/0x40
[   26.693957]  kasan_save_alloc_info+0x3b/0x50
[   26.694481]  __kasan_kmalloc+0xb7/0xc0
[   26.694926]  __kmalloc_cache_noprof+0x184/0x410
[   26.695837]  kasan_atomics+0x96/0x310
[   26.696428]  kunit_try_run_case+0x1b3/0x490
[   26.697066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.697817]  kthread+0x324/0x6d0
[   26.698546]  ret_from_fork+0x41/0x80
[   26.699018]  ret_from_fork_asm+0x1a/0x30
[   26.699421] 
[   26.699599] The buggy address belongs to the object at ffff888102a6c880
[   26.699599]  which belongs to the cache kmalloc-64 of size 64
[   26.701234] The buggy address is located 0 bytes to the right of
[   26.701234]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   26.702640] 
[   26.703103] The buggy address belongs to the physical page:
[   26.704061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   26.705036] flags: 0x200000000000000(node=0|zone=2)
[   26.705802] page_type: f5(slab)
[   26.706204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.706773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.707423] page dumped because: kasan: bad access detected
[   26.708144] 
[   26.708581] Memory state around the buggy address:
[   26.709146]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.709771]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.710645] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.711564]                                      ^
[   26.712178]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.712947]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.713675] ==================================================================
---
[   28.077296] ==================================================================
[   28.078794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450
[   28.079806] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.081440] 
[   28.081851] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.081954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.081982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.082024] Call Trace:
[   28.082048]  <TASK>
[   28.082078]  dump_stack_lvl+0x73/0xb0
[   28.082269]  print_report+0xd1/0x640
[   28.082439]  ? __virt_addr_valid+0x1db/0x2d0
[   28.082545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.082595]  kasan_report+0x102/0x140
[   28.082627]  ? kasan_atomics_helper+0x49d0/0x5450
[   28.082665]  ? kasan_atomics_helper+0x49d0/0x5450
[   28.082707]  __asan_report_load4_noabort+0x18/0x20
[   28.082740]  kasan_atomics_helper+0x49d0/0x5450
[   28.082777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.082813]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.082849]  ? kasan_atomics+0x153/0x310
[   28.082887]  kasan_atomics+0x1dd/0x310
[   28.082918]  ? __pfx_kasan_atomics+0x10/0x10
[   28.082951]  ? __pfx_read_tsc+0x10/0x10
[   28.082983]  ? ktime_get_ts64+0x86/0x230
[   28.083020]  kunit_try_run_case+0x1b3/0x490
[   28.083053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.083084]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.083196]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.083238]  ? __kthread_parkme+0x82/0x160
[   28.083272]  ? preempt_count_sub+0x50/0x80
[   28.083312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.083345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.083385]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.083422]  kthread+0x324/0x6d0
[   28.083454]  ? trace_preempt_on+0x20/0xc0
[   28.083488]  ? __pfx_kthread+0x10/0x10
[   28.083520]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.083553]  ? calculate_sigpending+0x7b/0xa0
[   28.083587]  ? __pfx_kthread+0x10/0x10
[   28.083618]  ret_from_fork+0x41/0x80
[   28.083646]  ? __pfx_kthread+0x10/0x10
[   28.083678]  ret_from_fork_asm+0x1a/0x30
[   28.083724]  </TASK>
[   28.083741] 
[   28.102046] Allocated by task 273:
[   28.102549]  kasan_save_stack+0x3d/0x60
[   28.102914]  kasan_save_track+0x18/0x40
[   28.105501]  kasan_save_alloc_info+0x3b/0x50
[   28.105829]  __kasan_kmalloc+0xb7/0xc0
[   28.106261]  __kmalloc_cache_noprof+0x184/0x410
[   28.106729]  kasan_atomics+0x96/0x310
[   28.109199]  kunit_try_run_case+0x1b3/0x490
[   28.109529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.109899]  kthread+0x324/0x6d0
[   28.110281]  ret_from_fork+0x41/0x80
[   28.110529]  ret_from_fork_asm+0x1a/0x30
[   28.110803] 
[   28.110958] The buggy address belongs to the object at ffff888102a6c880
[   28.110958]  which belongs to the cache kmalloc-64 of size 64
[   28.111562] The buggy address is located 0 bytes to the right of
[   28.111562]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.112191] 
[   28.112357] The buggy address belongs to the physical page:
[   28.112662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.113424] flags: 0x200000000000000(node=0|zone=2)
[   28.113911] page_type: f5(slab)
[   28.115503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.116252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.116945] page dumped because: kasan: bad access detected
[   28.117548] 
[   28.117782] Memory state around the buggy address:
[   28.118326]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.119008]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.119521] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.120062]                                      ^
[   28.120585]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.121056]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.121742] ==================================================================
---
[   27.497175] ==================================================================
[   27.497889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450
[   27.500487] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.501257] 
[   27.501436] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.501589] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.501630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.501690] Call Trace:
[   27.501734]  <TASK>
[   27.501786]  dump_stack_lvl+0x73/0xb0
[   27.501914]  print_report+0xd1/0x640
[   27.501992]  ? __virt_addr_valid+0x1db/0x2d0
[   27.502061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.502134]  kasan_report+0x102/0x140
[   27.502208]  ? kasan_atomics_helper+0x4a86/0x5450
[   27.502280]  ? kasan_atomics_helper+0x4a86/0x5450
[   27.502355]  __asan_report_load4_noabort+0x18/0x20
[   27.502672]  kasan_atomics_helper+0x4a86/0x5450
[   27.502718]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.502793]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.502836]  ? kasan_atomics+0x153/0x310
[   27.502874]  kasan_atomics+0x1dd/0x310
[   27.502906]  ? __pfx_kasan_atomics+0x10/0x10
[   27.502940]  ? __pfx_read_tsc+0x10/0x10
[   27.502972]  ? ktime_get_ts64+0x86/0x230
[   27.503008]  kunit_try_run_case+0x1b3/0x490
[   27.503041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.503071]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.503123]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.503204]  ? __kthread_parkme+0x82/0x160
[   27.503269]  ? preempt_count_sub+0x50/0x80
[   27.503339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.503399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.503442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.503481]  kthread+0x324/0x6d0
[   27.503513]  ? trace_preempt_on+0x20/0xc0
[   27.503550]  ? __pfx_kthread+0x10/0x10
[   27.503582]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.503616]  ? calculate_sigpending+0x7b/0xa0
[   27.503649]  ? __pfx_kthread+0x10/0x10
[   27.503682]  ret_from_fork+0x41/0x80
[   27.503710]  ? __pfx_kthread+0x10/0x10
[   27.503743]  ret_from_fork_asm+0x1a/0x30
[   27.503788]  </TASK>
[   27.503805] 
[   27.518697] Allocated by task 273:
[   27.519012]  kasan_save_stack+0x3d/0x60
[   27.519509]  kasan_save_track+0x18/0x40
[   27.519785]  kasan_save_alloc_info+0x3b/0x50
[   27.520102]  __kasan_kmalloc+0xb7/0xc0
[   27.520517]  __kmalloc_cache_noprof+0x184/0x410
[   27.520981]  kasan_atomics+0x96/0x310
[   27.521425]  kunit_try_run_case+0x1b3/0x490
[   27.521847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.522283]  kthread+0x324/0x6d0
[   27.522659]  ret_from_fork+0x41/0x80
[   27.522958]  ret_from_fork_asm+0x1a/0x30
[   27.523423] 
[   27.523659] The buggy address belongs to the object at ffff888102a6c880
[   27.523659]  which belongs to the cache kmalloc-64 of size 64
[   27.524333] The buggy address is located 0 bytes to the right of
[   27.524333]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.524967] 
[   27.525257] The buggy address belongs to the physical page:
[   27.525757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.526517] flags: 0x200000000000000(node=0|zone=2)
[   27.526996] page_type: f5(slab)
[   27.527419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.527981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.528643] page dumped because: kasan: bad access detected
[   27.529187] 
[   27.529408] Memory state around the buggy address:
[   27.529712]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.530370]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.530922] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.531510]                                      ^
[   27.531960]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.532383]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.532745] ==================================================================
---
[   26.868286] ==================================================================
[   26.868947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450
[   26.869544] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   26.870126] 
[   26.870340] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.870459] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.870498] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.870561] Call Trace:
[   26.870600]  <TASK>
[   26.870649]  dump_stack_lvl+0x73/0xb0
[   26.870733]  print_report+0xd1/0x640
[   26.870790]  ? __virt_addr_valid+0x1db/0x2d0
[   26.870855]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.870923]  kasan_report+0x102/0x140
[   26.870975]  ? kasan_atomics_helper+0x4b56/0x5450
[   26.871042]  ? kasan_atomics_helper+0x4b56/0x5450
[   26.871176]  __asan_report_load4_noabort+0x18/0x20
[   26.871258]  kasan_atomics_helper+0x4b56/0x5450
[   26.871328]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.871398]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.871468]  ? kasan_atomics+0x153/0x310
[   26.871539]  kasan_atomics+0x1dd/0x310
[   26.871602]  ? __pfx_kasan_atomics+0x10/0x10
[   26.871665]  ? __pfx_read_tsc+0x10/0x10
[   26.871727]  ? ktime_get_ts64+0x86/0x230
[   26.871798]  kunit_try_run_case+0x1b3/0x490
[   26.871863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.871935]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.872003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.872071]  ? __kthread_parkme+0x82/0x160
[   26.872209]  ? preempt_count_sub+0x50/0x80
[   26.872282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.872347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.872417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.872489]  kthread+0x324/0x6d0
[   26.872547]  ? trace_preempt_on+0x20/0xc0
[   26.872614]  ? __pfx_kthread+0x10/0x10
[   26.872675]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.872740]  ? calculate_sigpending+0x7b/0xa0
[   26.872804]  ? __pfx_kthread+0x10/0x10
[   26.872869]  ret_from_fork+0x41/0x80
[   26.872921]  ? __pfx_kthread+0x10/0x10
[   26.872984]  ret_from_fork_asm+0x1a/0x30
[   26.873072]  </TASK>
[   26.873151] 
[   26.885130] Allocated by task 273:
[   26.885543]  kasan_save_stack+0x3d/0x60
[   26.885972]  kasan_save_track+0x18/0x40
[   26.886453]  kasan_save_alloc_info+0x3b/0x50
[   26.886821]  __kasan_kmalloc+0xb7/0xc0
[   26.887192]  __kmalloc_cache_noprof+0x184/0x410
[   26.887654]  kasan_atomics+0x96/0x310
[   26.887972]  kunit_try_run_case+0x1b3/0x490
[   26.888378]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.888703]  kthread+0x324/0x6d0
[   26.888940]  ret_from_fork+0x41/0x80
[   26.889251]  ret_from_fork_asm+0x1a/0x30
[   26.889669] 
[   26.889882] The buggy address belongs to the object at ffff888102a6c880
[   26.889882]  which belongs to the cache kmalloc-64 of size 64
[   26.890927] The buggy address is located 0 bytes to the right of
[   26.890927]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   26.891996] 
[   26.892293] The buggy address belongs to the physical page:
[   26.892796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   26.893308] flags: 0x200000000000000(node=0|zone=2)
[   26.893608] page_type: f5(slab)
[   26.893955] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.894682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.895362] page dumped because: kasan: bad access detected
[   26.895665] 
[   26.895811] Memory state around the buggy address:
[   26.896347]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.896981]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.898557] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.899239]                                      ^
[   26.899558]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.900889]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.903656] ==================================================================
---
[   27.806861] ==================================================================
[   27.807558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450
[   27.807986] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.808670] 
[   27.808891] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.808985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.809013] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.809060] Call Trace:
[   27.809128]  <TASK>
[   27.809222]  dump_stack_lvl+0x73/0xb0
[   27.809386]  print_report+0xd1/0x640
[   27.809508]  ? __virt_addr_valid+0x1db/0x2d0
[   27.809637]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.809769]  kasan_report+0x102/0x140
[   27.809885]  ? kasan_atomics_helper+0x4a1e/0x5450
[   27.810015]  ? kasan_atomics_helper+0x4a1e/0x5450
[   27.810247]  __asan_report_load4_noabort+0x18/0x20
[   27.810316]  kasan_atomics_helper+0x4a1e/0x5450
[   27.810371]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.810425]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.810480]  ? kasan_atomics+0x153/0x310
[   27.810533]  kasan_atomics+0x1dd/0x310
[   27.810580]  ? __pfx_kasan_atomics+0x10/0x10
[   27.810632]  ? __pfx_read_tsc+0x10/0x10
[   27.810681]  ? ktime_get_ts64+0x86/0x230
[   27.810735]  kunit_try_run_case+0x1b3/0x490
[   27.810787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.810837]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.810892]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.810940]  ? __kthread_parkme+0x82/0x160
[   27.810987]  ? preempt_count_sub+0x50/0x80
[   27.811050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.811175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.811264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.811338]  kthread+0x324/0x6d0
[   27.811396]  ? trace_preempt_on+0x20/0xc0
[   27.811464]  ? __pfx_kthread+0x10/0x10
[   27.811527]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.811593]  ? calculate_sigpending+0x7b/0xa0
[   27.811651]  ? __pfx_kthread+0x10/0x10
[   27.811715]  ret_from_fork+0x41/0x80
[   27.811767]  ? __pfx_kthread+0x10/0x10
[   27.811832]  ret_from_fork_asm+0x1a/0x30
[   27.811929]  </TASK>
[   27.811969] 
[   27.835971] Allocated by task 273:
[   27.837321]  kasan_save_stack+0x3d/0x60
[   27.838129]  kasan_save_track+0x18/0x40
[   27.840288]  kasan_save_alloc_info+0x3b/0x50
[   27.840564]  __kasan_kmalloc+0xb7/0xc0
[   27.840799]  __kmalloc_cache_noprof+0x184/0x410
[   27.842460]  kasan_atomics+0x96/0x310
[   27.842867]  kunit_try_run_case+0x1b3/0x490
[   27.843956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.844956]  kthread+0x324/0x6d0
[   27.845943]  ret_from_fork+0x41/0x80
[   27.846376]  ret_from_fork_asm+0x1a/0x30
[   27.846649] 
[   27.846812] The buggy address belongs to the object at ffff888102a6c880
[   27.846812]  which belongs to the cache kmalloc-64 of size 64
[   27.847823] The buggy address is located 0 bytes to the right of
[   27.847823]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.848603] 
[   27.848823] The buggy address belongs to the physical page:
[   27.849508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.850198] flags: 0x200000000000000(node=0|zone=2)
[   27.850594] page_type: f5(slab)
[   27.851020] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.851761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.852249] page dumped because: kasan: bad access detected
[   27.852764] 
[   27.853037] Memory state around the buggy address:
[   27.853445]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.854143]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.855090] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.855735]                                      ^
[   27.856031]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.856421]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.857029] ==================================================================
---
[   27.986832] ==================================================================
[   27.987651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450
[   27.988103] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.988881] 
[   27.989197] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.989316] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.989354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.989416] Call Trace:
[   27.989459]  <TASK>
[   27.989511]  dump_stack_lvl+0x73/0xb0
[   27.989594]  print_report+0xd1/0x640
[   27.989704]  ? __virt_addr_valid+0x1db/0x2d0
[   27.989770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.989844]  kasan_report+0x102/0x140
[   27.989916]  ? kasan_atomics_helper+0x49ea/0x5450
[   27.990015]  ? kasan_atomics_helper+0x49ea/0x5450
[   27.990142]  __asan_report_load4_noabort+0x18/0x20
[   27.990255]  kasan_atomics_helper+0x49ea/0x5450
[   27.990351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.990447]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.990520]  ? kasan_atomics+0x153/0x310
[   27.990592]  kasan_atomics+0x1dd/0x310
[   27.990655]  ? __pfx_kasan_atomics+0x10/0x10
[   27.990720]  ? __pfx_read_tsc+0x10/0x10
[   27.990776]  ? ktime_get_ts64+0x86/0x230
[   27.990846]  kunit_try_run_case+0x1b3/0x490
[   27.990906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.990985]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.991077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.991200]  ? __kthread_parkme+0x82/0x160
[   27.991239]  ? preempt_count_sub+0x50/0x80
[   27.991280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.991315]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.991379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.991449]  kthread+0x324/0x6d0
[   27.991499]  ? trace_preempt_on+0x20/0xc0
[   27.991557]  ? __pfx_kthread+0x10/0x10
[   27.991616]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.991694]  ? calculate_sigpending+0x7b/0xa0
[   27.991782]  ? __pfx_kthread+0x10/0x10
[   27.991850]  ret_from_fork+0x41/0x80
[   27.991913]  ? __pfx_kthread+0x10/0x10
[   27.991971]  ret_from_fork_asm+0x1a/0x30
[   27.992057]  </TASK>
[   27.992132] 
[   28.007985] Allocated by task 273:
[   28.008474]  kasan_save_stack+0x3d/0x60
[   28.009045]  kasan_save_track+0x18/0x40
[   28.009517]  kasan_save_alloc_info+0x3b/0x50
[   28.010075]  __kasan_kmalloc+0xb7/0xc0
[   28.010607]  __kmalloc_cache_noprof+0x184/0x410
[   28.011258]  kasan_atomics+0x96/0x310
[   28.011706]  kunit_try_run_case+0x1b3/0x490
[   28.012259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.012771]  kthread+0x324/0x6d0
[   28.013265]  ret_from_fork+0x41/0x80
[   28.013646]  ret_from_fork_asm+0x1a/0x30
[   28.014181] 
[   28.014435] The buggy address belongs to the object at ffff888102a6c880
[   28.014435]  which belongs to the cache kmalloc-64 of size 64
[   28.015393] The buggy address is located 0 bytes to the right of
[   28.015393]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.016291] 
[   28.016575] The buggy address belongs to the physical page:
[   28.017232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.017789] flags: 0x200000000000000(node=0|zone=2)
[   28.018405] page_type: f5(slab)
[   28.018668] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.019473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.020184] page dumped because: kasan: bad access detected
[   28.020671] 
[   28.020946] Memory state around the buggy address:
[   28.021490]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.021893]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.022314] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.022943]                                      ^
[   28.023355]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.023727]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.024135] ==================================================================
---
[   27.729940] ==================================================================
[   27.730767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450
[   27.731949] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.732678] 
[   27.732922] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.733043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.733082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.733146] Call Trace:
[   27.733214]  <TASK>
[   27.733656]  dump_stack_lvl+0x73/0xb0
[   27.733774]  print_report+0xd1/0x640
[   27.733864]  ? __virt_addr_valid+0x1db/0x2d0
[   27.733927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.734004]  kasan_report+0x102/0x140
[   27.734057]  ? kasan_atomics_helper+0x4a38/0x5450
[   27.734130]  ? kasan_atomics_helper+0x4a38/0x5450
[   27.734237]  __asan_report_load4_noabort+0x18/0x20
[   27.734303]  kasan_atomics_helper+0x4a38/0x5450
[   27.734376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.734445]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.734517]  ? kasan_atomics+0x153/0x310
[   27.734591]  kasan_atomics+0x1dd/0x310
[   27.734651]  ? __pfx_kasan_atomics+0x10/0x10
[   27.734716]  ? __pfx_read_tsc+0x10/0x10
[   27.734778]  ? ktime_get_ts64+0x86/0x230
[   27.734847]  kunit_try_run_case+0x1b3/0x490
[   27.734912]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.734971]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.735040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.735105]  ? __kthread_parkme+0x82/0x160
[   27.735189]  ? preempt_count_sub+0x50/0x80
[   27.735263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.735328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.735401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.735473]  kthread+0x324/0x6d0
[   27.735532]  ? trace_preempt_on+0x20/0xc0
[   27.735599]  ? __pfx_kthread+0x10/0x10
[   27.735663]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.735728]  ? calculate_sigpending+0x7b/0xa0
[   27.735789]  ? __pfx_kthread+0x10/0x10
[   27.735852]  ret_from_fork+0x41/0x80
[   27.735921]  ? __pfx_kthread+0x10/0x10
[   27.735984]  ret_from_fork_asm+0x1a/0x30
[   27.736070]  </TASK>
[   27.736108] 
[   27.751536] Allocated by task 273:
[   27.751968]  kasan_save_stack+0x3d/0x60
[   27.752471]  kasan_save_track+0x18/0x40
[   27.752743]  kasan_save_alloc_info+0x3b/0x50
[   27.753023]  __kasan_kmalloc+0xb7/0xc0
[   27.753561]  __kmalloc_cache_noprof+0x184/0x410
[   27.754004]  kasan_atomics+0x96/0x310
[   27.754533]  kunit_try_run_case+0x1b3/0x490
[   27.755035]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.755679]  kthread+0x324/0x6d0
[   27.756074]  ret_from_fork+0x41/0x80
[   27.756596]  ret_from_fork_asm+0x1a/0x30
[   27.757129] 
[   27.757394] The buggy address belongs to the object at ffff888102a6c880
[   27.757394]  which belongs to the cache kmalloc-64 of size 64
[   27.758298] The buggy address is located 0 bytes to the right of
[   27.758298]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.758867] 
[   27.759019] The buggy address belongs to the physical page:
[   27.759686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.760563] flags: 0x200000000000000(node=0|zone=2)
[   27.761053] page_type: f5(slab)
[   27.761545] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.762334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.762901] page dumped because: kasan: bad access detected
[   27.763244] 
[   27.763402] Memory state around the buggy address:
[   27.763782]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.764527]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.765227] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.765773]                                      ^
[   27.766055]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.766561]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.767362] ==================================================================
---
[   27.899736] ==================================================================
[   27.900951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450
[   27.902476] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   27.903079] 
[   27.903405] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   27.903523] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.903560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.903622] Call Trace:
[   27.903663]  <TASK>
[   27.903711]  dump_stack_lvl+0x73/0xb0
[   27.903797]  print_report+0xd1/0x640
[   27.903856]  ? __virt_addr_valid+0x1db/0x2d0
[   27.903933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.904008]  kasan_report+0x102/0x140
[   27.904064]  ? kasan_atomics_helper+0x4a04/0x5450
[   27.904578]  ? kasan_atomics_helper+0x4a04/0x5450
[   27.904628]  __asan_report_load4_noabort+0x18/0x20
[   27.904666]  kasan_atomics_helper+0x4a04/0x5450
[   27.904704]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.904741]  ? __kmalloc_cache_noprof+0x184/0x410
[   27.904779]  ? kasan_atomics+0x153/0x310
[   27.904816]  kasan_atomics+0x1dd/0x310
[   27.904847]  ? __pfx_kasan_atomics+0x10/0x10
[   27.904880]  ? __pfx_read_tsc+0x10/0x10
[   27.904913]  ? ktime_get_ts64+0x86/0x230
[   27.904951]  kunit_try_run_case+0x1b3/0x490
[   27.904985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.905015]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   27.905051]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.905087]  ? __kthread_parkme+0x82/0x160
[   27.905173]  ? preempt_count_sub+0x50/0x80
[   27.905216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.905250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.905287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.905325]  kthread+0x324/0x6d0
[   27.905356]  ? trace_preempt_on+0x20/0xc0
[   27.905391]  ? __pfx_kthread+0x10/0x10
[   27.905423]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.905454]  ? calculate_sigpending+0x7b/0xa0
[   27.905486]  ? __pfx_kthread+0x10/0x10
[   27.905518]  ret_from_fork+0x41/0x80
[   27.905544]  ? __pfx_kthread+0x10/0x10
[   27.905576]  ret_from_fork_asm+0x1a/0x30
[   27.905623]  </TASK>
[   27.905640] 
[   27.924526] Allocated by task 273:
[   27.924964]  kasan_save_stack+0x3d/0x60
[   27.926011]  kasan_save_track+0x18/0x40
[   27.926394]  kasan_save_alloc_info+0x3b/0x50
[   27.927366]  __kasan_kmalloc+0xb7/0xc0
[   27.927703]  __kmalloc_cache_noprof+0x184/0x410
[   27.928109]  kasan_atomics+0x96/0x310
[   27.928835]  kunit_try_run_case+0x1b3/0x490
[   27.929129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.929665]  kthread+0x324/0x6d0
[   27.930542]  ret_from_fork+0x41/0x80
[   27.930965]  ret_from_fork_asm+0x1a/0x30
[   27.931779] 
[   27.931944] The buggy address belongs to the object at ffff888102a6c880
[   27.931944]  which belongs to the cache kmalloc-64 of size 64
[   27.933254] The buggy address is located 0 bytes to the right of
[   27.933254]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   27.934795] 
[   27.935174] The buggy address belongs to the physical page:
[   27.935657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   27.936328] flags: 0x200000000000000(node=0|zone=2)
[   27.936779] page_type: f5(slab)
[   27.937102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.938298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.939197] page dumped because: kasan: bad access detected
[   27.939842] 
[   27.940031] Memory state around the buggy address:
[   27.940959]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.941729]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.942522] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.943002]                                      ^
[   27.943827]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.944754]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.945651] ==================================================================

test log snippet boot parser 24

[   29.025002] ==================================================================
[   29.025824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450
[   29.026631] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   29.027389] 
[   29.027760] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.027889] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.027931] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.027992] Call Trace:
[   29.028036]  <TASK>
[   29.028931]  dump_stack_lvl+0x73/0xb0
[   29.029057]  print_report+0xd1/0x640
[   29.029185]  ? __virt_addr_valid+0x1db/0x2d0
[   29.029255]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.029324]  kasan_report+0x102/0x140
[   29.029375]  ? kasan_atomics_helper+0x4f73/0x5450
[   29.029442]  ? kasan_atomics_helper+0x4f73/0x5450
[   29.029522]  __asan_report_load8_noabort+0x18/0x20
[   29.029582]  kasan_atomics_helper+0x4f73/0x5450
[   29.029698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.029769]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.029837]  ? kasan_atomics+0x153/0x310
[   29.029901]  kasan_atomics+0x1dd/0x310
[   29.029959]  ? __pfx_kasan_atomics+0x10/0x10
[   29.030022]  ? __pfx_read_tsc+0x10/0x10
[   29.030081]  ? ktime_get_ts64+0x86/0x230
[   29.030222]  kunit_try_run_case+0x1b3/0x490
[   29.030287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.030334]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.030393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.030454]  ? __kthread_parkme+0x82/0x160
[   29.030605]  ? preempt_count_sub+0x50/0x80
[   29.030725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.030791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.030865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.030931]  kthread+0x324/0x6d0
[   29.030994]  ? trace_preempt_on+0x20/0xc0
[   29.031059]  ? __pfx_kthread+0x10/0x10
[   29.032142]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.032245]  ? calculate_sigpending+0x7b/0xa0
[   29.032311]  ? __pfx_kthread+0x10/0x10
[   29.032372]  ret_from_fork+0x41/0x80
[   29.032427]  ? __pfx_kthread+0x10/0x10
[   29.032488]  ret_from_fork_asm+0x1a/0x30
[   29.032578]  </TASK>
[   29.032611] 
[   29.053590] Allocated by task 273:
[   29.054039]  kasan_save_stack+0x3d/0x60
[   29.054674]  kasan_save_track+0x18/0x40
[   29.057249]  kasan_save_alloc_info+0x3b/0x50
[   29.057787]  __kasan_kmalloc+0xb7/0xc0
[   29.058149]  __kmalloc_cache_noprof+0x184/0x410
[   29.058890]  kasan_atomics+0x96/0x310
[   29.059375]  kunit_try_run_case+0x1b3/0x490
[   29.059890]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.060261]  kthread+0x324/0x6d0
[   29.060508]  ret_from_fork+0x41/0x80
[   29.060737]  ret_from_fork_asm+0x1a/0x30
[   29.061003] 
[   29.061149] The buggy address belongs to the object at ffff888102a6c880
[   29.061149]  which belongs to the cache kmalloc-64 of size 64
[   29.063277] The buggy address is located 0 bytes to the right of
[   29.063277]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.065930] 
[   29.066286] The buggy address belongs to the physical page:
[   29.067489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.068334] flags: 0x200000000000000(node=0|zone=2)
[   29.068863] page_type: f5(slab)
[   29.069312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.069985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.071567] page dumped because: kasan: bad access detected
[   29.072207] 
[   29.072738] Memory state around the buggy address:
[   29.073889]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.074462]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.074830] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.075344]                                      ^
[   29.076850]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.077615]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.078446] ==================================================================
---
[   29.382116] ==================================================================
[   29.382518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450
[   29.383952] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   29.384880] 
[   29.385139] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.385269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.385310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.385372] Call Trace:
[   29.385418]  <TASK>
[   29.385465]  dump_stack_lvl+0x73/0xb0
[   29.385558]  print_report+0xd1/0x640
[   29.385618]  ? __virt_addr_valid+0x1db/0x2d0
[   29.385683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.385844]  kasan_report+0x102/0x140
[   29.385910]  ? kasan_atomics_helper+0x5117/0x5450
[   29.385982]  ? kasan_atomics_helper+0x5117/0x5450
[   29.386063]  __asan_report_load8_noabort+0x18/0x20
[   29.386127]  kasan_atomics_helper+0x5117/0x5450
[   29.386214]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.386281]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.386350]  ? kasan_atomics+0x153/0x310
[   29.386421]  kasan_atomics+0x1dd/0x310
[   29.386482]  ? __pfx_kasan_atomics+0x10/0x10
[   29.386545]  ? __pfx_read_tsc+0x10/0x10
[   29.386604]  ? ktime_get_ts64+0x86/0x230
[   29.386678]  kunit_try_run_case+0x1b3/0x490
[   29.386740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.386799]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.386848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.386883]  ? __kthread_parkme+0x82/0x160
[   29.386918]  ? preempt_count_sub+0x50/0x80
[   29.386956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.386989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.387026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.387064]  kthread+0x324/0x6d0
[   29.387103]  ? trace_preempt_on+0x20/0xc0
[   29.387182]  ? __pfx_kthread+0x10/0x10
[   29.387217]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.387250]  ? calculate_sigpending+0x7b/0xa0
[   29.387283]  ? __pfx_kthread+0x10/0x10
[   29.387316]  ret_from_fork+0x41/0x80
[   29.387344]  ? __pfx_kthread+0x10/0x10
[   29.387376]  ret_from_fork_asm+0x1a/0x30
[   29.387423]  </TASK>
[   29.387441] 
[   29.400084] Allocated by task 273:
[   29.400515]  kasan_save_stack+0x3d/0x60
[   29.401133]  kasan_save_track+0x18/0x40
[   29.401691]  kasan_save_alloc_info+0x3b/0x50
[   29.402183]  __kasan_kmalloc+0xb7/0xc0
[   29.402531]  __kmalloc_cache_noprof+0x184/0x410
[   29.402818]  kasan_atomics+0x96/0x310
[   29.403305]  kunit_try_run_case+0x1b3/0x490
[   29.403829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.404424]  kthread+0x324/0x6d0
[   29.404673]  ret_from_fork+0x41/0x80
[   29.404917]  ret_from_fork_asm+0x1a/0x30
[   29.405411] 
[   29.405716] The buggy address belongs to the object at ffff888102a6c880
[   29.405716]  which belongs to the cache kmalloc-64 of size 64
[   29.406820] The buggy address is located 0 bytes to the right of
[   29.406820]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.409582] 
[   29.410421] The buggy address belongs to the physical page:
[   29.410914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.411520] flags: 0x200000000000000(node=0|zone=2)
[   29.414550] page_type: f5(slab)
[   29.414903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.415535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.416032] page dumped because: kasan: bad access detected
[   29.416513] 
[   29.416670] Memory state around the buggy address:
[   29.417006]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.417697]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.418447] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.418958]                                      ^
[   29.419311]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.419906]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.420653] ==================================================================
---
[   29.222046] ==================================================================
[   29.223018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450
[   29.223731] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   29.225025] 
[   29.225264] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.225372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.225407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.225468] Call Trace:
[   29.225509]  <TASK>
[   29.225557]  dump_stack_lvl+0x73/0xb0
[   29.225641]  print_report+0xd1/0x640
[   29.225699]  ? __virt_addr_valid+0x1db/0x2d0
[   29.225764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.225834]  kasan_report+0x102/0x140
[   29.225885]  ? kasan_atomics_helper+0x4fb4/0x5450
[   29.225952]  ? kasan_atomics_helper+0x4fb4/0x5450
[   29.226032]  __asan_report_load8_noabort+0x18/0x20
[   29.226097]  kasan_atomics_helper+0x4fb4/0x5450
[   29.226257]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.226350]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.226423]  ? kasan_atomics+0x153/0x310
[   29.226495]  kasan_atomics+0x1dd/0x310
[   29.226558]  ? __pfx_kasan_atomics+0x10/0x10
[   29.226626]  ? __pfx_read_tsc+0x10/0x10
[   29.226685]  ? ktime_get_ts64+0x86/0x230
[   29.226757]  kunit_try_run_case+0x1b3/0x490
[   29.226821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.226879]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.226948]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.227014]  ? __kthread_parkme+0x82/0x160
[   29.227073]  ? preempt_count_sub+0x50/0x80
[   29.227254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.227329]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.227444]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.227520]  kthread+0x324/0x6d0
[   29.227580]  ? trace_preempt_on+0x20/0xc0
[   29.227641]  ? __pfx_kthread+0x10/0x10
[   29.227703]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.227768]  ? calculate_sigpending+0x7b/0xa0
[   29.227831]  ? __pfx_kthread+0x10/0x10
[   29.227871]  ret_from_fork+0x41/0x80
[   29.227913]  ? __pfx_kthread+0x10/0x10
[   29.227945]  ret_from_fork_asm+0x1a/0x30
[   29.227993]  </TASK>
[   29.228012] 
[   29.243838] Allocated by task 273:
[   29.244217]  kasan_save_stack+0x3d/0x60
[   29.244692]  kasan_save_track+0x18/0x40
[   29.245241]  kasan_save_alloc_info+0x3b/0x50
[   29.245761]  __kasan_kmalloc+0xb7/0xc0
[   29.246268]  __kmalloc_cache_noprof+0x184/0x410
[   29.246817]  kasan_atomics+0x96/0x310
[   29.247344]  kunit_try_run_case+0x1b3/0x490
[   29.247858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.248304]  kthread+0x324/0x6d0
[   29.248725]  ret_from_fork+0x41/0x80
[   29.249142]  ret_from_fork_asm+0x1a/0x30
[   29.249626] 
[   29.249903] The buggy address belongs to the object at ffff888102a6c880
[   29.249903]  which belongs to the cache kmalloc-64 of size 64
[   29.250771] The buggy address is located 0 bytes to the right of
[   29.250771]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.251421] 
[   29.251645] The buggy address belongs to the physical page:
[   29.252177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.252870] flags: 0x200000000000000(node=0|zone=2)
[   29.253381] page_type: f5(slab)
[   29.253743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.254392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.254903] page dumped because: kasan: bad access detected
[   29.255472] 
[   29.255647] Memory state around the buggy address:
[   29.255940]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.256660]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.257216] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.257774]                                      ^
[   29.258057]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.258756]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.259466] ==================================================================
---
[   29.297154] ==================================================================
[   29.297982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450
[   29.298756] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   29.299863] 
[   29.300063] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.300192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.300232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.300292] Call Trace:
[   29.300333]  <TASK>
[   29.300381]  dump_stack_lvl+0x73/0xb0
[   29.300468]  print_report+0xd1/0x640
[   29.300526]  ? __virt_addr_valid+0x1db/0x2d0
[   29.300590]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.300666]  kasan_report+0x102/0x140
[   29.300719]  ? kasan_atomics_helper+0x4fa7/0x5450
[   29.300791]  ? kasan_atomics_helper+0x4fa7/0x5450
[   29.300864]  __asan_report_load8_noabort+0x18/0x20
[   29.300903]  kasan_atomics_helper+0x4fa7/0x5450
[   29.300941]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.300976]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.301013]  ? kasan_atomics+0x153/0x310
[   29.301049]  kasan_atomics+0x1dd/0x310
[   29.301081]  ? __pfx_kasan_atomics+0x10/0x10
[   29.301196]  ? __pfx_read_tsc+0x10/0x10
[   29.301264]  ? ktime_get_ts64+0x86/0x230
[   29.301379]  kunit_try_run_case+0x1b3/0x490
[   29.301447]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.301504]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.301976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.302237]  ? __kthread_parkme+0x82/0x160
[   29.302372]  ? preempt_count_sub+0x50/0x80
[   29.302485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.302583]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.302684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.302737]  kthread+0x324/0x6d0
[   29.302781]  ? trace_preempt_on+0x20/0xc0
[   29.302847]  ? __pfx_kthread+0x10/0x10
[   29.302903]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.302957]  ? calculate_sigpending+0x7b/0xa0
[   29.303015]  ? __pfx_kthread+0x10/0x10
[   29.303601]  ret_from_fork+0x41/0x80
[   29.305137]  ? __pfx_kthread+0x10/0x10
[   29.305252]  ret_from_fork_asm+0x1a/0x30
[   29.305343]  </TASK>
[   29.305382] 
[   29.321058] Allocated by task 273:
[   29.321520]  kasan_save_stack+0x3d/0x60
[   29.322007]  kasan_save_track+0x18/0x40
[   29.322521]  kasan_save_alloc_info+0x3b/0x50
[   29.323060]  __kasan_kmalloc+0xb7/0xc0
[   29.323572]  __kmalloc_cache_noprof+0x184/0x410
[   29.324083]  kasan_atomics+0x96/0x310
[   29.324612]  kunit_try_run_case+0x1b3/0x490
[   29.325188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.325684]  kthread+0x324/0x6d0
[   29.326042]  ret_from_fork+0x41/0x80
[   29.326554]  ret_from_fork_asm+0x1a/0x30
[   29.327040] 
[   29.327370] The buggy address belongs to the object at ffff888102a6c880
[   29.327370]  which belongs to the cache kmalloc-64 of size 64
[   29.328606] The buggy address is located 0 bytes to the right of
[   29.328606]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.329513] 
[   29.329830] The buggy address belongs to the physical page:
[   29.330355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.330997] flags: 0x200000000000000(node=0|zone=2)
[   29.331538] page_type: f5(slab)
[   29.331937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.332474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.333220] page dumped because: kasan: bad access detected
[   29.333674] 
[   29.333945] Memory state around the buggy address:
[   29.334386]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.334881]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.335566] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.336185]                                      ^
[   29.336566]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.337131]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.337556] ==================================================================
---
[   28.766656] ==================================================================
[   28.767446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450
[   28.768764] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.769421] 
[   28.769732] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.769924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.769967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.770031] Call Trace:
[   28.770074]  <TASK>
[   28.770186]  dump_stack_lvl+0x73/0xb0
[   28.770280]  print_report+0xd1/0x640
[   28.770340]  ? __virt_addr_valid+0x1db/0x2d0
[   28.770399]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.770471]  kasan_report+0x102/0x140
[   28.770525]  ? kasan_atomics_helper+0x4f32/0x5450
[   28.770626]  ? kasan_atomics_helper+0x4f32/0x5450
[   28.770707]  __asan_report_load8_noabort+0x18/0x20
[   28.770794]  kasan_atomics_helper+0x4f32/0x5450
[   28.770897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.770970]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.771040]  ? kasan_atomics+0x153/0x310
[   28.771154]  kasan_atomics+0x1dd/0x310
[   28.771228]  ? __pfx_kasan_atomics+0x10/0x10
[   28.771265]  ? __pfx_read_tsc+0x10/0x10
[   28.771298]  ? ktime_get_ts64+0x86/0x230
[   28.771336]  kunit_try_run_case+0x1b3/0x490
[   28.771370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.771401]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.771436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.771471]  ? __kthread_parkme+0x82/0x160
[   28.771503]  ? preempt_count_sub+0x50/0x80
[   28.771539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.771572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.771609]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.771644]  kthread+0x324/0x6d0
[   28.771675]  ? trace_preempt_on+0x20/0xc0
[   28.771707]  ? __pfx_kthread+0x10/0x10
[   28.771738]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.771771]  ? calculate_sigpending+0x7b/0xa0
[   28.771804]  ? __pfx_kthread+0x10/0x10
[   28.771835]  ret_from_fork+0x41/0x80
[   28.771863]  ? __pfx_kthread+0x10/0x10
[   28.771904]  ret_from_fork_asm+0x1a/0x30
[   28.771953]  </TASK>
[   28.771971] 
[   28.787379] Allocated by task 273:
[   28.788344]  kasan_save_stack+0x3d/0x60
[   28.788726]  kasan_save_track+0x18/0x40
[   28.789073]  kasan_save_alloc_info+0x3b/0x50
[   28.790010]  __kasan_kmalloc+0xb7/0xc0
[   28.790609]  __kmalloc_cache_noprof+0x184/0x410
[   28.791040]  kasan_atomics+0x96/0x310
[   28.791731]  kunit_try_run_case+0x1b3/0x490
[   28.792224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.792603]  kthread+0x324/0x6d0
[   28.793430]  ret_from_fork+0x41/0x80
[   28.793773]  ret_from_fork_asm+0x1a/0x30
[   28.794226] 
[   28.794398] The buggy address belongs to the object at ffff888102a6c880
[   28.794398]  which belongs to the cache kmalloc-64 of size 64
[   28.796136] The buggy address is located 0 bytes to the right of
[   28.796136]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.796969] 
[   28.797465] The buggy address belongs to the physical page:
[   28.797941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.798936] flags: 0x200000000000000(node=0|zone=2)
[   28.799498] page_type: f5(slab)
[   28.799857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.801035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.801865] page dumped because: kasan: bad access detected
[   28.802192] 
[   28.802493] Memory state around the buggy address:
[   28.802950]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.803471]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.804127] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.804985]                                      ^
[   28.805863]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.806837]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.807668] ==================================================================
---
[   28.162254] ==================================================================
[   28.163843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450
[   28.164588] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.165323] 
[   28.165967] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.166088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.166129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.166206] Call Trace:
[   28.166249]  <TASK>
[   28.166299]  dump_stack_lvl+0x73/0xb0
[   28.166426]  print_report+0xd1/0x640
[   28.166498]  ? __virt_addr_valid+0x1db/0x2d0
[   28.166561]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.166628]  kasan_report+0x102/0x140
[   28.166662]  ? kasan_atomics_helper+0x4eb0/0x5450
[   28.166701]  ? kasan_atomics_helper+0x4eb0/0x5450
[   28.166743]  __asan_report_load8_noabort+0x18/0x20
[   28.166791]  kasan_atomics_helper+0x4eb0/0x5450
[   28.166842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.166878]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.166915]  ? kasan_atomics+0x153/0x310
[   28.166952]  kasan_atomics+0x1dd/0x310
[   28.166983]  ? __pfx_kasan_atomics+0x10/0x10
[   28.167017]  ? __pfx_read_tsc+0x10/0x10
[   28.167050]  ? ktime_get_ts64+0x86/0x230
[   28.167092]  kunit_try_run_case+0x1b3/0x490
[   28.167152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.167208]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.167244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.167279]  ? __kthread_parkme+0x82/0x160
[   28.167311]  ? preempt_count_sub+0x50/0x80
[   28.167347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.167380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.167416]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.167453]  kthread+0x324/0x6d0
[   28.167484]  ? trace_preempt_on+0x20/0xc0
[   28.167517]  ? __pfx_kthread+0x10/0x10
[   28.167549]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.167582]  ? calculate_sigpending+0x7b/0xa0
[   28.167614]  ? __pfx_kthread+0x10/0x10
[   28.167647]  ret_from_fork+0x41/0x80
[   28.167674]  ? __pfx_kthread+0x10/0x10
[   28.167707]  ret_from_fork_asm+0x1a/0x30
[   28.167754]  </TASK>
[   28.167770] 
[   28.183055] Allocated by task 273:
[   28.183621]  kasan_save_stack+0x3d/0x60
[   28.184177]  kasan_save_track+0x18/0x40
[   28.184802]  kasan_save_alloc_info+0x3b/0x50
[   28.185490]  __kasan_kmalloc+0xb7/0xc0
[   28.185982]  __kmalloc_cache_noprof+0x184/0x410
[   28.186656]  kasan_atomics+0x96/0x310
[   28.187227]  kunit_try_run_case+0x1b3/0x490
[   28.187769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.188500]  kthread+0x324/0x6d0
[   28.189153]  ret_from_fork+0x41/0x80
[   28.189428]  ret_from_fork_asm+0x1a/0x30
[   28.190361] 
[   28.190522] The buggy address belongs to the object at ffff888102a6c880
[   28.190522]  which belongs to the cache kmalloc-64 of size 64
[   28.191928] The buggy address is located 0 bytes to the right of
[   28.191928]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.192945] 
[   28.193208] The buggy address belongs to the physical page:
[   28.193714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.195057] flags: 0x200000000000000(node=0|zone=2)
[   28.195381] page_type: f5(slab)
[   28.196018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.196713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.197751] page dumped because: kasan: bad access detected
[   28.198408] 
[   28.198628] Memory state around the buggy address:
[   28.199061]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.199606]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.200196] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.201140]                                      ^
[   28.201455]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.202646]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.203453] ==================================================================
---
[   29.133995] ==================================================================
[   29.134839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450
[   29.135594] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   29.136508] 
[   29.136699] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.136816] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.136856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.136919] Call Trace:
[   29.136995]  <TASK>
[   29.137609]  dump_stack_lvl+0x73/0xb0
[   29.137743]  print_report+0xd1/0x640
[   29.137811]  ? __virt_addr_valid+0x1db/0x2d0
[   29.137875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.137952]  kasan_report+0x102/0x140
[   29.137990]  ? kasan_atomics_helper+0x4f9a/0x5450
[   29.138030]  ? kasan_atomics_helper+0x4f9a/0x5450
[   29.138072]  __asan_report_load8_noabort+0x18/0x20
[   29.138149]  kasan_atomics_helper+0x4f9a/0x5450
[   29.138210]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.138246]  ? __kmalloc_cache_noprof+0x184/0x410
[   29.138283]  ? kasan_atomics+0x153/0x310
[   29.138320]  kasan_atomics+0x1dd/0x310
[   29.138351]  ? __pfx_kasan_atomics+0x10/0x10
[   29.138385]  ? __pfx_read_tsc+0x10/0x10
[   29.138416]  ? ktime_get_ts64+0x86/0x230
[   29.138453]  kunit_try_run_case+0x1b3/0x490
[   29.138486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.138516]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.138551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.138586]  ? __kthread_parkme+0x82/0x160
[   29.138618]  ? preempt_count_sub+0x50/0x80
[   29.138653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.138685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.138722]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.138760]  kthread+0x324/0x6d0
[   29.138789]  ? trace_preempt_on+0x20/0xc0
[   29.138824]  ? __pfx_kthread+0x10/0x10
[   29.138856]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.138888]  ? calculate_sigpending+0x7b/0xa0
[   29.138920]  ? __pfx_kthread+0x10/0x10
[   29.138953]  ret_from_fork+0x41/0x80
[   29.138979]  ? __pfx_kthread+0x10/0x10
[   29.139011]  ret_from_fork_asm+0x1a/0x30
[   29.139057]  </TASK>
[   29.139076] 
[   29.151963] Allocated by task 273:
[   29.152440]  kasan_save_stack+0x3d/0x60
[   29.152929]  kasan_save_track+0x18/0x40
[   29.153491]  kasan_save_alloc_info+0x3b/0x50
[   29.153860]  __kasan_kmalloc+0xb7/0xc0
[   29.154353]  __kmalloc_cache_noprof+0x184/0x410
[   29.154848]  kasan_atomics+0x96/0x310
[   29.155300]  kunit_try_run_case+0x1b3/0x490
[   29.155711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.156278]  kthread+0x324/0x6d0
[   29.156871]  ret_from_fork+0x41/0x80
[   29.157224]  ret_from_fork_asm+0x1a/0x30
[   29.157579] 
[   29.157832] The buggy address belongs to the object at ffff888102a6c880
[   29.157832]  which belongs to the cache kmalloc-64 of size 64
[   29.158597] The buggy address is located 0 bytes to the right of
[   29.158597]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   29.159239] 
[   29.159702] The buggy address belongs to the physical page:
[   29.160239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   29.160926] flags: 0x200000000000000(node=0|zone=2)
[   29.161423] page_type: f5(slab)
[   29.161906] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.162604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.163057] page dumped because: kasan: bad access detected
[   29.163457] 
[   29.163669] Memory state around the buggy address:
[   29.164063]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.164791]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.165466] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.166086]                                      ^
[   29.166637]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.167355]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.167992] ==================================================================

test log snippet boot parser 25

[   26.950690] ==================================================================
[   26.951453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450
[   26.953664] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   26.954602] 
[   26.954846] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.954958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.954998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.955061] Call Trace:
[   26.956149]  <TASK>
[   26.956231]  dump_stack_lvl+0x73/0xb0
[   26.956319]  print_report+0xd1/0x640
[   26.956379]  ? __virt_addr_valid+0x1db/0x2d0
[   26.956444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.956520]  kasan_report+0x102/0x140
[   26.956576]  ? kasan_atomics_helper+0x4b3c/0x5450
[   26.956647]  ? kasan_atomics_helper+0x4b3c/0x5450
[   26.956727]  __asan_report_store4_noabort+0x1b/0x30
[   26.956796]  kasan_atomics_helper+0x4b3c/0x5450
[   26.956868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.956938]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.957007]  ? kasan_atomics+0x153/0x310
[   26.957079]  kasan_atomics+0x1dd/0x310
[   26.957790]  ? __pfx_kasan_atomics+0x10/0x10
[   26.957881]  ? __pfx_read_tsc+0x10/0x10
[   26.957942]  ? ktime_get_ts64+0x86/0x230
[   26.958016]  kunit_try_run_case+0x1b3/0x490
[   26.958080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.958212]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.958287]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.958346]  ? __kthread_parkme+0x82/0x160
[   26.958403]  ? preempt_count_sub+0x50/0x80
[   26.958474]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.958532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.958605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.958677]  kthread+0x324/0x6d0
[   26.958737]  ? trace_preempt_on+0x20/0xc0
[   26.958804]  ? __pfx_kthread+0x10/0x10
[   26.958865]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.958911]  ? calculate_sigpending+0x7b/0xa0
[   26.958946]  ? __pfx_kthread+0x10/0x10
[   26.958980]  ret_from_fork+0x41/0x80
[   26.959008]  ? __pfx_kthread+0x10/0x10
[   26.959041]  ret_from_fork_asm+0x1a/0x30
[   26.959103]  </TASK>
[   26.959154] 
[   26.977365] Allocated by task 273:
[   26.978461]  kasan_save_stack+0x3d/0x60
[   26.978896]  kasan_save_track+0x18/0x40
[   26.979751]  kasan_save_alloc_info+0x3b/0x50
[   26.980192]  __kasan_kmalloc+0xb7/0xc0
[   26.980499]  __kmalloc_cache_noprof+0x184/0x410
[   26.980889]  kasan_atomics+0x96/0x310
[   26.981270]  kunit_try_run_case+0x1b3/0x490
[   26.982238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.982842]  kthread+0x324/0x6d0
[   26.983189]  ret_from_fork+0x41/0x80
[   26.983659]  ret_from_fork_asm+0x1a/0x30
[   26.984047] 
[   26.984323] The buggy address belongs to the object at ffff888102a6c880
[   26.984323]  which belongs to the cache kmalloc-64 of size 64
[   26.985296] The buggy address is located 0 bytes to the right of
[   26.985296]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   26.986254] 
[   26.986421] The buggy address belongs to the physical page:
[   26.986887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   26.987477] flags: 0x200000000000000(node=0|zone=2)
[   26.987908] page_type: f5(slab)
[   26.988143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.988844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.989944] page dumped because: kasan: bad access detected
[   26.990751] 
[   26.990952] Memory state around the buggy address:
[   26.992380]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.992860]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.993591] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.994086]                                      ^
[   26.995059]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.995544]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.996355] ==================================================================
---
[   26.796004] ==================================================================
[   26.796820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450
[   26.797601] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   26.798277] 
[   26.798431] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.798519] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.798548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.798592] Call Trace:
[   26.798628]  <TASK>
[   26.798663]  dump_stack_lvl+0x73/0xb0
[   26.798727]  print_report+0xd1/0x640
[   26.798776]  ? __virt_addr_valid+0x1db/0x2d0
[   26.798902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.798977]  kasan_report+0x102/0x140
[   26.799026]  ? kasan_atomics_helper+0x4b70/0x5450
[   26.799179]  ? kasan_atomics_helper+0x4b70/0x5450
[   26.799305]  __asan_report_store4_noabort+0x1b/0x30
[   26.799400]  kasan_atomics_helper+0x4b70/0x5450
[   26.799497]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.799593]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.799667]  ? kasan_atomics+0x153/0x310
[   26.799763]  kasan_atomics+0x1dd/0x310
[   26.799850]  ? __pfx_kasan_atomics+0x10/0x10
[   26.799932]  ? __pfx_read_tsc+0x10/0x10
[   26.800021]  ? ktime_get_ts64+0x86/0x230
[   26.800152]  kunit_try_run_case+0x1b3/0x490
[   26.800245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.800292]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.800358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.800419]  ? __kthread_parkme+0x82/0x160
[   26.800479]  ? preempt_count_sub+0x50/0x80
[   26.800547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.800606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.800676]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.800744]  kthread+0x324/0x6d0
[   26.800801]  ? trace_preempt_on+0x20/0xc0
[   26.800862]  ? __pfx_kthread+0x10/0x10
[   26.800921]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.800976]  ? calculate_sigpending+0x7b/0xa0
[   26.801038]  ? __pfx_kthread+0x10/0x10
[   26.801144]  ret_from_fork+0x41/0x80
[   26.801224]  ? __pfx_kthread+0x10/0x10
[   26.801286]  ret_from_fork_asm+0x1a/0x30
[   26.801371]  </TASK>
[   26.801403] 
[   26.814124] Allocated by task 273:
[   26.814556]  kasan_save_stack+0x3d/0x60
[   26.814997]  kasan_save_track+0x18/0x40
[   26.815459]  kasan_save_alloc_info+0x3b/0x50
[   26.815908]  __kasan_kmalloc+0xb7/0xc0
[   26.816399]  __kmalloc_cache_noprof+0x184/0x410
[   26.816861]  kasan_atomics+0x96/0x310
[   26.817349]  kunit_try_run_case+0x1b3/0x490
[   26.817718]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.818036]  kthread+0x324/0x6d0
[   26.818427]  ret_from_fork+0x41/0x80
[   26.818751]  ret_from_fork_asm+0x1a/0x30
[   26.819150] 
[   26.819402] The buggy address belongs to the object at ffff888102a6c880
[   26.819402]  which belongs to the cache kmalloc-64 of size 64
[   26.820431] The buggy address is located 0 bytes to the right of
[   26.820431]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   26.821524] 
[   26.821745] The buggy address belongs to the physical page:
[   26.822310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   26.823001] flags: 0x200000000000000(node=0|zone=2)
[   26.823559] page_type: f5(slab)
[   26.823922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.824379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.825052] page dumped because: kasan: bad access detected
[   26.825641] 
[   26.825890] Memory state around the buggy address:
[   26.826390]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.826876]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.827561] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.827926]                                      ^
[   26.828436]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.829183]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.829600] ==================================================================
---
[   26.715932] ==================================================================
[   26.716424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450
[   26.717362] Write of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   26.717896] 
[   26.718178] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.718288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.718325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.718386] Call Trace:
[   26.718424]  <TASK>
[   26.718466]  dump_stack_lvl+0x73/0xb0
[   26.718584]  print_report+0xd1/0x640
[   26.718637]  ? __virt_addr_valid+0x1db/0x2d0
[   26.718684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.718754]  kasan_report+0x102/0x140
[   26.718803]  ? kasan_atomics_helper+0x4ba4/0x5450
[   26.718869]  ? kasan_atomics_helper+0x4ba4/0x5450
[   26.718947]  __asan_report_store4_noabort+0x1b/0x30
[   26.719009]  kasan_atomics_helper+0x4ba4/0x5450
[   26.719077]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.719146]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.719229]  ? kasan_atomics+0x153/0x310
[   26.719296]  kasan_atomics+0x1dd/0x310
[   26.719352]  ? __pfx_kasan_atomics+0x10/0x10
[   26.719412]  ? __pfx_read_tsc+0x10/0x10
[   26.719465]  ? ktime_get_ts64+0x86/0x230
[   26.719530]  kunit_try_run_case+0x1b3/0x490
[   26.719588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.719696]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.719937]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.720006]  ? __kthread_parkme+0x82/0x160
[   26.720050]  ? preempt_count_sub+0x50/0x80
[   26.720092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.720154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.720215]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.720252]  kthread+0x324/0x6d0
[   26.720342]  ? trace_preempt_on+0x20/0xc0
[   26.720390]  ? __pfx_kthread+0x10/0x10
[   26.720421]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.720455]  ? calculate_sigpending+0x7b/0xa0
[   26.720485]  ? __pfx_kthread+0x10/0x10
[   26.720516]  ret_from_fork+0x41/0x80
[   26.720542]  ? __pfx_kthread+0x10/0x10
[   26.720574]  ret_from_fork_asm+0x1a/0x30
[   26.720618]  </TASK>
[   26.720633] 
[   26.739815] Allocated by task 273:
[   26.740594]  kasan_save_stack+0x3d/0x60
[   26.741016]  kasan_save_track+0x18/0x40
[   26.742138]  kasan_save_alloc_info+0x3b/0x50
[   26.742609]  __kasan_kmalloc+0xb7/0xc0
[   26.742992]  __kmalloc_cache_noprof+0x184/0x410
[   26.744009]  kasan_atomics+0x96/0x310
[   26.744685]  kunit_try_run_case+0x1b3/0x490
[   26.744971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.745896]  kthread+0x324/0x6d0
[   26.746722]  ret_from_fork+0x41/0x80
[   26.747036]  ret_from_fork_asm+0x1a/0x30
[   26.747748] 
[   26.747965] The buggy address belongs to the object at ffff888102a6c880
[   26.747965]  which belongs to the cache kmalloc-64 of size 64
[   26.748977] The buggy address is located 0 bytes to the right of
[   26.748977]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   26.749859] 
[   26.750005] The buggy address belongs to the physical page:
[   26.751639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   26.752850] flags: 0x200000000000000(node=0|zone=2)
[   26.753371] page_type: f5(slab)
[   26.753604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.754000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.754744] page dumped because: kasan: bad access detected
[   26.755136] 
[   26.755409] Memory state around the buggy address:
[   26.755862]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.756469]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.756905] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.757594]                                      ^
[   26.757923]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.758629]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.759214] ==================================================================

test log snippet boot parser 26

[   28.123606] ==================================================================
[   28.124178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450
[   28.124731] Read of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.125433] 
[   28.125693] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.125808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.125845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.125909] Call Trace:
[   28.125954]  <TASK>
[   28.126001]  dump_stack_lvl+0x73/0xb0
[   28.126127]  print_report+0xd1/0x640
[   28.126257]  ? __virt_addr_valid+0x1db/0x2d0
[   28.126340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.126452]  kasan_report+0x102/0x140
[   28.126535]  ? kasan_atomics_helper+0x13b6/0x5450
[   28.126612]  ? kasan_atomics_helper+0x13b6/0x5450
[   28.126722]  kasan_check_range+0x10c/0x1c0
[   28.126787]  __kasan_check_read+0x15/0x20
[   28.126844]  kasan_atomics_helper+0x13b6/0x5450
[   28.126914]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.127015]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.127174]  ? kasan_atomics+0x153/0x310
[   28.127259]  kasan_atomics+0x1dd/0x310
[   28.127325]  ? __pfx_kasan_atomics+0x10/0x10
[   28.127389]  ? __pfx_read_tsc+0x10/0x10
[   28.127448]  ? ktime_get_ts64+0x86/0x230
[   28.127517]  kunit_try_run_case+0x1b3/0x490
[   28.127582]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.127640]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.127708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.127763]  ? __kthread_parkme+0x82/0x160
[   28.127824]  ? preempt_count_sub+0x50/0x80
[   28.127907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.127974]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.128048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.128185]  kthread+0x324/0x6d0
[   28.128256]  ? trace_preempt_on+0x20/0xc0
[   28.128325]  ? __pfx_kthread+0x10/0x10
[   28.128389]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.128455]  ? calculate_sigpending+0x7b/0xa0
[   28.128518]  ? __pfx_kthread+0x10/0x10
[   28.128581]  ret_from_fork+0x41/0x80
[   28.128636]  ? __pfx_kthread+0x10/0x10
[   28.128699]  ret_from_fork_asm+0x1a/0x30
[   28.128788]  </TASK>
[   28.128822] 
[   28.144393] Allocated by task 273:
[   28.144895]  kasan_save_stack+0x3d/0x60
[   28.145350]  kasan_save_track+0x18/0x40
[   28.145765]  kasan_save_alloc_info+0x3b/0x50
[   28.146269]  __kasan_kmalloc+0xb7/0xc0
[   28.146721]  __kmalloc_cache_noprof+0x184/0x410
[   28.147250]  kasan_atomics+0x96/0x310
[   28.147646]  kunit_try_run_case+0x1b3/0x490
[   28.148203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.148572]  kthread+0x324/0x6d0
[   28.149022]  ret_from_fork+0x41/0x80
[   28.149528]  ret_from_fork_asm+0x1a/0x30
[   28.150064] 
[   28.150353] The buggy address belongs to the object at ffff888102a6c880
[   28.150353]  which belongs to the cache kmalloc-64 of size 64
[   28.150955] The buggy address is located 0 bytes to the right of
[   28.150955]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.151989] 
[   28.152352] The buggy address belongs to the physical page:
[   28.152879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.153490] flags: 0x200000000000000(node=0|zone=2)
[   28.153790] page_type: f5(slab)
[   28.154016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.154865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.155744] page dumped because: kasan: bad access detected
[   28.156395] 
[   28.156620] Memory state around the buggy address:
[   28.157203]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.157771]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.158375] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.158766]                                      ^
[   28.159364]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.160173]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.160754] ==================================================================
---
[   26.831565] ==================================================================
[   26.832155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450
[   26.833083] Read of size 4 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   26.834196] 
[   26.835886] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.836008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.836044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.836147] Call Trace:
[   26.836212]  <TASK>
[   26.836257]  dump_stack_lvl+0x73/0xb0
[   26.836347]  print_report+0xd1/0x640
[   26.836407]  ? __virt_addr_valid+0x1db/0x2d0
[   26.836471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.836541]  kasan_report+0x102/0x140
[   26.836595]  ? kasan_atomics_helper+0x3e0/0x5450
[   26.836664]  ? kasan_atomics_helper+0x3e0/0x5450
[   26.836741]  kasan_check_range+0x10c/0x1c0
[   26.836804]  __kasan_check_read+0x15/0x20
[   26.836862]  kasan_atomics_helper+0x3e0/0x5450
[   26.836931]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.836997]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.837064]  ? kasan_atomics+0x153/0x310
[   26.837203]  kasan_atomics+0x1dd/0x310
[   26.837270]  ? __pfx_kasan_atomics+0x10/0x10
[   26.837333]  ? __pfx_read_tsc+0x10/0x10
[   26.837390]  ? ktime_get_ts64+0x86/0x230
[   26.837460]  kunit_try_run_case+0x1b3/0x490
[   26.837523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.837848]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.837925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.838054]  ? __kthread_parkme+0x82/0x160
[   26.838180]  ? preempt_count_sub+0x50/0x80
[   26.838257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.838322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.838398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.838470]  kthread+0x324/0x6d0
[   26.838529]  ? trace_preempt_on+0x20/0xc0
[   26.838595]  ? __pfx_kthread+0x10/0x10
[   26.838655]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.838722]  ? calculate_sigpending+0x7b/0xa0
[   26.838783]  ? __pfx_kthread+0x10/0x10
[   26.838847]  ret_from_fork+0x41/0x80
[   26.838901]  ? __pfx_kthread+0x10/0x10
[   26.838962]  ret_from_fork_asm+0x1a/0x30
[   26.839049]  </TASK>
[   26.839125] 
[   26.852640] Allocated by task 273:
[   26.852920]  kasan_save_stack+0x3d/0x60
[   26.853340]  kasan_save_track+0x18/0x40
[   26.853725]  kasan_save_alloc_info+0x3b/0x50
[   26.854155]  __kasan_kmalloc+0xb7/0xc0
[   26.854606]  __kmalloc_cache_noprof+0x184/0x410
[   26.855065]  kasan_atomics+0x96/0x310
[   26.855522]  kunit_try_run_case+0x1b3/0x490
[   26.855956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.856380]  kthread+0x324/0x6d0
[   26.856628]  ret_from_fork+0x41/0x80
[   26.856875]  ret_from_fork_asm+0x1a/0x30
[   26.857219] 
[   26.857457] The buggy address belongs to the object at ffff888102a6c880
[   26.857457]  which belongs to the cache kmalloc-64 of size 64
[   26.858528] The buggy address is located 0 bytes to the right of
[   26.858528]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   26.859545] 
[   26.859713] The buggy address belongs to the physical page:
[   26.860024] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   26.860755] flags: 0x200000000000000(node=0|zone=2)
[   26.861293] page_type: f5(slab)
[   26.861658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.862369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.862779] page dumped because: kasan: bad access detected
[   26.863078] 
[   26.863358] Memory state around the buggy address:
[   26.863800]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.864482]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.865149] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.865553]                                      ^
[   26.865832]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.866291]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.866918] ==================================================================

test log snippet boot parser 27

[   28.247134] ==================================================================
[   28.247806] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450
[   28.248365] Write of size 8 at addr ffff888102a6c8b0 by task kunit_try_catch/273
[   28.249042] 
[   28.249357] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   28.249506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.249549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.249611] Call Trace:
[   28.249693]  <TASK>
[   28.249745]  dump_stack_lvl+0x73/0xb0
[   28.249856]  print_report+0xd1/0x640
[   28.249944]  ? __virt_addr_valid+0x1db/0x2d0
[   28.250006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.250058]  kasan_report+0x102/0x140
[   28.250108]  ? kasan_atomics_helper+0x50d6/0x5450
[   28.250208]  ? kasan_atomics_helper+0x50d6/0x5450
[   28.250293]  __asan_report_store8_noabort+0x1b/0x30
[   28.250346]  kasan_atomics_helper+0x50d6/0x5450
[   28.250410]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.250475]  ? __kmalloc_cache_noprof+0x184/0x410
[   28.250562]  ? kasan_atomics+0x153/0x310
[   28.250659]  kasan_atomics+0x1dd/0x310
[   28.250725]  ? __pfx_kasan_atomics+0x10/0x10
[   28.250783]  ? __pfx_read_tsc+0x10/0x10
[   28.250842]  ? ktime_get_ts64+0x86/0x230
[   28.250910]  kunit_try_run_case+0x1b3/0x490
[   28.250995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.251077]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   28.251148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.251235]  ? __kthread_parkme+0x82/0x160
[   28.251290]  ? preempt_count_sub+0x50/0x80
[   28.251358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.251421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.251492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.251562]  kthread+0x324/0x6d0
[   28.251620]  ? trace_preempt_on+0x20/0xc0
[   28.251686]  ? __pfx_kthread+0x10/0x10
[   28.251746]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.251810]  ? calculate_sigpending+0x7b/0xa0
[   28.251896]  ? __pfx_kthread+0x10/0x10
[   28.251992]  ret_from_fork+0x41/0x80
[   28.252042]  ? __pfx_kthread+0x10/0x10
[   28.252102]  ret_from_fork_asm+0x1a/0x30
[   28.252210]  </TASK>
[   28.252247] 
[   28.268630] Allocated by task 273:
[   28.269327]  kasan_save_stack+0x3d/0x60
[   28.269681]  kasan_save_track+0x18/0x40
[   28.270037]  kasan_save_alloc_info+0x3b/0x50
[   28.270353]  __kasan_kmalloc+0xb7/0xc0
[   28.270624]  __kmalloc_cache_noprof+0x184/0x410
[   28.270970]  kasan_atomics+0x96/0x310
[   28.271275]  kunit_try_run_case+0x1b3/0x490
[   28.271762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.272345]  kthread+0x324/0x6d0
[   28.272749]  ret_from_fork+0x41/0x80
[   28.273177]  ret_from_fork_asm+0x1a/0x30
[   28.273526] 
[   28.273689] The buggy address belongs to the object at ffff888102a6c880
[   28.273689]  which belongs to the cache kmalloc-64 of size 64
[   28.274554] The buggy address is located 0 bytes to the right of
[   28.274554]  allocated 48-byte region [ffff888102a6c880, ffff888102a6c8b0)
[   28.275674] 
[   28.275912] The buggy address belongs to the physical page:
[   28.276406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6c
[   28.276901] flags: 0x200000000000000(node=0|zone=2)
[   28.277478] page_type: f5(slab)
[   28.277834] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.278574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.279292] page dumped because: kasan: bad access detected
[   28.279802] 
[   28.280028] Memory state around the buggy address:
[   28.280416]  ffff888102a6c780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.281036]  ffff888102a6c800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.281684] >ffff888102a6c880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.282049]                                      ^
[   28.282481]  ffff888102a6c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.283177]  ffff888102a6c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.283805] ==================================================================

test log snippet boot parser 28

[   26.027074] ==================================================================
[   26.027700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x23b/0xd50
[   26.028233] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.028976] 
[   26.029241] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.029354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.029391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.029445] Call Trace:
[   26.029483]  <TASK>
[   26.029529]  dump_stack_lvl+0x73/0xb0
[   26.029613]  print_report+0xd1/0x640
[   26.029671]  ? __virt_addr_valid+0x1db/0x2d0
[   26.029729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.029801]  kasan_report+0x102/0x140
[   26.029854]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   26.029924]  ? kasan_bitops_modify.constprop.0+0x23b/0xd50
[   26.029999]  kasan_check_range+0x10c/0x1c0
[   26.030057]  __kasan_check_write+0x18/0x20
[   26.030113]  kasan_bitops_modify.constprop.0+0x23b/0xd50
[   26.030836]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.030883]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.030919]  ? trace_hardirqs_on+0x37/0xe0
[   26.030953]  ? kasan_bitops_generic+0x93/0x1c0
[   26.030992]  kasan_bitops_generic+0x117/0x1c0
[   26.031022]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.031057]  ? __pfx_read_tsc+0x10/0x10
[   26.031087]  ? ktime_get_ts64+0x86/0x230
[   26.031179]  kunit_try_run_case+0x1b3/0x490
[   26.031216]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.031245]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.031280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.031313]  ? __kthread_parkme+0x82/0x160
[   26.031344]  ? preempt_count_sub+0x50/0x80
[   26.031380]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.031411]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.031447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.031482]  kthread+0x324/0x6d0
[   26.031511]  ? trace_preempt_on+0x20/0xc0
[   26.031542]  ? __pfx_kthread+0x10/0x10
[   26.031573]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.031603]  ? calculate_sigpending+0x7b/0xa0
[   26.031634]  ? __pfx_kthread+0x10/0x10
[   26.031666]  ret_from_fork+0x41/0x80
[   26.031691]  ? __pfx_kthread+0x10/0x10
[   26.031722]  ret_from_fork_asm+0x1a/0x30
[   26.031768]  </TASK>
[   26.031785] 
[   26.052898] Allocated by task 269:
[   26.054172]  kasan_save_stack+0x3d/0x60
[   26.054879]  kasan_save_track+0x18/0x40
[   26.055215]  kasan_save_alloc_info+0x3b/0x50
[   26.055660]  __kasan_kmalloc+0xb7/0xc0
[   26.056031]  __kmalloc_cache_noprof+0x184/0x410
[   26.056483]  kasan_bitops_generic+0x93/0x1c0
[   26.056796]  kunit_try_run_case+0x1b3/0x490
[   26.057278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.057800]  kthread+0x324/0x6d0
[   26.058174]  ret_from_fork+0x41/0x80
[   26.058554]  ret_from_fork_asm+0x1a/0x30
[   26.058883] 
[   26.059135] The buggy address belongs to the object at ffff8881027b6360
[   26.059135]  which belongs to the cache kmalloc-16 of size 16
[   26.059715] The buggy address is located 8 bytes inside of
[   26.059715]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.060778] 
[   26.061005] The buggy address belongs to the physical page:
[   26.061365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.062022] flags: 0x200000000000000(node=0|zone=2)
[   26.062381] page_type: f5(slab)
[   26.062726] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.063446] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.064013] page dumped because: kasan: bad access detected
[   26.064429] 
[   26.064645] Memory state around the buggy address:
[   26.064950]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.065585]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.065943] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.066533]                                                           ^
[   26.067147]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.067803]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.068421] ==================================================================
---
[   26.107537] ==================================================================
[   26.108850] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x374/0xd50
[   26.109667] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.110397] 
[   26.110651] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.110763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.110796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.110854] Call Trace:
[   26.110894]  <TASK>
[   26.110939]  dump_stack_lvl+0x73/0xb0
[   26.111030]  print_report+0xd1/0x640
[   26.111125]  ? __virt_addr_valid+0x1db/0x2d0
[   26.111211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.111276]  kasan_report+0x102/0x140
[   26.111323]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   26.111394]  ? kasan_bitops_modify.constprop.0+0x374/0xd50
[   26.111474]  kasan_check_range+0x10c/0x1c0
[   26.111534]  __kasan_check_write+0x18/0x20
[   26.111593]  kasan_bitops_modify.constprop.0+0x374/0xd50
[   26.111660]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.111728]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.111790]  ? trace_hardirqs_on+0x37/0xe0
[   26.111850]  ? kasan_bitops_generic+0x93/0x1c0
[   26.111937]  kasan_bitops_generic+0x117/0x1c0
[   26.111996]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.112063]  ? __pfx_read_tsc+0x10/0x10
[   26.112187]  ? ktime_get_ts64+0x86/0x230
[   26.112263]  kunit_try_run_case+0x1b3/0x490
[   26.112326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.112382]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.112446]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.112511]  ? __kthread_parkme+0x82/0x160
[   26.112568]  ? preempt_count_sub+0x50/0x80
[   26.112641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.112702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.112772]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.112837]  kthread+0x324/0x6d0
[   26.112895]  ? trace_preempt_on+0x20/0xc0
[   26.112958]  ? __pfx_kthread+0x10/0x10
[   26.113019]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.113079]  ? calculate_sigpending+0x7b/0xa0
[   26.113205]  ? __pfx_kthread+0x10/0x10
[   26.113272]  ret_from_fork+0x41/0x80
[   26.113324]  ? __pfx_kthread+0x10/0x10
[   26.113380]  ret_from_fork_asm+0x1a/0x30
[   26.113470]  </TASK>
[   26.113502] 
[   26.125998] Allocated by task 269:
[   26.126460]  kasan_save_stack+0x3d/0x60
[   26.126905]  kasan_save_track+0x18/0x40
[   26.127369]  kasan_save_alloc_info+0x3b/0x50
[   26.127800]  __kasan_kmalloc+0xb7/0xc0
[   26.128184]  __kmalloc_cache_noprof+0x184/0x410
[   26.128634]  kasan_bitops_generic+0x93/0x1c0
[   26.128912]  kunit_try_run_case+0x1b3/0x490
[   26.129255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.129575]  kthread+0x324/0x6d0
[   26.129930]  ret_from_fork+0x41/0x80
[   26.130381]  ret_from_fork_asm+0x1a/0x30
[   26.130797] 
[   26.131020] The buggy address belongs to the object at ffff8881027b6360
[   26.131020]  which belongs to the cache kmalloc-16 of size 16
[   26.132128] The buggy address is located 8 bytes inside of
[   26.132128]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.133073] 
[   26.133287] The buggy address belongs to the physical page:
[   26.133580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.133968] flags: 0x200000000000000(node=0|zone=2)
[   26.134320] page_type: f5(slab)
[   26.134555] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.134935] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.135529] page dumped because: kasan: bad access detected
[   26.136039] 
[   26.136319] Memory state around the buggy address:
[   26.136779]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.137475]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.138153] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.138784]                                                           ^
[   26.139436]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.139942]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.140441] ==================================================================
---
[   26.141694] ==================================================================
[   26.143054] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x40f/0xd50
[   26.143830] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.144385] 
[   26.144633] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.144744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.144779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.144836] Call Trace:
[   26.144873]  <TASK>
[   26.144921]  dump_stack_lvl+0x73/0xb0
[   26.145006]  print_report+0xd1/0x640
[   26.145066]  ? __virt_addr_valid+0x1db/0x2d0
[   26.145139]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.145234]  kasan_report+0x102/0x140
[   26.145288]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   26.145359]  ? kasan_bitops_modify.constprop.0+0x40f/0xd50
[   26.145434]  kasan_check_range+0x10c/0x1c0
[   26.145498]  __kasan_check_write+0x18/0x20
[   26.145559]  kasan_bitops_modify.constprop.0+0x40f/0xd50
[   26.145621]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.145684]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.145746]  ? trace_hardirqs_on+0x37/0xe0
[   26.145807]  ? kasan_bitops_generic+0x93/0x1c0
[   26.145878]  kasan_bitops_generic+0x117/0x1c0
[   26.145937]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.146000]  ? __pfx_read_tsc+0x10/0x10
[   26.146055]  ? ktime_get_ts64+0x86/0x230
[   26.146125]  kunit_try_run_case+0x1b3/0x490
[   26.147211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.147290]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.147359]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.147426]  ? __kthread_parkme+0x82/0x160
[   26.147487]  ? preempt_count_sub+0x50/0x80
[   26.147559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.147621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.147692]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.147761]  kthread+0x324/0x6d0
[   26.147820]  ? trace_preempt_on+0x20/0xc0
[   26.147894]  ? __pfx_kthread+0x10/0x10
[   26.147958]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.148018]  ? calculate_sigpending+0x7b/0xa0
[   26.148067]  ? __pfx_kthread+0x10/0x10
[   26.148130]  ret_from_fork+0x41/0x80
[   26.148198]  ? __pfx_kthread+0x10/0x10
[   26.148258]  ret_from_fork_asm+0x1a/0x30
[   26.148332]  </TASK>
[   26.148364] 
[   26.168057] Allocated by task 269:
[   26.168926]  kasan_save_stack+0x3d/0x60
[   26.169276]  kasan_save_track+0x18/0x40
[   26.169699]  kasan_save_alloc_info+0x3b/0x50
[   26.170075]  __kasan_kmalloc+0xb7/0xc0
[   26.170584]  __kmalloc_cache_noprof+0x184/0x410
[   26.170950]  kasan_bitops_generic+0x93/0x1c0
[   26.171805]  kunit_try_run_case+0x1b3/0x490
[   26.172717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.173005]  kthread+0x324/0x6d0
[   26.173687]  ret_from_fork+0x41/0x80
[   26.174079]  ret_from_fork_asm+0x1a/0x30
[   26.174547] 
[   26.175082] The buggy address belongs to the object at ffff8881027b6360
[   26.175082]  which belongs to the cache kmalloc-16 of size 16
[   26.176062] The buggy address is located 8 bytes inside of
[   26.176062]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.178044] 
[   26.178734] The buggy address belongs to the physical page:
[   26.179236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.180063] flags: 0x200000000000000(node=0|zone=2)
[   26.180698] page_type: f5(slab)
[   26.181105] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.181785] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.182517] page dumped because: kasan: bad access detected
[   26.182698] 
[   26.182778] Memory state around the buggy address:
[   26.182935]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.183245]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.183597] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.184411]                                                           ^
[   26.184785]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.185378]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.186005] ==================================================================
---
[   26.187524] ==================================================================
[   26.189044] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   26.189895] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.190541] 
[   26.190709] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.190805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.190836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.190887] Call Trace:
[   26.190923]  <TASK>
[   26.190966]  dump_stack_lvl+0x73/0xb0
[   26.193271]  print_report+0xd1/0x640
[   26.193384]  ? __virt_addr_valid+0x1db/0x2d0
[   26.193450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.193527]  kasan_report+0x102/0x140
[   26.193575]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   26.193660]  ? kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   26.193767]  kasan_check_range+0x10c/0x1c0
[   26.193837]  __kasan_check_write+0x18/0x20
[   26.193899]  kasan_bitops_modify.constprop.0+0x4ad/0xd50
[   26.193967]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.194037]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.194102]  ? trace_hardirqs_on+0x37/0xe0
[   26.194185]  ? kasan_bitops_generic+0x93/0x1c0
[   26.194263]  kasan_bitops_generic+0x117/0x1c0
[   26.194324]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.194445]  ? __pfx_read_tsc+0x10/0x10
[   26.194505]  ? ktime_get_ts64+0x86/0x230
[   26.194569]  kunit_try_run_case+0x1b3/0x490
[   26.194621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.194666]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.195240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.195309]  ? __kthread_parkme+0x82/0x160
[   26.195365]  ? preempt_count_sub+0x50/0x80
[   26.195433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.195491]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.195557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.195622]  kthread+0x324/0x6d0
[   26.195675]  ? trace_preempt_on+0x20/0xc0
[   26.195733]  ? __pfx_kthread+0x10/0x10
[   26.195789]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.195844]  ? calculate_sigpending+0x7b/0xa0
[   26.195910]  ? __pfx_kthread+0x10/0x10
[   26.195969]  ret_from_fork+0x41/0x80
[   26.196018]  ? __pfx_kthread+0x10/0x10
[   26.196074]  ret_from_fork_asm+0x1a/0x30
[   26.196193]  </TASK>
[   26.196224] 
[   26.218649] Allocated by task 269:
[   26.219138]  kasan_save_stack+0x3d/0x60
[   26.219833]  kasan_save_track+0x18/0x40
[   26.220399]  kasan_save_alloc_info+0x3b/0x50
[   26.220832]  __kasan_kmalloc+0xb7/0xc0
[   26.221402]  __kmalloc_cache_noprof+0x184/0x410
[   26.221915]  kasan_bitops_generic+0x93/0x1c0
[   26.222346]  kunit_try_run_case+0x1b3/0x490
[   26.222823]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.223456]  kthread+0x324/0x6d0
[   26.223854]  ret_from_fork+0x41/0x80
[   26.224351]  ret_from_fork_asm+0x1a/0x30
[   26.224816] 
[   26.225060] The buggy address belongs to the object at ffff8881027b6360
[   26.225060]  which belongs to the cache kmalloc-16 of size 16
[   26.225685] The buggy address is located 8 bytes inside of
[   26.225685]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.226455] 
[   26.226615] The buggy address belongs to the physical page:
[   26.227027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.227670] flags: 0x200000000000000(node=0|zone=2)
[   26.228005] page_type: f5(slab)
[   26.228412] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.229063] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.229518] page dumped because: kasan: bad access detected
[   26.229911] 
[   26.230191] Memory state around the buggy address:
[   26.230652]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.231340]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.231981] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.232578]                                                           ^
[   26.233219]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.233724]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.234133] ==================================================================
---
[   26.069756] ==================================================================
[   26.070716] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   26.071419] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.071961] 
[   26.072268] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.072378] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.072415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.072467] Call Trace:
[   26.072502]  <TASK>
[   26.072548]  dump_stack_lvl+0x73/0xb0
[   26.072630]  print_report+0xd1/0x640
[   26.072684]  ? __virt_addr_valid+0x1db/0x2d0
[   26.072738]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.072804]  kasan_report+0x102/0x140
[   26.072857]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   26.072924]  ? kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   26.073003]  kasan_check_range+0x10c/0x1c0
[   26.073061]  __kasan_check_write+0x18/0x20
[   26.073187]  kasan_bitops_modify.constprop.0+0x2d6/0xd50
[   26.073261]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.073322]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.073376]  ? trace_hardirqs_on+0x37/0xe0
[   26.073434]  ? kasan_bitops_generic+0x93/0x1c0
[   26.073498]  kasan_bitops_generic+0x117/0x1c0
[   26.073561]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.073621]  ? __pfx_read_tsc+0x10/0x10
[   26.073680]  ? ktime_get_ts64+0x86/0x230
[   26.073747]  kunit_try_run_case+0x1b3/0x490
[   26.073810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.073866]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.073926]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.073988]  ? __kthread_parkme+0x82/0x160
[   26.074046]  ? preempt_count_sub+0x50/0x80
[   26.074182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.074245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.074316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.074386]  kthread+0x324/0x6d0
[   26.074444]  ? trace_preempt_on+0x20/0xc0
[   26.074499]  ? __pfx_kthread+0x10/0x10
[   26.074557]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.074617]  ? calculate_sigpending+0x7b/0xa0
[   26.074676]  ? __pfx_kthread+0x10/0x10
[   26.074737]  ret_from_fork+0x41/0x80
[   26.074787]  ? __pfx_kthread+0x10/0x10
[   26.074847]  ret_from_fork_asm+0x1a/0x30
[   26.074938]  </TASK>
[   26.074972] 
[   26.087381] Allocated by task 269:
[   26.087658]  kasan_save_stack+0x3d/0x60
[   26.087963]  kasan_save_track+0x18/0x40
[   26.088356]  kasan_save_alloc_info+0x3b/0x50
[   26.088796]  __kasan_kmalloc+0xb7/0xc0
[   26.089244]  __kmalloc_cache_noprof+0x184/0x410
[   26.089672]  kasan_bitops_generic+0x93/0x1c0
[   26.090142]  kunit_try_run_case+0x1b3/0x490
[   26.090581]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.091081]  kthread+0x324/0x6d0
[   26.091504]  ret_from_fork+0x41/0x80
[   26.091833]  ret_from_fork_asm+0x1a/0x30
[   26.092149] 
[   26.092332] The buggy address belongs to the object at ffff8881027b6360
[   26.092332]  which belongs to the cache kmalloc-16 of size 16
[   26.092873] The buggy address is located 8 bytes inside of
[   26.092873]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.093757] 
[   26.093981] The buggy address belongs to the physical page:
[   26.094471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.095202] flags: 0x200000000000000(node=0|zone=2)
[   26.095671] page_type: f5(slab)
[   26.096027] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.096751] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.097451] page dumped because: kasan: bad access detected
[   26.097939] 
[   26.098206] Memory state around the buggy address:
[   26.098643]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.099269]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.099765] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.100189]                                                           ^
[   26.100528]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.100881]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.101377] ==================================================================
---
[   25.941255] ==================================================================
[   25.941985] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x102/0xd50
[   25.942785] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   25.943286] 
[   25.943463] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.943574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.943602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.943656] Call Trace:
[   25.943688]  <TASK>
[   25.943729]  dump_stack_lvl+0x73/0xb0
[   25.943817]  print_report+0xd1/0x640
[   25.943886]  ? __virt_addr_valid+0x1db/0x2d0
[   25.943952]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.944020]  kasan_report+0x102/0x140
[   25.944073]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   25.944251]  ? kasan_bitops_modify.constprop.0+0x102/0xd50
[   25.944338]  kasan_check_range+0x10c/0x1c0
[   25.944402]  __kasan_check_write+0x18/0x20
[   25.944462]  kasan_bitops_modify.constprop.0+0x102/0xd50
[   25.944532]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.944599]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.944659]  ? trace_hardirqs_on+0x37/0xe0
[   25.944709]  ? kasan_bitops_generic+0x93/0x1c0
[   25.944775]  kasan_bitops_generic+0x117/0x1c0
[   25.944834]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.944887]  ? __pfx_read_tsc+0x10/0x10
[   25.944946]  ? ktime_get_ts64+0x86/0x230
[   25.945016]  kunit_try_run_case+0x1b3/0x490
[   25.945082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.945189]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.945259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.945323]  ? __kthread_parkme+0x82/0x160
[   25.945382]  ? preempt_count_sub+0x50/0x80
[   25.945451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.945506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.945570]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.945633]  kthread+0x324/0x6d0
[   25.945689]  ? trace_preempt_on+0x20/0xc0
[   25.945747]  ? __pfx_kthread+0x10/0x10
[   25.945805]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.945865]  ? calculate_sigpending+0x7b/0xa0
[   25.945928]  ? __pfx_kthread+0x10/0x10
[   25.945987]  ret_from_fork+0x41/0x80
[   25.946040]  ? __pfx_kthread+0x10/0x10
[   25.946096]  ret_from_fork_asm+0x1a/0x30
[   25.946210]  </TASK>
[   25.946232] 
[   25.964538] Allocated by task 269:
[   25.965049]  kasan_save_stack+0x3d/0x60
[   25.965677]  kasan_save_track+0x18/0x40
[   25.966249]  kasan_save_alloc_info+0x3b/0x50
[   25.966670]  __kasan_kmalloc+0xb7/0xc0
[   25.967082]  __kmalloc_cache_noprof+0x184/0x410
[   25.967478]  kasan_bitops_generic+0x93/0x1c0
[   25.967932]  kunit_try_run_case+0x1b3/0x490
[   25.968248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.968771]  kthread+0x324/0x6d0
[   25.969091]  ret_from_fork+0x41/0x80
[   25.969515]  ret_from_fork_asm+0x1a/0x30
[   25.969870] 
[   25.970030] The buggy address belongs to the object at ffff8881027b6360
[   25.970030]  which belongs to the cache kmalloc-16 of size 16
[   25.970760] The buggy address is located 8 bytes inside of
[   25.970760]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   25.971870] 
[   25.972275] The buggy address belongs to the physical page:
[   25.972743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   25.973213] flags: 0x200000000000000(node=0|zone=2)
[   25.973684] page_type: f5(slab)
[   25.974213] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   25.975748] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   25.976184] page dumped because: kasan: bad access detected
[   25.976967] 
[   25.977519] Memory state around the buggy address:
[   25.977992]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   25.978600]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   25.979044] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   25.979678]                                                           ^
[   25.980344]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.980812]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.981412] ==================================================================
---
[   25.983566] ==================================================================
[   25.983997] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x19d/0xd50
[   25.984758] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   25.985417] 
[   25.985665] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.985772] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.985806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.985863] Call Trace:
[   25.985903]  <TASK>
[   25.985948]  dump_stack_lvl+0x73/0xb0
[   25.986029]  print_report+0xd1/0x640
[   25.986087]  ? __virt_addr_valid+0x1db/0x2d0
[   25.986145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.986234]  kasan_report+0x102/0x140
[   25.986279]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   25.986347]  ? kasan_bitops_modify.constprop.0+0x19d/0xd50
[   25.986427]  kasan_check_range+0x10c/0x1c0
[   25.986488]  __kasan_check_write+0x18/0x20
[   25.986544]  kasan_bitops_modify.constprop.0+0x19d/0xd50
[   25.986611]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   25.986678]  ? __kmalloc_cache_noprof+0x184/0x410
[   25.986741]  ? trace_hardirqs_on+0x37/0xe0
[   25.986801]  ? kasan_bitops_generic+0x93/0x1c0
[   25.986873]  kasan_bitops_generic+0x117/0x1c0
[   25.986934]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   25.986998]  ? __pfx_read_tsc+0x10/0x10
[   25.987055]  ? ktime_get_ts64+0x86/0x230
[   25.987122]  kunit_try_run_case+0x1b3/0x490
[   25.987357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.987417]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.987466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.987513]  ? __kthread_parkme+0x82/0x160
[   25.987559]  ? preempt_count_sub+0x50/0x80
[   25.987610]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.987655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.987709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.987758]  kthread+0x324/0x6d0
[   25.987799]  ? trace_preempt_on+0x20/0xc0
[   25.987843]  ? __pfx_kthread+0x10/0x10
[   25.987898]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.987965]  ? calculate_sigpending+0x7b/0xa0
[   25.987997]  ? __pfx_kthread+0x10/0x10
[   25.988030]  ret_from_fork+0x41/0x80
[   25.988056]  ? __pfx_kthread+0x10/0x10
[   25.988088]  ret_from_fork_asm+0x1a/0x30
[   25.988187]  </TASK>
[   25.988207] 
[   26.006589] Allocated by task 269:
[   26.007023]  kasan_save_stack+0x3d/0x60
[   26.007580]  kasan_save_track+0x18/0x40
[   26.008040]  kasan_save_alloc_info+0x3b/0x50
[   26.008576]  __kasan_kmalloc+0xb7/0xc0
[   26.008927]  __kmalloc_cache_noprof+0x184/0x410
[   26.009398]  kasan_bitops_generic+0x93/0x1c0
[   26.009865]  kunit_try_run_case+0x1b3/0x490
[   26.010396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.010963]  kthread+0x324/0x6d0
[   26.011421]  ret_from_fork+0x41/0x80
[   26.011841]  ret_from_fork_asm+0x1a/0x30
[   26.012364] 
[   26.012602] The buggy address belongs to the object at ffff8881027b6360
[   26.012602]  which belongs to the cache kmalloc-16 of size 16
[   26.013204] The buggy address is located 8 bytes inside of
[   26.013204]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.014342] 
[   26.014581] The buggy address belongs to the physical page:
[   26.015171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.015938] flags: 0x200000000000000(node=0|zone=2)
[   26.016504] page_type: f5(slab)
[   26.016889] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.017682] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.018371] page dumped because: kasan: bad access detected
[   26.018811] 
[   26.019019] Memory state around the buggy address:
[   26.019736]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.020878]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.021595] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.022209]                                                           ^
[   26.022833]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.023928]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.024635] ==================================================================
---
[   26.236650] ==================================================================
[   26.237470] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x548/0xd50
[   26.238269] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.238897] 
[   26.239122] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.239255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.239293] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.239349] Call Trace:
[   26.239382]  <TASK>
[   26.239427]  dump_stack_lvl+0x73/0xb0
[   26.239507]  print_report+0xd1/0x640
[   26.239564]  ? __virt_addr_valid+0x1db/0x2d0
[   26.239682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.239758]  kasan_report+0x102/0x140
[   26.239810]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   26.239888]  ? kasan_bitops_modify.constprop.0+0x548/0xd50
[   26.239966]  kasan_check_range+0x10c/0x1c0
[   26.240025]  __kasan_check_write+0x18/0x20
[   26.240122]  kasan_bitops_modify.constprop.0+0x548/0xd50
[   26.240223]  ? __pfx_kasan_bitops_modify.constprop.0+0x10/0x10
[   26.240292]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.240356]  ? trace_hardirqs_on+0x37/0xe0
[   26.240415]  ? kasan_bitops_generic+0x93/0x1c0
[   26.240481]  kasan_bitops_generic+0x117/0x1c0
[   26.240542]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.240603]  ? __pfx_read_tsc+0x10/0x10
[   26.240660]  ? ktime_get_ts64+0x86/0x230
[   26.240714]  kunit_try_run_case+0x1b3/0x490
[   26.240751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.240780]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.240817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.240862]  ? __kthread_parkme+0x82/0x160
[   26.240912]  ? preempt_count_sub+0x50/0x80
[   26.240978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.241036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.241145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.241256]  kthread+0x324/0x6d0
[   26.241316]  ? trace_preempt_on+0x20/0xc0
[   26.241375]  ? __pfx_kthread+0x10/0x10
[   26.241431]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.241488]  ? calculate_sigpending+0x7b/0xa0
[   26.241550]  ? __pfx_kthread+0x10/0x10
[   26.241606]  ret_from_fork+0x41/0x80
[   26.241653]  ? __pfx_kthread+0x10/0x10
[   26.241712]  ret_from_fork_asm+0x1a/0x30
[   26.241794]  </TASK>
[   26.241822] 
[   26.254448] Allocated by task 269:
[   26.254866]  kasan_save_stack+0x3d/0x60
[   26.255373]  kasan_save_track+0x18/0x40
[   26.255789]  kasan_save_alloc_info+0x3b/0x50
[   26.256145]  __kasan_kmalloc+0xb7/0xc0
[   26.256559]  __kmalloc_cache_noprof+0x184/0x410
[   26.256877]  kasan_bitops_generic+0x93/0x1c0
[   26.257356]  kunit_try_run_case+0x1b3/0x490
[   26.257781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.258181]  kthread+0x324/0x6d0
[   26.258553]  ret_from_fork+0x41/0x80
[   26.258868]  ret_from_fork_asm+0x1a/0x30
[   26.259255] 
[   26.259473] The buggy address belongs to the object at ffff8881027b6360
[   26.259473]  which belongs to the cache kmalloc-16 of size 16
[   26.260372] The buggy address is located 8 bytes inside of
[   26.260372]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.261078] 
[   26.261301] The buggy address belongs to the physical page:
[   26.261769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.262470] flags: 0x200000000000000(node=0|zone=2)
[   26.262860] page_type: f5(slab)
[   26.263133] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.263817] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.264434] page dumped because: kasan: bad access detected
[   26.264727] 
[   26.264874] Memory state around the buggy address:
[   26.265209]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.265577]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.265937] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.266446]                                                           ^
[   26.267043]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.267727]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.268389] ==================================================================

test log snippet boot parser 29

[   26.269883] ==================================================================
[   26.270891] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   26.271723] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.272364] 
[   26.272549] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.272661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.272695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.272757] Call Trace:
[   26.272797]  <TASK>
[   26.272845]  dump_stack_lvl+0x73/0xb0
[   26.272925]  print_report+0xd1/0x640
[   26.272984]  ? __virt_addr_valid+0x1db/0x2d0
[   26.273037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.274184]  kasan_report+0x102/0x140
[   26.274267]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   26.274347]  ? kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   26.274435]  kasan_check_range+0x10c/0x1c0
[   26.274496]  __kasan_check_write+0x18/0x20
[   26.274557]  kasan_bitops_test_and_modify.constprop.0+0x102/0xd90
[   26.274631]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.274707]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.274773]  ? trace_hardirqs_on+0x37/0xe0
[   26.274835]  ? kasan_bitops_generic+0x93/0x1c0
[   26.274907]  kasan_bitops_generic+0x122/0x1c0
[   26.274969]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.275035]  ? __pfx_read_tsc+0x10/0x10
[   26.275072]  ? ktime_get_ts64+0x86/0x230
[   26.276034]  kunit_try_run_case+0x1b3/0x490
[   26.277495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.277586]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.277672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.277741]  ? __kthread_parkme+0x82/0x160
[   26.277798]  ? preempt_count_sub+0x50/0x80
[   26.277871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.277930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.277999]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.278068]  kthread+0x324/0x6d0
[   26.278124]  ? trace_preempt_on+0x20/0xc0
[   26.278203]  ? __pfx_kthread+0x10/0x10
[   26.278260]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.278323]  ? calculate_sigpending+0x7b/0xa0
[   26.278380]  ? __pfx_kthread+0x10/0x10
[   26.278442]  ret_from_fork+0x41/0x80
[   26.278491]  ? __pfx_kthread+0x10/0x10
[   26.278556]  ret_from_fork_asm+0x1a/0x30
[   26.278648]  </TASK>
[   26.278680] 
[   26.298396] Allocated by task 269:
[   26.298874]  kasan_save_stack+0x3d/0x60
[   26.299466]  kasan_save_track+0x18/0x40
[   26.299968]  kasan_save_alloc_info+0x3b/0x50
[   26.300556]  __kasan_kmalloc+0xb7/0xc0
[   26.300908]  __kmalloc_cache_noprof+0x184/0x410
[   26.301509]  kasan_bitops_generic+0x93/0x1c0
[   26.301932]  kunit_try_run_case+0x1b3/0x490
[   26.302377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.302984]  kthread+0x324/0x6d0
[   26.303521]  ret_from_fork+0x41/0x80
[   26.303990]  ret_from_fork_asm+0x1a/0x30
[   26.304530] 
[   26.304861] The buggy address belongs to the object at ffff8881027b6360
[   26.304861]  which belongs to the cache kmalloc-16 of size 16
[   26.305550] The buggy address is located 8 bytes inside of
[   26.305550]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.306781] 
[   26.306975] The buggy address belongs to the physical page:
[   26.307313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.308018] flags: 0x200000000000000(node=0|zone=2)
[   26.308402] page_type: f5(slab)
[   26.308758] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.309386] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.309909] page dumped because: kasan: bad access detected
[   26.310398] 
[   26.310653] Memory state around the buggy address:
[   26.311079]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.311811]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.312420] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.313044]                                                           ^
[   26.313636]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.313996]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.314633] ==================================================================
---
[   26.535287] ==================================================================
[   26.536960] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   26.537960] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.538563] 
[   26.538820] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.539021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.539089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.539194] Call Trace:
[   26.539239]  <TASK>
[   26.539308]  dump_stack_lvl+0x73/0xb0
[   26.539435]  print_report+0xd1/0x640
[   26.539521]  ? __virt_addr_valid+0x1db/0x2d0
[   26.539589]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.539717]  kasan_report+0x102/0x140
[   26.539756]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   26.539799]  ? kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   26.539845]  kasan_check_range+0x10c/0x1c0
[   26.539886]  __kasan_check_write+0x18/0x20
[   26.539918]  kasan_bitops_test_and_modify.constprop.0+0x4ba/0xd90
[   26.539956]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.539995]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.540028]  ? trace_hardirqs_on+0x37/0xe0
[   26.540061]  ? kasan_bitops_generic+0x93/0x1c0
[   26.540110]  kasan_bitops_generic+0x122/0x1c0
[   26.540183]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.540220]  ? __pfx_read_tsc+0x10/0x10
[   26.540251]  ? ktime_get_ts64+0x86/0x230
[   26.540286]  kunit_try_run_case+0x1b3/0x490
[   26.540316]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.540344]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.540377]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.540410]  ? __kthread_parkme+0x82/0x160
[   26.540441]  ? preempt_count_sub+0x50/0x80
[   26.540476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.540507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.540543]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.540578]  kthread+0x324/0x6d0
[   26.540607]  ? trace_preempt_on+0x20/0xc0
[   26.540637]  ? __pfx_kthread+0x10/0x10
[   26.540668]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.540698]  ? calculate_sigpending+0x7b/0xa0
[   26.540728]  ? __pfx_kthread+0x10/0x10
[   26.540760]  ret_from_fork+0x41/0x80
[   26.540784]  ? __pfx_kthread+0x10/0x10
[   26.540815]  ret_from_fork_asm+0x1a/0x30
[   26.540861]  </TASK>
[   26.540876] 
[   26.555203] Allocated by task 269:
[   26.555477]  kasan_save_stack+0x3d/0x60
[   26.555774]  kasan_save_track+0x18/0x40
[   26.556048]  kasan_save_alloc_info+0x3b/0x50
[   26.558691]  __kasan_kmalloc+0xb7/0xc0
[   26.559189]  __kmalloc_cache_noprof+0x184/0x410
[   26.559740]  kasan_bitops_generic+0x93/0x1c0
[   26.560309]  kunit_try_run_case+0x1b3/0x490
[   26.560774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.561386]  kthread+0x324/0x6d0
[   26.561785]  ret_from_fork+0x41/0x80
[   26.562310]  ret_from_fork_asm+0x1a/0x30
[   26.562770] 
[   26.563008] The buggy address belongs to the object at ffff8881027b6360
[   26.563008]  which belongs to the cache kmalloc-16 of size 16
[   26.564222] The buggy address is located 8 bytes inside of
[   26.564222]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.565433] 
[   26.565714] The buggy address belongs to the physical page:
[   26.566355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.567175] flags: 0x200000000000000(node=0|zone=2)
[   26.567729] page_type: f5(slab)
[   26.568093] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.568773] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.569000] page dumped because: kasan: bad access detected
[   26.569388] 
[   26.569627] Memory state around the buggy address:
[   26.570197]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.570924]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.571664] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.572142]                                                           ^
[   26.572813]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.573402]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.574193] ==================================================================
---
[   26.394824] ==================================================================
[   26.396105] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   26.400480] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.402506] 
[   26.402765] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.402841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.402859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.402892] Call Trace:
[   26.402915]  <TASK>
[   26.402942]  dump_stack_lvl+0x73/0xb0
[   26.402993]  print_report+0xd1/0x640
[   26.403022]  ? __virt_addr_valid+0x1db/0x2d0
[   26.403055]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.403114]  kasan_report+0x102/0x140
[   26.403177]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   26.403248]  ? kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   26.403329]  kasan_check_range+0x10c/0x1c0
[   26.403387]  __kasan_check_write+0x18/0x20
[   26.403446]  kasan_bitops_test_and_modify.constprop.0+0x2de/0xd90
[   26.403520]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.403609]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.403704]  ? trace_hardirqs_on+0x37/0xe0
[   26.403768]  ? kasan_bitops_generic+0x93/0x1c0
[   26.403840]  kasan_bitops_generic+0x122/0x1c0
[   26.403912]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.403969]  ? __pfx_read_tsc+0x10/0x10
[   26.404015]  ? ktime_get_ts64+0x86/0x230
[   26.404054]  kunit_try_run_case+0x1b3/0x490
[   26.404090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.404174]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.404216]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.404250]  ? __kthread_parkme+0x82/0x160
[   26.404280]  ? preempt_count_sub+0x50/0x80
[   26.404318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.404349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.404386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.404422]  kthread+0x324/0x6d0
[   26.404449]  ? trace_preempt_on+0x20/0xc0
[   26.404483]  ? __pfx_kthread+0x10/0x10
[   26.404514]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.404545]  ? calculate_sigpending+0x7b/0xa0
[   26.404575]  ? __pfx_kthread+0x10/0x10
[   26.404606]  ret_from_fork+0x41/0x80
[   26.404632]  ? __pfx_kthread+0x10/0x10
[   26.404662]  ret_from_fork_asm+0x1a/0x30
[   26.404710]  </TASK>
[   26.404725] 
[   26.424947] Allocated by task 269:
[   26.425782]  kasan_save_stack+0x3d/0x60
[   26.426386]  kasan_save_track+0x18/0x40
[   26.426882]  kasan_save_alloc_info+0x3b/0x50
[   26.427309]  __kasan_kmalloc+0xb7/0xc0
[   26.428099]  __kmalloc_cache_noprof+0x184/0x410
[   26.428381]  kasan_bitops_generic+0x93/0x1c0
[   26.428821]  kunit_try_run_case+0x1b3/0x490
[   26.429340]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.430336]  kthread+0x324/0x6d0
[   26.430748]  ret_from_fork+0x41/0x80
[   26.431086]  ret_from_fork_asm+0x1a/0x30
[   26.432006] 
[   26.432225] The buggy address belongs to the object at ffff8881027b6360
[   26.432225]  which belongs to the cache kmalloc-16 of size 16
[   26.433514] The buggy address is located 8 bytes inside of
[   26.433514]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.435091] 
[   26.435334] The buggy address belongs to the physical page:
[   26.436328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.436854] flags: 0x200000000000000(node=0|zone=2)
[   26.437533] page_type: f5(slab)
[   26.437955] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.439026] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.439949] page dumped because: kasan: bad access detected
[   26.440705] 
[   26.440868] Memory state around the buggy address:
[   26.441211]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.442071]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.442624] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.443081]                                                           ^
[   26.444151]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.445021]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.445660] ==================================================================
---
[   26.315981] ==================================================================
[   26.316734] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   26.317439] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.317900] 
[   26.318080] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.318306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.318346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.318405] Call Trace:
[   26.318451]  <TASK>
[   26.318497]  dump_stack_lvl+0x73/0xb0
[   26.318580]  print_report+0xd1/0x640
[   26.318641]  ? __virt_addr_valid+0x1db/0x2d0
[   26.318772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.318855]  kasan_report+0x102/0x140
[   26.318973]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   26.319151]  ? kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   26.319268]  kasan_check_range+0x10c/0x1c0
[   26.319323]  __kasan_check_write+0x18/0x20
[   26.319374]  kasan_bitops_test_and_modify.constprop.0+0x1a1/0xd90
[   26.319441]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.319576]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.319656]  ? trace_hardirqs_on+0x37/0xe0
[   26.319719]  ? kasan_bitops_generic+0x93/0x1c0
[   26.319788]  kasan_bitops_generic+0x122/0x1c0
[   26.319850]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.319929]  ? __pfx_read_tsc+0x10/0x10
[   26.319986]  ? ktime_get_ts64+0x86/0x230
[   26.320050]  kunit_try_run_case+0x1b3/0x490
[   26.320176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.320243]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.320366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.320452]  ? __kthread_parkme+0x82/0x160
[   26.320514]  ? preempt_count_sub+0x50/0x80
[   26.320579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.320638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.320775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.320856]  kthread+0x324/0x6d0
[   26.320913]  ? trace_preempt_on+0x20/0xc0
[   26.320973]  ? __pfx_kthread+0x10/0x10
[   26.321028]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.321222]  ? calculate_sigpending+0x7b/0xa0
[   26.321289]  ? __pfx_kthread+0x10/0x10
[   26.321341]  ret_from_fork+0x41/0x80
[   26.321388]  ? __pfx_kthread+0x10/0x10
[   26.321444]  ret_from_fork_asm+0x1a/0x30
[   26.321594]  </TASK>
[   26.321637] 
[   26.336396] Allocated by task 269:
[   26.336851]  kasan_save_stack+0x3d/0x60
[   26.337409]  kasan_save_track+0x18/0x40
[   26.337826]  kasan_save_alloc_info+0x3b/0x50
[   26.338280]  __kasan_kmalloc+0xb7/0xc0
[   26.338686]  __kmalloc_cache_noprof+0x184/0x410
[   26.339004]  kasan_bitops_generic+0x93/0x1c0
[   26.340553]  kunit_try_run_case+0x1b3/0x490
[   26.340999]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.341641]  kthread+0x324/0x6d0
[   26.344268]  ret_from_fork+0x41/0x80
[   26.344561]  ret_from_fork_asm+0x1a/0x30
[   26.345217] 
[   26.345505] The buggy address belongs to the object at ffff8881027b6360
[   26.345505]  which belongs to the cache kmalloc-16 of size 16
[   26.346886] The buggy address is located 8 bytes inside of
[   26.346886]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.347972] 
[   26.348620] The buggy address belongs to the physical page:
[   26.349350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.350045] flags: 0x200000000000000(node=0|zone=2)
[   26.350590] page_type: f5(slab)
[   26.350820] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.352265] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.352823] page dumped because: kasan: bad access detected
[   26.353278] 
[   26.353489] Memory state around the buggy address:
[   26.353833]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.354491]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.355129] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.355767]                                                           ^
[   26.356185]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.356855]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.357449] ==================================================================
---
[   26.359138] ==================================================================
[   26.361023] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   26.361802] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.362358] 
[   26.362536] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.362659] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.362695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.362752] Call Trace:
[   26.362791]  <TASK>
[   26.362837]  dump_stack_lvl+0x73/0xb0
[   26.362917]  print_report+0xd1/0x640
[   26.362969]  ? __virt_addr_valid+0x1db/0x2d0
[   26.363024]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.363096]  kasan_report+0x102/0x140
[   26.363148]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   26.363248]  ? kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   26.363328]  kasan_check_range+0x10c/0x1c0
[   26.363394]  __kasan_check_write+0x18/0x20
[   26.363454]  kasan_bitops_test_and_modify.constprop.0+0x23f/0xd90
[   26.363526]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.363592]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.363655]  ? trace_hardirqs_on+0x37/0xe0
[   26.363709]  ? kasan_bitops_generic+0x93/0x1c0
[   26.363776]  kasan_bitops_generic+0x122/0x1c0
[   26.363835]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.363908]  ? __pfx_read_tsc+0x10/0x10
[   26.363963]  ? ktime_get_ts64+0x86/0x230
[   26.364029]  kunit_try_run_case+0x1b3/0x490
[   26.364087]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.364138]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.364469]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.364537]  ? __kthread_parkme+0x82/0x160
[   26.364589]  ? preempt_count_sub+0x50/0x80
[   26.364652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.364712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.364765]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.364802]  kthread+0x324/0x6d0
[   26.364832]  ? trace_preempt_on+0x20/0xc0
[   26.364864]  ? __pfx_kthread+0x10/0x10
[   26.364896]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.364927]  ? calculate_sigpending+0x7b/0xa0
[   26.364959]  ? __pfx_kthread+0x10/0x10
[   26.364991]  ret_from_fork+0x41/0x80
[   26.365019]  ? __pfx_kthread+0x10/0x10
[   26.365049]  ret_from_fork_asm+0x1a/0x30
[   26.365122]  </TASK>
[   26.365154] 
[   26.377971] Allocated by task 269:
[   26.378384]  kasan_save_stack+0x3d/0x60
[   26.378835]  kasan_save_track+0x18/0x40
[   26.379306]  kasan_save_alloc_info+0x3b/0x50
[   26.379591]  __kasan_kmalloc+0xb7/0xc0
[   26.379910]  __kmalloc_cache_noprof+0x184/0x410
[   26.380216]  kasan_bitops_generic+0x93/0x1c0
[   26.380653]  kunit_try_run_case+0x1b3/0x490
[   26.381068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.381749]  kthread+0x324/0x6d0
[   26.382105]  ret_from_fork+0x41/0x80
[   26.382537]  ret_from_fork_asm+0x1a/0x30
[   26.382865] 
[   26.383025] The buggy address belongs to the object at ffff8881027b6360
[   26.383025]  which belongs to the cache kmalloc-16 of size 16
[   26.383591] The buggy address is located 8 bytes inside of
[   26.383591]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.384659] 
[   26.384885] The buggy address belongs to the physical page:
[   26.385524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.386042] flags: 0x200000000000000(node=0|zone=2)
[   26.386358] page_type: f5(slab)
[   26.386586] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.387030] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.387675] page dumped because: kasan: bad access detected
[   26.388149] 
[   26.388376] Memory state around the buggy address:
[   26.388849]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.389765]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.390555] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.391003]                                                           ^
[   26.391738]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.392174]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.392690] ==================================================================
---
[   26.495758] ==================================================================
[   26.497220] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   26.497842] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.498418] 
[   26.498709] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.498818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.498853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.498911] Call Trace:
[   26.498952]  <TASK>
[   26.499015]  dump_stack_lvl+0x73/0xb0
[   26.499185]  print_report+0xd1/0x640
[   26.499253]  ? __virt_addr_valid+0x1db/0x2d0
[   26.499318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.499407]  kasan_report+0x102/0x140
[   26.499490]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   26.499569]  ? kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   26.499682]  kasan_check_range+0x10c/0x1c0
[   26.499721]  __kasan_check_write+0x18/0x20
[   26.499752]  kasan_bitops_test_and_modify.constprop.0+0x41b/0xd90
[   26.499814]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.499894]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.499959]  ? trace_hardirqs_on+0x37/0xe0
[   26.500039]  ? kasan_bitops_generic+0x93/0x1c0
[   26.500196]  kasan_bitops_generic+0x122/0x1c0
[   26.500262]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.500325]  ? __pfx_read_tsc+0x10/0x10
[   26.500379]  ? ktime_get_ts64+0x86/0x230
[   26.500459]  kunit_try_run_case+0x1b3/0x490
[   26.500552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.500612]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.500671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.500725]  ? __kthread_parkme+0x82/0x160
[   26.500766]  ? preempt_count_sub+0x50/0x80
[   26.500806]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.500837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.500874]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.500910]  kthread+0x324/0x6d0
[   26.500938]  ? trace_preempt_on+0x20/0xc0
[   26.500972]  ? __pfx_kthread+0x10/0x10
[   26.501003]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.501034]  ? calculate_sigpending+0x7b/0xa0
[   26.501064]  ? __pfx_kthread+0x10/0x10
[   26.501117]  ret_from_fork+0x41/0x80
[   26.501150]  ? __pfx_kthread+0x10/0x10
[   26.501203]  ret_from_fork_asm+0x1a/0x30
[   26.501252]  </TASK>
[   26.501269] 
[   26.517610] Allocated by task 269:
[   26.518042]  kasan_save_stack+0x3d/0x60
[   26.518591]  kasan_save_track+0x18/0x40
[   26.519039]  kasan_save_alloc_info+0x3b/0x50
[   26.519569]  __kasan_kmalloc+0xb7/0xc0
[   26.520007]  __kmalloc_cache_noprof+0x184/0x410
[   26.520566]  kasan_bitops_generic+0x93/0x1c0
[   26.521038]  kunit_try_run_case+0x1b3/0x490
[   26.521558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.522035]  kthread+0x324/0x6d0
[   26.522494]  ret_from_fork+0x41/0x80
[   26.522906]  ret_from_fork_asm+0x1a/0x30
[   26.523431] 
[   26.523668] The buggy address belongs to the object at ffff8881027b6360
[   26.523668]  which belongs to the cache kmalloc-16 of size 16
[   26.524552] The buggy address is located 8 bytes inside of
[   26.524552]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.525347] 
[   26.525553] The buggy address belongs to the physical page:
[   26.525847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.526588] flags: 0x200000000000000(node=0|zone=2)
[   26.526997] page_type: f5(slab)
[   26.527349] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.527741] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.528418] page dumped because: kasan: bad access detected
[   26.528919] 
[   26.529209] Memory state around the buggy address:
[   26.529551]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.529988]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.530636] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.531253]                                                           ^
[   26.531713]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.532276]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.532866] ==================================================================
---
[   26.447579] ==================================================================
[   26.448509] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   26.449581] Write of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.450443] 
[   26.450618] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.450685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.450703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.450737] Call Trace:
[   26.450760]  <TASK>
[   26.450787]  dump_stack_lvl+0x73/0xb0
[   26.450836]  print_report+0xd1/0x640
[   26.450868]  ? __virt_addr_valid+0x1db/0x2d0
[   26.450902]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.450941]  kasan_report+0x102/0x140
[   26.450967]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   26.451006]  ? kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   26.451051]  kasan_check_range+0x10c/0x1c0
[   26.451082]  __kasan_check_write+0x18/0x20
[   26.451188]  kasan_bitops_test_and_modify.constprop.0+0x37d/0xd90
[   26.451271]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.451344]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.451407]  ? trace_hardirqs_on+0x37/0xe0
[   26.451456]  ? kasan_bitops_generic+0x93/0x1c0
[   26.451497]  kasan_bitops_generic+0x122/0x1c0
[   26.451529]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.451563]  ? __pfx_read_tsc+0x10/0x10
[   26.451609]  ? ktime_get_ts64+0x86/0x230
[   26.451691]  kunit_try_run_case+0x1b3/0x490
[   26.451755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.451811]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.451869]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.451945]  ? __kthread_parkme+0x82/0x160
[   26.452009]  ? preempt_count_sub+0x50/0x80
[   26.452077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.452152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.452213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.452250]  kthread+0x324/0x6d0
[   26.452281]  ? trace_preempt_on+0x20/0xc0
[   26.452312]  ? __pfx_kthread+0x10/0x10
[   26.452344]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.452377]  ? calculate_sigpending+0x7b/0xa0
[   26.452407]  ? __pfx_kthread+0x10/0x10
[   26.452438]  ret_from_fork+0x41/0x80
[   26.452464]  ? __pfx_kthread+0x10/0x10
[   26.452494]  ret_from_fork_asm+0x1a/0x30
[   26.452544]  </TASK>
[   26.452561] 
[   26.476365] Allocated by task 269:
[   26.476812]  kasan_save_stack+0x3d/0x60
[   26.477511]  kasan_save_track+0x18/0x40
[   26.478069]  kasan_save_alloc_info+0x3b/0x50
[   26.478720]  __kasan_kmalloc+0xb7/0xc0
[   26.479238]  __kmalloc_cache_noprof+0x184/0x410
[   26.479732]  kasan_bitops_generic+0x93/0x1c0
[   26.480358]  kunit_try_run_case+0x1b3/0x490
[   26.480626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.481230]  kthread+0x324/0x6d0
[   26.481564]  ret_from_fork+0x41/0x80
[   26.481895]  ret_from_fork_asm+0x1a/0x30
[   26.482355] 
[   26.482514] The buggy address belongs to the object at ffff8881027b6360
[   26.482514]  which belongs to the cache kmalloc-16 of size 16
[   26.483729] The buggy address is located 8 bytes inside of
[   26.483729]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.484653] 
[   26.484994] The buggy address belongs to the physical page:
[   26.485958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.486876] flags: 0x200000000000000(node=0|zone=2)
[   26.487493] page_type: f5(slab)
[   26.487959] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.488723] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.489692] page dumped because: kasan: bad access detected
[   26.489969] 
[   26.490236] Memory state around the buggy address:
[   26.490699]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.491224]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.491850] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.492527]                                                           ^
[   26.492870]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.493392]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.494046] ==================================================================

test log snippet boot parser 30

[   26.616042] ==================================================================
[   26.618533] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   26.619381] Read of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.620682] 
[   26.620910] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.620980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.620998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.621032] Call Trace:
[   26.621055]  <TASK>
[   26.621081]  dump_stack_lvl+0x73/0xb0
[   26.621174]  print_report+0xd1/0x640
[   26.621208]  ? __virt_addr_valid+0x1db/0x2d0
[   26.621242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.621280]  kasan_report+0x102/0x140
[   26.621306]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   26.621349]  ? kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   26.621392]  __asan_report_load8_noabort+0x18/0x20
[   26.621424]  kasan_bitops_test_and_modify.constprop.0+0xd08/0xd90
[   26.621459]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.621497]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.621529]  ? trace_hardirqs_on+0x37/0xe0
[   26.621559]  ? kasan_bitops_generic+0x93/0x1c0
[   26.621596]  kasan_bitops_generic+0x122/0x1c0
[   26.621626]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.621659]  ? __pfx_read_tsc+0x10/0x10
[   26.621687]  ? ktime_get_ts64+0x86/0x230
[   26.621722]  kunit_try_run_case+0x1b3/0x490
[   26.621751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.621779]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.621814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.621846]  ? __kthread_parkme+0x82/0x160
[   26.621876]  ? preempt_count_sub+0x50/0x80
[   26.621911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.621940]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.621976]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.622011]  kthread+0x324/0x6d0
[   26.622039]  ? trace_preempt_on+0x20/0xc0
[   26.622069]  ? __pfx_kthread+0x10/0x10
[   26.622112]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.622186]  ? calculate_sigpending+0x7b/0xa0
[   26.622245]  ? __pfx_kthread+0x10/0x10
[   26.622301]  ret_from_fork+0x41/0x80
[   26.622349]  ? __pfx_kthread+0x10/0x10
[   26.622409]  ret_from_fork_asm+0x1a/0x30
[   26.622492]  </TASK>
[   26.622544] 
[   26.638734] Allocated by task 269:
[   26.639009]  kasan_save_stack+0x3d/0x60
[   26.639374]  kasan_save_track+0x18/0x40
[   26.639690]  kasan_save_alloc_info+0x3b/0x50
[   26.640258]  __kasan_kmalloc+0xb7/0xc0
[   26.640662]  __kmalloc_cache_noprof+0x184/0x410
[   26.641151]  kasan_bitops_generic+0x93/0x1c0
[   26.641645]  kunit_try_run_case+0x1b3/0x490
[   26.642072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.642685]  kthread+0x324/0x6d0
[   26.643050]  ret_from_fork+0x41/0x80
[   26.643479]  ret_from_fork_asm+0x1a/0x30
[   26.643746] 
[   26.643912] The buggy address belongs to the object at ffff8881027b6360
[   26.643912]  which belongs to the cache kmalloc-16 of size 16
[   26.644858] The buggy address is located 8 bytes inside of
[   26.644858]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.645936] 
[   26.646252] The buggy address belongs to the physical page:
[   26.646696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.647382] flags: 0x200000000000000(node=0|zone=2)
[   26.647679] page_type: f5(slab)
[   26.648039] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.648780] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.649244] page dumped because: kasan: bad access detected
[   26.649538] 
[   26.649729] Memory state around the buggy address:
[   26.650286]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.650908]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.651571] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.654037]                                                           ^
[   26.654926]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.655624]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.656666] ==================================================================

test log snippet boot parser 31

[   26.575862] ==================================================================
[   26.576622] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   26.577249] Read of size 8 at addr ffff8881027b6368 by task kunit_try_catch/269
[   26.577893] 
[   26.578240] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   26.578393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.578452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.578513] Call Trace:
[   26.578553]  <TASK>
[   26.578603]  dump_stack_lvl+0x73/0xb0
[   26.578686]  print_report+0xd1/0x640
[   26.578744]  ? __virt_addr_valid+0x1db/0x2d0
[   26.578802]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.578870]  kasan_report+0x102/0x140
[   26.578923]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   26.579055]  ? kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   26.579293]  kasan_check_range+0x10c/0x1c0
[   26.579370]  __kasan_check_read+0x15/0x20
[   26.579433]  kasan_bitops_test_and_modify.constprop.0+0x558/0xd90
[   26.579507]  ? __pfx_kasan_bitops_test_and_modify.constprop.0+0x10/0x10
[   26.579574]  ? __kmalloc_cache_noprof+0x184/0x410
[   26.579652]  ? trace_hardirqs_on+0x37/0xe0
[   26.579687]  ? kasan_bitops_generic+0x93/0x1c0
[   26.579725]  kasan_bitops_generic+0x122/0x1c0
[   26.579755]  ? __pfx_kasan_bitops_generic+0x10/0x10
[   26.579790]  ? __pfx_read_tsc+0x10/0x10
[   26.579820]  ? ktime_get_ts64+0x86/0x230
[   26.579854]  kunit_try_run_case+0x1b3/0x490
[   26.579894]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.579923]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   26.579957]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.579989]  ? __kthread_parkme+0x82/0x160
[   26.580020]  ? preempt_count_sub+0x50/0x80
[   26.580057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.580102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.580186]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.580224]  kthread+0x324/0x6d0
[   26.580254]  ? trace_preempt_on+0x20/0xc0
[   26.580284]  ? __pfx_kthread+0x10/0x10
[   26.580315]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.580346]  ? calculate_sigpending+0x7b/0xa0
[   26.580375]  ? __pfx_kthread+0x10/0x10
[   26.580406]  ret_from_fork+0x41/0x80
[   26.580432]  ? __pfx_kthread+0x10/0x10
[   26.580462]  ret_from_fork_asm+0x1a/0x30
[   26.580509]  </TASK>
[   26.580526] 
[   26.596983] Allocated by task 269:
[   26.597521]  kasan_save_stack+0x3d/0x60
[   26.597969]  kasan_save_track+0x18/0x40
[   26.598360]  kasan_save_alloc_info+0x3b/0x50
[   26.598640]  __kasan_kmalloc+0xb7/0xc0
[   26.599003]  __kmalloc_cache_noprof+0x184/0x410
[   26.599483]  kasan_bitops_generic+0x93/0x1c0
[   26.599894]  kunit_try_run_case+0x1b3/0x490
[   26.600464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.600816]  kthread+0x324/0x6d0
[   26.601056]  ret_from_fork+0x41/0x80
[   26.601568]  ret_from_fork_asm+0x1a/0x30
[   26.601991] 
[   26.602322] The buggy address belongs to the object at ffff8881027b6360
[   26.602322]  which belongs to the cache kmalloc-16 of size 16
[   26.603406] The buggy address is located 8 bytes inside of
[   26.603406]  allocated 9-byte region [ffff8881027b6360, ffff8881027b6369)
[   26.603968] 
[   26.604182] The buggy address belongs to the physical page:
[   26.604685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   26.605517] flags: 0x200000000000000(node=0|zone=2)
[   26.606183] page_type: f5(slab)
[   26.606545] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   26.607398] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   26.608075] page dumped because: kasan: bad access detected
[   26.608433] 
[   26.608583] Memory state around the buggy address:
[   26.608850]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   26.609325]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   26.609963] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc
[   26.610658]                                                           ^
[   26.611446]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.612697]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.613353] ==================================================================

test log snippet boot parser 32

[   21.601000] ==================================================================
[   21.602132] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x318/0x370
[   21.603337] Write of size 1 at addr ffff888101fedf00 by task kunit_try_catch/152
[   21.603863] 
[   21.604056] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   21.604393] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.604435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.604524] Call Trace:
[   21.604561]  <TASK>
[   21.604607]  dump_stack_lvl+0x73/0xb0
[   21.604696]  print_report+0xd1/0x640
[   21.604746]  ? __virt_addr_valid+0x1db/0x2d0
[   21.604799]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.604866]  kasan_report+0x102/0x140
[   21.604914]  ? kmalloc_big_oob_right+0x318/0x370
[   21.604972]  ? kmalloc_big_oob_right+0x318/0x370
[   21.605038]  __asan_report_store1_noabort+0x1b/0x30
[   21.605142]  kmalloc_big_oob_right+0x318/0x370
[   21.605231]  ? __pfx_kmalloc_big_oob_right+0x10/0x10
[   21.605293]  ? __schedule+0xcdc/0x2830
[   21.605347]  ? __pfx_read_tsc+0x10/0x10
[   21.605397]  ? ktime_get_ts64+0x86/0x230
[   21.605458]  kunit_try_run_case+0x1b3/0x490
[   21.605519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.605572]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.605627]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.605677]  ? __kthread_parkme+0x82/0x160
[   21.605717]  ? preempt_count_sub+0x50/0x80
[   21.605753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.605784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.605820]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.605854]  kthread+0x324/0x6d0
[   21.605882]  ? trace_preempt_on+0x20/0xc0
[   21.605913]  ? __pfx_kthread+0x10/0x10
[   21.605942]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.605972]  ? calculate_sigpending+0x7b/0xa0
[   21.606001]  ? __pfx_kthread+0x10/0x10
[   21.606031]  ret_from_fork+0x41/0x80
[   21.606056]  ? __pfx_kthread+0x10/0x10
[   21.606085]  ret_from_fork_asm+0x1a/0x30
[   21.606197]  </TASK>
[   21.606223] 
[   21.618687] Allocated by task 152:
[   21.619246]  kasan_save_stack+0x3d/0x60
[   21.619647]  kasan_save_track+0x18/0x40
[   21.620200]  kasan_save_alloc_info+0x3b/0x50
[   21.620581]  __kasan_kmalloc+0xb7/0xc0
[   21.620926]  __kmalloc_cache_noprof+0x184/0x410
[   21.621381]  kmalloc_big_oob_right+0xaa/0x370
[   21.621901]  kunit_try_run_case+0x1b3/0x490
[   21.622405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.622926]  kthread+0x324/0x6d0
[   21.623351]  ret_from_fork+0x41/0x80
[   21.623738]  ret_from_fork_asm+0x1a/0x30
[   21.624231] 
[   21.624460] The buggy address belongs to the object at ffff888101fec000
[   21.624460]  which belongs to the cache kmalloc-8k of size 8192
[   21.625408] The buggy address is located 0 bytes to the right of
[   21.625408]  allocated 7936-byte region [ffff888101fec000, ffff888101fedf00)
[   21.626421] 
[   21.626780] The buggy address belongs to the physical page:
[   21.627515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101fe8
[   21.628391] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.628775] flags: 0x200000000000040(head|node=0|zone=2)
[   21.629110] page_type: f5(slab)
[   21.629491] raw: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   21.630297] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.631614] head: 0200000000000040 ffff888100042280 dead000000000122 0000000000000000
[   21.633908] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000
[   21.636607] head: 0200000000000003 ffffea000407fa01 ffffffffffffffff 0000000000000000
[   21.638002] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   21.639324] page dumped because: kasan: bad access detected
[   21.640969] 
[   21.641870] Memory state around the buggy address:
[   21.642619]  ffff888101fede00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.643921]  ffff888101fede80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.644999] >ffff888101fedf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.646311]                    ^
[   21.647035]  ffff888101fedf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.648079]  ffff888101fee000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.649481] ==================================================================

test log snippet boot parser 33

[   21.656694] ==================================================================
[   21.657472] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x2eb/0x340
[   21.658599] Write of size 1 at addr ffff88810232600a by task kunit_try_catch/154
[   21.660368] 
[   21.660968] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   21.661073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.661105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.661154] Call Trace:
[   21.661206]  <TASK>
[   21.661251]  dump_stack_lvl+0x73/0xb0
[   21.661348]  print_report+0xd1/0x640
[   21.661403]  ? __virt_addr_valid+0x1db/0x2d0
[   21.661459]  ? kasan_addr_to_slab+0x11/0xa0
[   21.661517]  kasan_report+0x102/0x140
[   21.661555]  ? kmalloc_large_oob_right+0x2eb/0x340
[   21.661592]  ? kmalloc_large_oob_right+0x2eb/0x340
[   21.661632]  __asan_report_store1_noabort+0x1b/0x30
[   21.661663]  kmalloc_large_oob_right+0x2eb/0x340
[   21.661695]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   21.661732]  ? __pfx_kmalloc_large_oob_right+0x10/0x10
[   21.661771]  kunit_try_run_case+0x1b3/0x490
[   21.661802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.661829]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.661862]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.661893]  ? __kthread_parkme+0x82/0x160
[   21.661923]  ? preempt_count_sub+0x50/0x80
[   21.661957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.661986]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.662019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.662052]  kthread+0x324/0x6d0
[   21.662079]  ? trace_preempt_on+0x20/0xc0
[   21.662218]  ? __pfx_kthread+0x10/0x10
[   21.662303]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.662365]  ? calculate_sigpending+0x7b/0xa0
[   21.662425]  ? __pfx_kthread+0x10/0x10
[   21.662483]  ret_from_fork+0x41/0x80
[   21.662536]  ? __pfx_kthread+0x10/0x10
[   21.662593]  ret_from_fork_asm+0x1a/0x30
[   21.662674]  </TASK>
[   21.662714] 
[   21.678933] The buggy address belongs to the physical page:
[   21.679729] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102324
[   21.680464] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.680984] flags: 0x200000000000040(head|node=0|zone=2)
[   21.682405] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.683419] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.684007] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   21.685198] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   21.685902] head: 0200000000000002 ffffea000408c901 ffffffffffffffff 0000000000000000
[   21.686701] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   21.687193] page dumped because: kasan: bad access detected
[   21.687601] 
[   21.687948] Memory state around the buggy address:
[   21.688788]  ffff888102325f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.690276]  ffff888102325f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.691090] >ffff888102326000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.692063]                       ^
[   21.692364]  ffff888102326080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.692971]  ffff888102326100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   21.694462] ==================================================================

test log snippet boot parser 34

[   21.445743] ==================================================================
[   21.446637] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x36b/0x3d0
[   21.447834] Read of size 1 at addr ffff888102c39000 by task kunit_try_catch/148
[   21.448500] 
[   21.448705] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   21.448815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.448846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.448906] Call Trace:
[   21.448936]  <TASK>
[   21.448976]  dump_stack_lvl+0x73/0xb0
[   21.449060]  print_report+0xd1/0x640
[   21.449115]  ? __virt_addr_valid+0x1db/0x2d0
[   21.449284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.449361]  kasan_report+0x102/0x140
[   21.449405]  ? kmalloc_node_oob_right+0x36b/0x3d0
[   21.449456]  ? kmalloc_node_oob_right+0x36b/0x3d0
[   21.449597]  __asan_report_load1_noabort+0x18/0x20
[   21.449704]  kmalloc_node_oob_right+0x36b/0x3d0
[   21.449817]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   21.449892]  ? __pfx_kmalloc_node_oob_right+0x10/0x10
[   21.449963]  kunit_try_run_case+0x1b3/0x490
[   21.450026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.450080]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.450145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.450228]  ? __kthread_parkme+0x82/0x160
[   21.450287]  ? preempt_count_sub+0x50/0x80
[   21.450353]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.450406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.450466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.450519]  kthread+0x324/0x6d0
[   21.450550]  ? trace_preempt_on+0x20/0xc0
[   21.450586]  ? __pfx_kthread+0x10/0x10
[   21.450615]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.450647]  ? calculate_sigpending+0x7b/0xa0
[   21.450677]  ? __pfx_kthread+0x10/0x10
[   21.450706]  ret_from_fork+0x41/0x80
[   21.450732]  ? __pfx_kthread+0x10/0x10
[   21.450761]  ret_from_fork_asm+0x1a/0x30
[   21.450805]  </TASK>
[   21.450822] 
[   21.468815] Allocated by task 148:
[   21.469151]  kasan_save_stack+0x3d/0x60
[   21.469972]  kasan_save_track+0x18/0x40
[   21.470687]  kasan_save_alloc_info+0x3b/0x50
[   21.471072]  __kasan_kmalloc+0xb7/0xc0
[   21.472024]  __kmalloc_cache_node_noprof+0x183/0x420
[   21.472391]  kmalloc_node_oob_right+0xac/0x3d0
[   21.473084]  kunit_try_run_case+0x1b3/0x490
[   21.473449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.473973]  kthread+0x324/0x6d0
[   21.474418]  ret_from_fork+0x41/0x80
[   21.475264]  ret_from_fork_asm+0x1a/0x30
[   21.475671] 
[   21.475903] The buggy address belongs to the object at ffff888102c38000
[   21.475903]  which belongs to the cache kmalloc-4k of size 4096
[   21.476765] The buggy address is located 0 bytes to the right of
[   21.476765]  allocated 4096-byte region [ffff888102c38000, ffff888102c39000)
[   21.477888] 
[   21.478116] The buggy address belongs to the physical page:
[   21.479620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c38
[   21.480998] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.481556] flags: 0x200000000000040(head|node=0|zone=2)
[   21.482512] page_type: f5(slab)
[   21.482757] raw: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   21.483482] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   21.484013] head: 0200000000000040 ffff888100042140 dead000000000122 0000000000000000
[   21.484710] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000
[   21.485882] head: 0200000000000003 ffffea00040b0e01 ffffffffffffffff 0000000000000000
[   21.486771] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[   21.487326] page dumped because: kasan: bad access detected
[   21.487695] 
[   21.487918] Memory state around the buggy address:
[   21.489017]  ffff888102c38f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.489833]  ffff888102c38f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.490537] >ffff888102c39000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.492033]                    ^
[   21.492520]  ffff888102c39080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.492738]  ffff888102c39100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.492940] ==================================================================

test log snippet boot parser 35

[   22.747639] ==================================================================
[   22.748789] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x160/0x320
[   22.749702] Write of size 128 at addr ffff888102a4ef00 by task kunit_try_catch/178
[   22.751010] 
[   22.751519] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   22.751607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.751626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.751659] Call Trace:
[   22.751677]  <TASK>
[   22.751703]  dump_stack_lvl+0x73/0xb0
[   22.751755]  print_report+0xd1/0x640
[   22.751784]  ? __virt_addr_valid+0x1db/0x2d0
[   22.751817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.751853]  kasan_report+0x102/0x140
[   22.751886]  ? kmalloc_oob_in_memset+0x160/0x320
[   22.751918]  ? kmalloc_oob_in_memset+0x160/0x320
[   22.751953]  kasan_check_range+0x10c/0x1c0
[   22.751982]  __asan_memset+0x27/0x50
[   22.752011]  kmalloc_oob_in_memset+0x160/0x320
[   22.752039]  ? __pfx_kmalloc_oob_in_memset+0x10/0x10
[   22.752068]  ? __schedule+0xcdc/0x2830
[   22.752109]  ? __pfx_read_tsc+0x10/0x10
[   22.752297]  ? ktime_get_ts64+0x86/0x230
[   22.752373]  kunit_try_run_case+0x1b3/0x490
[   22.752437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.752487]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.752546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.752596]  ? __kthread_parkme+0x82/0x160
[   22.752641]  ? preempt_count_sub+0x50/0x80
[   22.752690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.752721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.752758]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.752793]  kthread+0x324/0x6d0
[   22.752821]  ? trace_preempt_on+0x20/0xc0
[   22.752854]  ? __pfx_kthread+0x10/0x10
[   22.752883]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.752913]  ? calculate_sigpending+0x7b/0xa0
[   22.752943]  ? __pfx_kthread+0x10/0x10
[   22.752972]  ret_from_fork+0x41/0x80
[   22.752997]  ? __pfx_kthread+0x10/0x10
[   22.753026]  ret_from_fork_asm+0x1a/0x30
[   22.753070]  </TASK>
[   22.753087] 
[   22.772146] Allocated by task 178:
[   22.772736]  kasan_save_stack+0x3d/0x60
[   22.773380]  kasan_save_track+0x18/0x40
[   22.773893]  kasan_save_alloc_info+0x3b/0x50
[   22.774604]  __kasan_kmalloc+0xb7/0xc0
[   22.775119]  __kmalloc_cache_noprof+0x184/0x410
[   22.775752]  kmalloc_oob_in_memset+0xad/0x320
[   22.776406]  kunit_try_run_case+0x1b3/0x490
[   22.776942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.777622]  kthread+0x324/0x6d0
[   22.778903]  ret_from_fork+0x41/0x80
[   22.779238]  ret_from_fork_asm+0x1a/0x30
[   22.779620] 
[   22.780107] The buggy address belongs to the object at ffff888102a4ef00
[   22.780107]  which belongs to the cache kmalloc-128 of size 128
[   22.781699] The buggy address is located 0 bytes inside of
[   22.781699]  allocated 120-byte region [ffff888102a4ef00, ffff888102a4ef78)
[   22.782932] 
[   22.783788] The buggy address belongs to the physical page:
[   22.784139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a4e
[   22.785006] flags: 0x200000000000000(node=0|zone=2)
[   22.786183] page_type: f5(slab)
[   22.786725] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.788119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.788850] page dumped because: kasan: bad access detected
[   22.789399] 
[   22.790263] Memory state around the buggy address:
[   22.790716]  ffff888102a4ee00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.791380]  ffff888102a4ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.792388] >ffff888102a4ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.793124]                                                                 ^
[   22.794054]  ffff888102a4ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.794983]  ffff888102a4f000: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[   22.795426] ==================================================================

test log snippet boot parser 36

[   21.388654] ==================================================================
[   21.389148] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x363/0x3c0
[   21.390225] Read of size 1 at addr ffff8881027b62df by task kunit_try_catch/146
[   21.391303] 
[   21.391559] CPU: 1 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   21.391668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.391699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.391752] Call Trace:
[   21.391782]  <TASK>
[   21.391823]  dump_stack_lvl+0x73/0xb0
[   21.391926]  print_report+0xd1/0x640
[   21.391982]  ? __virt_addr_valid+0x1db/0x2d0
[   21.392040]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.392104]  kasan_report+0x102/0x140
[   21.392155]  ? kmalloc_oob_left+0x363/0x3c0
[   21.392229]  ? kmalloc_oob_left+0x363/0x3c0
[   21.392288]  __asan_report_load1_noabort+0x18/0x20
[   21.392347]  kmalloc_oob_left+0x363/0x3c0
[   21.392398]  ? __pfx_kmalloc_oob_left+0x10/0x10
[   21.392450]  ? __schedule+0xcdc/0x2830
[   21.392513]  ? __pfx_read_tsc+0x10/0x10
[   21.392605]  ? ktime_get_ts64+0x86/0x230
[   21.392675]  kunit_try_run_case+0x1b3/0x490
[   21.392712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.392740]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.392774]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.392807]  ? __kthread_parkme+0x82/0x160
[   21.392837]  ? preempt_count_sub+0x50/0x80
[   21.392871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.392900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.392935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.392969]  kthread+0x324/0x6d0
[   21.392997]  ? trace_preempt_on+0x20/0xc0
[   21.393028]  ? __pfx_kthread+0x10/0x10
[   21.393057]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.393086]  ? calculate_sigpending+0x7b/0xa0
[   21.393147]  ? __pfx_kthread+0x10/0x10
[   21.393202]  ret_from_fork+0x41/0x80
[   21.393228]  ? __pfx_kthread+0x10/0x10
[   21.393266]  ret_from_fork_asm+0x1a/0x30
[   21.393364]  </TASK>
[   21.393386] 
[   21.411794] Allocated by task 1:
[   21.412395]  kasan_save_stack+0x3d/0x60
[   21.413067]  kasan_save_track+0x18/0x40
[   21.413872]  kasan_save_alloc_info+0x3b/0x50
[   21.414589]  __kasan_kmalloc+0xb7/0xc0
[   21.415241]  __kmalloc_node_track_caller_noprof+0x1c6/0x500
[   21.415952]  kvasprintf+0xc6/0x150
[   21.416365]  __kthread_create_on_node+0x18c/0x3a0
[   21.417266]  kthread_create_on_node+0xa8/0xe0
[   21.417665]  create_worker+0x3c8/0x7a0
[   21.418018]  alloc_unbound_pwq+0x8ea/0xdb0
[   21.419017]  apply_wqattrs_prepare+0x332/0xd40
[   21.419428]  apply_workqueue_attrs_locked+0x4d/0xa0
[   21.419681]  alloc_workqueue+0xcc4/0x1ad0
[   21.420008]  latency_fsnotify_init+0x1b/0x50
[   21.420507]  do_one_initcall+0xb5/0x370
[   21.421675]  kernel_init_freeable+0x425/0x6f0
[   21.422142]  kernel_init+0x23/0x1e0
[   21.422639]  ret_from_fork+0x41/0x80
[   21.423365]  ret_from_fork_asm+0x1a/0x30
[   21.424092] 
[   21.424380] The buggy address belongs to the object at ffff8881027b62c0
[   21.424380]  which belongs to the cache kmalloc-16 of size 16
[   21.426410] The buggy address is located 18 bytes to the right of
[   21.426410]  allocated 13-byte region [ffff8881027b62c0, ffff8881027b62cd)
[   21.427679] 
[   21.427929] The buggy address belongs to the physical page:
[   21.428566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   21.429145] flags: 0x200000000000000(node=0|zone=2)
[   21.429770] page_type: f5(slab)
[   21.430112] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   21.431024] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   21.432003] page dumped because: kasan: bad access detected
[   21.432382] 
[   21.432711] Memory state around the buggy address:
[   21.433732]  ffff8881027b6180: 00 05 fc fc 00 02 fc fc 00 03 fc fc fa fb fc fc
[   21.434412]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   21.435075] >ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc 00 07 fc fc
[   21.435847]                                                     ^
[   21.436454]  ffff8881027b6300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.437126]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.437867] ==================================================================

test log snippet boot parser 37

[   22.803018] ==================================================================
[   22.803854] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x167/0x330
[   22.805439] Write of size 2 at addr ffff888101b88a77 by task kunit_try_catch/180
[   22.806090] 
[   22.806304] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   22.806416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.806447] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.806480] Call Trace:
[   22.806499]  <TASK>
[   22.806526]  dump_stack_lvl+0x73/0xb0
[   22.806581]  print_report+0xd1/0x640
[   22.806632]  ? __virt_addr_valid+0x1db/0x2d0
[   22.806668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.806704]  kasan_report+0x102/0x140
[   22.806730]  ? kmalloc_oob_memset_2+0x167/0x330
[   22.806759]  ? kmalloc_oob_memset_2+0x167/0x330
[   22.806793]  kasan_check_range+0x10c/0x1c0
[   22.806822]  __asan_memset+0x27/0x50
[   22.806851]  kmalloc_oob_memset_2+0x167/0x330
[   22.806880]  ? __pfx_kmalloc_oob_memset_2+0x10/0x10
[   22.806909]  ? __schedule+0xcdc/0x2830
[   22.806939]  ? __pfx_read_tsc+0x10/0x10
[   22.806968]  ? ktime_get_ts64+0x86/0x230
[   22.807002]  kunit_try_run_case+0x1b3/0x490
[   22.807033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.807060]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.807096]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.807454]  ? __kthread_parkme+0x82/0x160
[   22.807521]  ? preempt_count_sub+0x50/0x80
[   22.807587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.807645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.807713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.807779]  kthread+0x324/0x6d0
[   22.807814]  ? trace_preempt_on+0x20/0xc0
[   22.807850]  ? __pfx_kthread+0x10/0x10
[   22.807892]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.807924]  ? calculate_sigpending+0x7b/0xa0
[   22.807955]  ? __pfx_kthread+0x10/0x10
[   22.807985]  ret_from_fork+0x41/0x80
[   22.808010]  ? __pfx_kthread+0x10/0x10
[   22.808039]  ret_from_fork_asm+0x1a/0x30
[   22.808083]  </TASK>
[   22.808124] 
[   22.823318] Allocated by task 180:
[   22.823769]  kasan_save_stack+0x3d/0x60
[   22.824346]  kasan_save_track+0x18/0x40
[   22.824605]  kasan_save_alloc_info+0x3b/0x50
[   22.825313]  __kasan_kmalloc+0xb7/0xc0
[   22.825928]  __kmalloc_cache_noprof+0x184/0x410
[   22.826629]  kmalloc_oob_memset_2+0xad/0x330
[   22.827061]  kunit_try_run_case+0x1b3/0x490
[   22.827723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.828126]  kthread+0x324/0x6d0
[   22.828866]  ret_from_fork+0x41/0x80
[   22.829523]  ret_from_fork_asm+0x1a/0x30
[   22.830308] 
[   22.830524] The buggy address belongs to the object at ffff888101b88a00
[   22.830524]  which belongs to the cache kmalloc-128 of size 128
[   22.831814] The buggy address is located 119 bytes inside of
[   22.831814]  allocated 120-byte region [ffff888101b88a00, ffff888101b88a78)
[   22.832824] 
[   22.833060] The buggy address belongs to the physical page:
[   22.833522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b88
[   22.834084] flags: 0x200000000000000(node=0|zone=2)
[   22.835316] page_type: f5(slab)
[   22.835647] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   22.836140] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.836792] page dumped because: kasan: bad access detected
[   22.837437] 
[   22.837649] Memory state around the buggy address:
[   22.838053]  ffff888101b88900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.838865]  ffff888101b88980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.839795] >ffff888101b88a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   22.841150]                                                                 ^
[   22.841987]  ffff888101b88a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.842956]  ffff888101b88b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.844474] ==================================================================

test log snippet boot parser 38

[   23.850041] ==================================================================
[   23.850795] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x404/0x530
[   23.851514] Read of size 1 at addr ffff888101b9d0c8 by task kunit_try_catch/215
[   23.852293] 
[   23.852499] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   23.852663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.852724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.852783] Call Trace:
[   23.852816]  <TASK>
[   23.852857]  dump_stack_lvl+0x73/0xb0
[   23.852946]  print_report+0xd1/0x640
[   23.853053]  ? __virt_addr_valid+0x1db/0x2d0
[   23.853197]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.853311]  kasan_report+0x102/0x140
[   23.853418]  ? kmem_cache_oob+0x404/0x530
[   23.853507]  ? kmem_cache_oob+0x404/0x530
[   23.853577]  __asan_report_load1_noabort+0x18/0x20
[   23.853639]  kmem_cache_oob+0x404/0x530
[   23.853691]  ? trace_hardirqs_on+0x37/0xe0
[   23.853753]  ? __pfx_kmem_cache_oob+0x10/0x10
[   23.853802]  ? finish_task_switch.isra.0+0x153/0x700
[   23.853862]  ? __switch_to+0x5d9/0xf60
[   23.853987]  ? __pfx_read_tsc+0x10/0x10
[   23.854086]  ? ktime_get_ts64+0x86/0x230
[   23.854210]  kunit_try_run_case+0x1b3/0x490
[   23.854362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.854448]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.854515]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.854573]  ? __kthread_parkme+0x82/0x160
[   23.854631]  ? preempt_count_sub+0x50/0x80
[   23.854695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.854732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.854770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.854805]  kthread+0x324/0x6d0
[   23.854833]  ? trace_preempt_on+0x20/0xc0
[   23.854864]  ? __pfx_kthread+0x10/0x10
[   23.854894]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.854924]  ? calculate_sigpending+0x7b/0xa0
[   23.854954]  ? __pfx_kthread+0x10/0x10
[   23.854984]  ret_from_fork+0x41/0x80
[   23.855009]  ? __pfx_kthread+0x10/0x10
[   23.855038]  ret_from_fork_asm+0x1a/0x30
[   23.855083]  </TASK>
[   23.855124] 
[   23.871348] Allocated by task 215:
[   23.871862]  kasan_save_stack+0x3d/0x60
[   23.872563]  kasan_save_track+0x18/0x40
[   23.872998]  kasan_save_alloc_info+0x3b/0x50
[   23.873652]  __kasan_slab_alloc+0x91/0xa0
[   23.874133]  kmem_cache_alloc_noprof+0x11e/0x3f0
[   23.874744]  kmem_cache_oob+0x158/0x530
[   23.875147]  kunit_try_run_case+0x1b3/0x490
[   23.875620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.876071]  kthread+0x324/0x6d0
[   23.876498]  ret_from_fork+0x41/0x80
[   23.876883]  ret_from_fork_asm+0x1a/0x30
[   23.877519] 
[   23.877762] The buggy address belongs to the object at ffff888101b9d000
[   23.877762]  which belongs to the cache test_cache of size 200
[   23.878892] The buggy address is located 0 bytes to the right of
[   23.878892]  allocated 200-byte region [ffff888101b9d000, ffff888101b9d0c8)
[   23.879500] 
[   23.879700] The buggy address belongs to the physical page:
[   23.880006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b9d
[   23.880694] flags: 0x200000000000000(node=0|zone=2)
[   23.881269] page_type: f5(slab)
[   23.881751] raw: 0200000000000000 ffff888101ae7140 dead000000000122 0000000000000000
[   23.882527] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   23.883313] page dumped because: kasan: bad access detected
[   23.883999] 
[   23.884441] Memory state around the buggy address:
[   23.884949]  ffff888101b9cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.885851]  ffff888101b9d000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   23.886729] >ffff888101b9d080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc
[   23.887612]                                               ^
[   23.888236]  ffff888101b9d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.889071]  ffff888101b9d180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.890111] ==================================================================

test log snippet boot parser 39

[   21.995119] ==================================================================
[   21.996577] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe25/0x11d0
[   21.997516] Write of size 1 at addr ffff8881003aaad0 by task kunit_try_catch/166
[   21.998417] 
[   21.998734] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   21.998845] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.998875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.998946] Call Trace:
[   21.999004]  <TASK>
[   21.999049]  dump_stack_lvl+0x73/0xb0
[   21.999182]  print_report+0xd1/0x640
[   21.999218]  ? __virt_addr_valid+0x1db/0x2d0
[   21.999252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.999401]  kasan_report+0x102/0x140
[   21.999443]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   21.999489]  ? krealloc_less_oob_helper+0xe25/0x11d0
[   21.999586]  __asan_report_store1_noabort+0x1b/0x30
[   21.999640]  krealloc_less_oob_helper+0xe25/0x11d0
[   21.999690]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.999733]  ? finish_task_switch.isra.0+0x153/0x700
[   21.999783]  ? __switch_to+0x5d9/0xf60
[   21.999829]  ? __schedule+0xcdc/0x2830
[   21.999861]  ? __pfx_read_tsc+0x10/0x10
[   21.999910]  krealloc_less_oob+0x1c/0x30
[   21.999939]  kunit_try_run_case+0x1b3/0x490
[   21.999969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.999996]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.000027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.000058]  ? __kthread_parkme+0x82/0x160
[   22.000088]  ? preempt_count_sub+0x50/0x80
[   22.000119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.000148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.000202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.000236]  kthread+0x324/0x6d0
[   22.000264]  ? trace_preempt_on+0x20/0xc0
[   22.000296]  ? __pfx_kthread+0x10/0x10
[   22.000325]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.000354]  ? calculate_sigpending+0x7b/0xa0
[   22.000383]  ? __pfx_kthread+0x10/0x10
[   22.000413]  ret_from_fork+0x41/0x80
[   22.000437]  ? __pfx_kthread+0x10/0x10
[   22.000466]  ret_from_fork_asm+0x1a/0x30
[   22.000509]  </TASK>
[   22.000524] 
[   22.018672] Allocated by task 166:
[   22.019427]  kasan_save_stack+0x3d/0x60
[   22.019899]  kasan_save_track+0x18/0x40
[   22.020583]  kasan_save_alloc_info+0x3b/0x50
[   22.021136]  __kasan_krealloc+0x190/0x1f0
[   22.021799]  krealloc_noprof+0xf3/0x340
[   22.022375]  krealloc_less_oob_helper+0x1ab/0x11d0
[   22.023429]  krealloc_less_oob+0x1c/0x30
[   22.023713]  kunit_try_run_case+0x1b3/0x490
[   22.024129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.024783]  kthread+0x324/0x6d0
[   22.025106]  ret_from_fork+0x41/0x80
[   22.025617]  ret_from_fork_asm+0x1a/0x30
[   22.026192] 
[   22.026415] The buggy address belongs to the object at ffff8881003aaa00
[   22.026415]  which belongs to the cache kmalloc-256 of size 256
[   22.027242] The buggy address is located 7 bytes to the right of
[   22.027242]  allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[   22.028519] 
[   22.028911] The buggy address belongs to the physical page:
[   22.029227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[   22.029945] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.031738] flags: 0x200000000000040(head|node=0|zone=2)
[   22.032539] page_type: f5(slab)
[   22.033042] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.033930] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.034979] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.035923] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.037109] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[   22.037527] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.038048] page dumped because: kasan: bad access detected
[   22.038729] 
[   22.039017] Memory state around the buggy address:
[   22.039793]  ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.040733]  ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.041036] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.041497]                                                  ^
[   22.042284]  ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.042886]  ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.044009] ==================================================================

test log snippet boot parser 40

[   22.045897] ==================================================================
[   22.046519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xec8/0x11d0
[   22.048121] Write of size 1 at addr ffff8881003aaada by task kunit_try_catch/166
[   22.048934] 
[   22.049116] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   22.049243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.049280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.049331] Call Trace:
[   22.049368]  <TASK>
[   22.049408]  dump_stack_lvl+0x73/0xb0
[   22.049492]  print_report+0xd1/0x640
[   22.049548]  ? __virt_addr_valid+0x1db/0x2d0
[   22.049606]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.049669]  kasan_report+0x102/0x140
[   22.049722]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   22.049781]  ? krealloc_less_oob_helper+0xec8/0x11d0
[   22.049846]  __asan_report_store1_noabort+0x1b/0x30
[   22.049902]  krealloc_less_oob_helper+0xec8/0x11d0
[   22.049963]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.050018]  ? finish_task_switch.isra.0+0x153/0x700
[   22.050077]  ? __switch_to+0x5d9/0xf60
[   22.050144]  ? __schedule+0xcdc/0x2830
[   22.050251]  ? __pfx_read_tsc+0x10/0x10
[   22.050339]  krealloc_less_oob+0x1c/0x30
[   22.050397]  kunit_try_run_case+0x1b3/0x490
[   22.050431]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.050460]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.050492]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.050523]  ? __kthread_parkme+0x82/0x160
[   22.050555]  ? preempt_count_sub+0x50/0x80
[   22.050588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.050617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.050651]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.050685]  kthread+0x324/0x6d0
[   22.050712]  ? trace_preempt_on+0x20/0xc0
[   22.050744]  ? __pfx_kthread+0x10/0x10
[   22.050773]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.050802]  ? calculate_sigpending+0x7b/0xa0
[   22.050831]  ? __pfx_kthread+0x10/0x10
[   22.050860]  ret_from_fork+0x41/0x80
[   22.050885]  ? __pfx_kthread+0x10/0x10
[   22.050914]  ret_from_fork_asm+0x1a/0x30
[   22.050957]  </TASK>
[   22.050972] 
[   22.072436] Allocated by task 166:
[   22.072820]  kasan_save_stack+0x3d/0x60
[   22.073594]  kasan_save_track+0x18/0x40
[   22.074043]  kasan_save_alloc_info+0x3b/0x50
[   22.074623]  __kasan_krealloc+0x190/0x1f0
[   22.074893]  krealloc_noprof+0xf3/0x340
[   22.075116]  krealloc_less_oob_helper+0x1ab/0x11d0
[   22.075423]  krealloc_less_oob+0x1c/0x30
[   22.075944]  kunit_try_run_case+0x1b3/0x490
[   22.076852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.077570]  kthread+0x324/0x6d0
[   22.078105]  ret_from_fork+0x41/0x80
[   22.079314]  ret_from_fork_asm+0x1a/0x30
[   22.080005] 
[   22.080306] The buggy address belongs to the object at ffff8881003aaa00
[   22.080306]  which belongs to the cache kmalloc-256 of size 256
[   22.080970] The buggy address is located 17 bytes to the right of
[   22.080970]  allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[   22.081968] 
[   22.082252] The buggy address belongs to the physical page:
[   22.082746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[   22.083780] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.084394] flags: 0x200000000000040(head|node=0|zone=2)
[   22.084911] page_type: f5(slab)
[   22.085594] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.086789] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.087605] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.088236] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.089214] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[   22.089595] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.090715] page dumped because: kasan: bad access detected
[   22.091145] 
[   22.091775] Memory state around the buggy address:
[   22.092483]  ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.092881]  ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.093530] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.094213]                                                     ^
[   22.094992]  ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.095723]  ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.096840] ==================================================================

test log snippet boot parser 41

[   21.945753] ==================================================================
[   21.946358] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd72/0x11d0
[   21.947608] Write of size 1 at addr ffff8881003aaac9 by task kunit_try_catch/166
[   21.948801] 
[   21.949351] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   21.949465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.949706] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.949764] Call Trace:
[   21.949811]  <TASK>
[   21.949856]  dump_stack_lvl+0x73/0xb0
[   21.949945]  print_report+0xd1/0x640
[   21.949997]  ? __virt_addr_valid+0x1db/0x2d0
[   21.950043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.950080]  kasan_report+0x102/0x140
[   21.950120]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   21.950156]  ? krealloc_less_oob_helper+0xd72/0x11d0
[   21.950245]  __asan_report_store1_noabort+0x1b/0x30
[   21.950394]  krealloc_less_oob_helper+0xd72/0x11d0
[   21.950432]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   21.950463]  ? finish_task_switch.isra.0+0x153/0x700
[   21.950499]  ? __switch_to+0x5d9/0xf60
[   21.950535]  ? __schedule+0xcdc/0x2830
[   21.950567]  ? __pfx_read_tsc+0x10/0x10
[   21.950601]  krealloc_less_oob+0x1c/0x30
[   21.950627]  kunit_try_run_case+0x1b3/0x490
[   21.950658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.950685]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.950716]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.950747]  ? __kthread_parkme+0x82/0x160
[   21.950777]  ? preempt_count_sub+0x50/0x80
[   21.950809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.950838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.950871]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.950904]  kthread+0x324/0x6d0
[   21.950931]  ? trace_preempt_on+0x20/0xc0
[   21.950963]  ? __pfx_kthread+0x10/0x10
[   21.950992]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.951021]  ? calculate_sigpending+0x7b/0xa0
[   21.951051]  ? __pfx_kthread+0x10/0x10
[   21.951081]  ret_from_fork+0x41/0x80
[   21.951117]  ? __pfx_kthread+0x10/0x10
[   21.951151]  ret_from_fork_asm+0x1a/0x30
[   21.951218]  </TASK>
[   21.951235] 
[   21.969821] Allocated by task 166:
[   21.970400]  kasan_save_stack+0x3d/0x60
[   21.970864]  kasan_save_track+0x18/0x40
[   21.971392]  kasan_save_alloc_info+0x3b/0x50
[   21.971719]  __kasan_krealloc+0x190/0x1f0
[   21.971995]  krealloc_noprof+0xf3/0x340
[   21.973014]  krealloc_less_oob_helper+0x1ab/0x11d0
[   21.973505]  krealloc_less_oob+0x1c/0x30
[   21.973909]  kunit_try_run_case+0x1b3/0x490
[   21.974345]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.974705]  kthread+0x324/0x6d0
[   21.974943]  ret_from_fork+0x41/0x80
[   21.975214]  ret_from_fork_asm+0x1a/0x30
[   21.975630] 
[   21.975840] The buggy address belongs to the object at ffff8881003aaa00
[   21.975840]  which belongs to the cache kmalloc-256 of size 256
[   21.977411] The buggy address is located 0 bytes to the right of
[   21.977411]  allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[   21.978428] 
[   21.978662] The buggy address belongs to the physical page:
[   21.979148] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[   21.980520] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   21.981544] flags: 0x200000000000040(head|node=0|zone=2)
[   21.982060] page_type: f5(slab)
[   21.982855] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.983273] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.983646] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   21.985568] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   21.986390] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[   21.986806] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   21.987757] page dumped because: kasan: bad access detected
[   21.988431] 
[   21.988643] Memory state around the buggy address:
[   21.989057]  ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.989747]  ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.990519] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   21.990980]                                               ^
[   21.991499]  ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.992936]  ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.993648] ==================================================================

test log snippet boot parser 42

[   22.098763] ==================================================================
[   22.099816] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xe92/0x11d0
[   22.101208] Write of size 1 at addr ffff8881003aaaea by task kunit_try_catch/166
[   22.102340] 
[   22.102610] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   22.102722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.102754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.102808] Call Trace:
[   22.102844]  <TASK>
[   22.102889]  dump_stack_lvl+0x73/0xb0
[   22.103019]  print_report+0xd1/0x640
[   22.103220]  ? __virt_addr_valid+0x1db/0x2d0
[   22.103369]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.103412]  kasan_report+0x102/0x140
[   22.103441]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   22.103474]  ? krealloc_less_oob_helper+0xe92/0x11d0
[   22.103511]  __asan_report_store1_noabort+0x1b/0x30
[   22.103542]  krealloc_less_oob_helper+0xe92/0x11d0
[   22.103575]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.103605]  ? finish_task_switch.isra.0+0x153/0x700
[   22.103637]  ? __switch_to+0x5d9/0xf60
[   22.103672]  ? __schedule+0xcdc/0x2830
[   22.103703]  ? __pfx_read_tsc+0x10/0x10
[   22.103737]  krealloc_less_oob+0x1c/0x30
[   22.103763]  kunit_try_run_case+0x1b3/0x490
[   22.103793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.103820]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.103851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.103894]  ? __kthread_parkme+0x82/0x160
[   22.103924]  ? preempt_count_sub+0x50/0x80
[   22.103956]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.103985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.104018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.104051]  kthread+0x324/0x6d0
[   22.104078]  ? trace_preempt_on+0x20/0xc0
[   22.104125]  ? __pfx_kthread+0x10/0x10
[   22.104174]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.104208]  ? calculate_sigpending+0x7b/0xa0
[   22.104239]  ? __pfx_kthread+0x10/0x10
[   22.104313]  ret_from_fork+0x41/0x80
[   22.104358]  ? __pfx_kthread+0x10/0x10
[   22.104402]  ret_from_fork_asm+0x1a/0x30
[   22.104463]  </TASK>
[   22.104486] 
[   22.122889] Allocated by task 166:
[   22.123126]  kasan_save_stack+0x3d/0x60
[   22.123904]  kasan_save_track+0x18/0x40
[   22.124754]  kasan_save_alloc_info+0x3b/0x50
[   22.125478]  __kasan_krealloc+0x190/0x1f0
[   22.125876]  krealloc_noprof+0xf3/0x340
[   22.126675]  krealloc_less_oob_helper+0x1ab/0x11d0
[   22.127305]  krealloc_less_oob+0x1c/0x30
[   22.127761]  kunit_try_run_case+0x1b3/0x490
[   22.128251]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.128637]  kthread+0x324/0x6d0
[   22.129846]  ret_from_fork+0x41/0x80
[   22.130543]  ret_from_fork_asm+0x1a/0x30
[   22.130791] 
[   22.131376] The buggy address belongs to the object at ffff8881003aaa00
[   22.131376]  which belongs to the cache kmalloc-256 of size 256
[   22.132389] The buggy address is located 33 bytes to the right of
[   22.132389]  allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[   22.134071] 
[   22.134321] The buggy address belongs to the physical page:
[   22.135119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[   22.135610] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.136704] flags: 0x200000000000040(head|node=0|zone=2)
[   22.137612] page_type: f5(slab)
[   22.137925] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.138820] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.139875] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.140420] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.141056] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[   22.142315] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.143043] page dumped because: kasan: bad access detected
[   22.143766] 
[   22.144001] Memory state around the buggy address:
[   22.144483]  ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.145504]  ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.146424] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.147397]                                                           ^
[   22.147817]  ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.148746]  ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.149481] ==================================================================
---
[   22.150896] ==================================================================
[   22.151646] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xd49/0x11d0
[   22.152061] Write of size 1 at addr ffff8881003aaaeb by task kunit_try_catch/166
[   22.152797] 
[   22.153472] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   22.153584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.153617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.153673] Call Trace:
[   22.153712]  <TASK>
[   22.153755]  dump_stack_lvl+0x73/0xb0
[   22.153868]  print_report+0xd1/0x640
[   22.153944]  ? __virt_addr_valid+0x1db/0x2d0
[   22.154005]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.154074]  kasan_report+0x102/0x140
[   22.154124]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   22.154204]  ? krealloc_less_oob_helper+0xd49/0x11d0
[   22.154276]  __asan_report_store1_noabort+0x1b/0x30
[   22.154361]  krealloc_less_oob_helper+0xd49/0x11d0
[   22.154423]  ? __pfx_krealloc_less_oob_helper+0x10/0x10
[   22.154478]  ? finish_task_switch.isra.0+0x153/0x700
[   22.154540]  ? __switch_to+0x5d9/0xf60
[   22.154606]  ? __schedule+0xcdc/0x2830
[   22.154656]  ? __pfx_read_tsc+0x10/0x10
[   22.154719]  krealloc_less_oob+0x1c/0x30
[   22.154772]  kunit_try_run_case+0x1b3/0x490
[   22.154830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.154882]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.154943]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.155000]  ? __kthread_parkme+0x82/0x160
[   22.155053]  ? preempt_count_sub+0x50/0x80
[   22.155113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.155516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.155588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.155654]  kthread+0x324/0x6d0
[   22.155708]  ? trace_preempt_on+0x20/0xc0
[   22.155777]  ? __pfx_kthread+0x10/0x10
[   22.155810]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.155844]  ? calculate_sigpending+0x7b/0xa0
[   22.155874]  ? __pfx_kthread+0x10/0x10
[   22.155916]  ret_from_fork+0x41/0x80
[   22.155942]  ? __pfx_kthread+0x10/0x10
[   22.155971]  ret_from_fork_asm+0x1a/0x30
[   22.156015]  </TASK>
[   22.156031] 
[   22.181467] Allocated by task 166:
[   22.183656]  kasan_save_stack+0x3d/0x60
[   22.185088]  kasan_save_track+0x18/0x40
[   22.185619]  kasan_save_alloc_info+0x3b/0x50
[   22.185886]  __kasan_krealloc+0x190/0x1f0
[   22.186069]  krealloc_noprof+0xf3/0x340
[   22.186276]  krealloc_less_oob_helper+0x1ab/0x11d0
[   22.186541]  krealloc_less_oob+0x1c/0x30
[   22.187246]  kunit_try_run_case+0x1b3/0x490
[   22.187847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.188648]  kthread+0x324/0x6d0
[   22.189149]  ret_from_fork+0x41/0x80
[   22.189727]  ret_from_fork_asm+0x1a/0x30
[   22.190900] 
[   22.191071] The buggy address belongs to the object at ffff8881003aaa00
[   22.191071]  which belongs to the cache kmalloc-256 of size 256
[   22.192077] The buggy address is located 34 bytes to the right of
[   22.192077]  allocated 201-byte region [ffff8881003aaa00, ffff8881003aaac9)
[   22.193604] 
[   22.193892] The buggy address belongs to the physical page:
[   22.194557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[   22.195083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.195769] flags: 0x200000000000040(head|node=0|zone=2)
[   22.196507] page_type: f5(slab)
[   22.197001] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.197702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.198676] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.199315] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.200857] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[   22.201617] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.201846] page dumped because: kasan: bad access detected
[   22.202012] 
[   22.202090] Memory state around the buggy address:
[   22.202952]  ffff8881003aa980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.204104]  ffff8881003aaa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   22.204762] >ffff8881003aaa80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc
[   22.206300]                                                           ^
[   22.207460]  ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.208104]  ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.208909] ==================================================================

test log snippet boot parser 43

[   24.835946] ==================================================================
[   24.836854] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x31a/0x380
[   24.837676] Read of size 1 at addr ffff888102d62001 by task kunit_try_catch/231
[   24.838989] 
[   24.840118] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   24.840273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.840310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.840371] Call Trace:
[   24.840406]  <TASK>
[   24.840451]  dump_stack_lvl+0x73/0xb0
[   24.840543]  print_report+0xd1/0x640
[   24.840683]  ? __virt_addr_valid+0x1db/0x2d0
[   24.840724]  ? kasan_addr_to_slab+0x11/0xa0
[   24.840760]  kasan_report+0x102/0x140
[   24.840788]  ? mempool_oob_right_helper+0x31a/0x380
[   24.840822]  ? mempool_oob_right_helper+0x31a/0x380
[   24.840859]  __asan_report_load1_noabort+0x18/0x20
[   24.840890]  mempool_oob_right_helper+0x31a/0x380
[   24.840923]  ? __pfx_mempool_oob_right_helper+0x10/0x10
[   24.840960]  ? finish_task_switch.isra.0+0x153/0x700
[   24.840999]  mempool_kmalloc_large_oob_right+0xb6/0x100
[   24.841030]  ? __pfx_mempool_kmalloc_large_oob_right+0x10/0x10
[   24.841062]  ? __switch_to+0x5d9/0xf60
[   24.841105]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.841148]  ? __pfx_mempool_kfree+0x10/0x10
[   24.841205]  ? __pfx_read_tsc+0x10/0x10
[   24.841237]  ? ktime_get_ts64+0x86/0x230
[   24.841282]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.841362]  kunit_try_run_case+0x1b3/0x490
[   24.841404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.841433]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.841466]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.841500]  ? __kthread_parkme+0x82/0x160
[   24.841533]  ? preempt_count_sub+0x50/0x80
[   24.841566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.841596]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.841632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.841668]  kthread+0x324/0x6d0
[   24.841697]  ? trace_preempt_on+0x20/0xc0
[   24.841731]  ? __pfx_kthread+0x10/0x10
[   24.841761]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.841792]  ? calculate_sigpending+0x7b/0xa0
[   24.841823]  ? __pfx_kthread+0x10/0x10
[   24.841854]  ret_from_fork+0x41/0x80
[   24.841880]  ? __pfx_kthread+0x10/0x10
[   24.841910]  ret_from_fork_asm+0x1a/0x30
[   24.841955]  </TASK>
[   24.841972] 
[   24.863448] The buggy address belongs to the physical page:
[   24.864014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d60
[   24.868751] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   24.869189] flags: 0x200000000000040(head|node=0|zone=2)
[   24.869531] raw: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.871433] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.871850] head: 0200000000000040 0000000000000000 dead000000000122 0000000000000000
[   24.872246] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   24.872610] head: 0200000000000002 ffffea00040b5801 ffffffffffffffff 0000000000000000
[   24.872975] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000
[   24.875378] page dumped because: kasan: bad access detected
[   24.876285] 
[   24.876447] Memory state around the buggy address:
[   24.877397]  ffff888102d61f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.878609]  ffff888102d61f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   24.879660] >ffff888102d62000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.880276]                    ^
[   24.880862]  ffff888102d62080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.881911]  ffff888102d62100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe
[   24.882669] ==================================================================

test log snippet boot parser 44

[   29.899916] ==================================================================
[   29.900895] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x2e/0x1d0
[   29.901473] Write of size 121 at addr ffff888101bab200 by task kunit_try_catch/293
[   29.901855] 
[   29.902081] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   29.902224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.902255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.902309] Call Trace:
[   29.902348]  <TASK>
[   29.902392]  dump_stack_lvl+0x73/0xb0
[   29.902477]  print_report+0xd1/0x640
[   29.902532]  ? __virt_addr_valid+0x1db/0x2d0
[   29.902598]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.902677]  kasan_report+0x102/0x140
[   29.902726]  ? strncpy_from_user+0x2e/0x1d0
[   29.902795]  ? strncpy_from_user+0x2e/0x1d0
[   29.902873]  kasan_check_range+0x10c/0x1c0
[   29.902939]  __kasan_check_write+0x18/0x20
[   29.903002]  strncpy_from_user+0x2e/0x1d0
[   29.903066]  ? __kasan_check_read+0x15/0x20
[   29.903128]  copy_user_test_oob+0x761/0x10f0
[   29.903222]  ? __pfx_copy_user_test_oob+0x10/0x10
[   29.903280]  ? finish_task_switch.isra.0+0x153/0x700
[   29.903342]  ? __switch_to+0x5d9/0xf60
[   29.903416]  ? __schedule+0xcdc/0x2830
[   29.903481]  ? __pfx_read_tsc+0x10/0x10
[   29.903533]  ? ktime_get_ts64+0x86/0x230
[   29.903602]  kunit_try_run_case+0x1b3/0x490
[   29.903662]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.903716]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   29.903779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.903843]  ? __kthread_parkme+0x82/0x160
[   29.903915]  ? preempt_count_sub+0x50/0x80
[   29.903983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.904042]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.904107]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.904245]  kthread+0x324/0x6d0
[   29.904338]  ? trace_preempt_on+0x20/0xc0
[   29.904382]  ? __pfx_kthread+0x10/0x10
[   29.904416]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.904451]  ? calculate_sigpending+0x7b/0xa0
[   29.904506]  ? __pfx_kthread+0x10/0x10
[   29.904569]  ret_from_fork+0x41/0x80
[   29.904618]  ? __pfx_kthread+0x10/0x10
[   29.904671]  ret_from_fork_asm+0x1a/0x30
[   29.904757]  </TASK>
[   29.904791] 
[   29.918445] Allocated by task 293:
[   29.918893]  kasan_save_stack+0x3d/0x60
[   29.919437]  kasan_save_track+0x18/0x40
[   29.919905]  kasan_save_alloc_info+0x3b/0x50
[   29.920394]  __kasan_kmalloc+0xb7/0xc0
[   29.920661]  __kmalloc_noprof+0x1c4/0x500
[   29.920935]  kunit_kmalloc_array+0x25/0x60
[   29.921270]  copy_user_test_oob+0xac/0x10f0
[   29.921554]  kunit_try_run_case+0x1b3/0x490
[   29.921822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.922213]  kthread+0x324/0x6d0
[   29.922612]  ret_from_fork+0x41/0x80
[   29.923005]  ret_from_fork_asm+0x1a/0x30
[   29.923485] 
[   29.923712] The buggy address belongs to the object at ffff888101bab200
[   29.923712]  which belongs to the cache kmalloc-128 of size 128
[   29.924786] The buggy address is located 0 bytes inside of
[   29.924786]  allocated 120-byte region [ffff888101bab200, ffff888101bab278)
[   29.925878] 
[   29.926144] The buggy address belongs to the physical page:
[   29.926713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101bab
[   29.927492] flags: 0x200000000000000(node=0|zone=2)
[   29.927987] page_type: f5(slab)
[   29.928410] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   29.928803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.929238] page dumped because: kasan: bad access detected
[   29.929538] 
[   29.929734] Memory state around the buggy address:
[   29.930132]  ffff888101bab100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.930830]  ffff888101bab180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.931555] >ffff888101bab200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc
[   29.932275]                                                                 ^
[   29.932934]  ffff888101bab280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.933630]  ffff888101bab300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.934347] ==================================================================

test log snippet boot parser 45

[   25.771202] ==================================================================
[   25.772975] BUG: KASAN: slab-use-after-free in kasan_strings+0xa0c/0xb60
[   25.773611] Read of size 1 at addr ffff888102a6d650 by task kunit_try_catch/267
[   25.774492] 
[   25.775199] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.775527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.775559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.775605] Call Trace:
[   25.775638]  <TASK>
[   25.775674]  dump_stack_lvl+0x73/0xb0
[   25.775749]  print_report+0xd1/0x640
[   25.775790]  ? __virt_addr_valid+0x1db/0x2d0
[   25.775836]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.775903]  kasan_report+0x102/0x140
[   25.775945]  ? kasan_strings+0xa0c/0xb60
[   25.775996]  ? kasan_strings+0xa0c/0xb60
[   25.776056]  __asan_report_load1_noabort+0x18/0x20
[   25.776174]  kasan_strings+0xa0c/0xb60
[   25.776236]  ? __pfx_kasan_strings+0x10/0x10
[   25.776297]  ? __pfx_kasan_strings+0x10/0x10
[   25.776359]  kunit_try_run_case+0x1b3/0x490
[   25.776420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.776473]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.776534]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.776588]  ? __kthread_parkme+0x82/0x160
[   25.776623]  ? preempt_count_sub+0x50/0x80
[   25.776660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.776692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.776731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.776766]  kthread+0x324/0x6d0
[   25.776795]  ? trace_preempt_on+0x20/0xc0
[   25.776828]  ? __pfx_kthread+0x10/0x10
[   25.776859]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.776890]  ? calculate_sigpending+0x7b/0xa0
[   25.776921]  ? __pfx_kthread+0x10/0x10
[   25.776953]  ret_from_fork+0x41/0x80
[   25.776980]  ? __pfx_kthread+0x10/0x10
[   25.777010]  ret_from_fork_asm+0x1a/0x30
[   25.777055]  </TASK>
[   25.777071] 
[   25.795571] Allocated by task 267:
[   25.796155]  kasan_save_stack+0x3d/0x60
[   25.796695]  kasan_save_track+0x18/0x40
[   25.797372]  kasan_save_alloc_info+0x3b/0x50
[   25.798326]  __kasan_kmalloc+0xb7/0xc0
[   25.798557]  __kmalloc_cache_noprof+0x184/0x410
[   25.798829]  kasan_strings+0xb9/0xb60
[   25.799076]  kunit_try_run_case+0x1b3/0x490
[   25.799328]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.799524]  kthread+0x324/0x6d0
[   25.799700]  ret_from_fork+0x41/0x80
[   25.799834]  ret_from_fork_asm+0x1a/0x30
[   25.799987] 
[   25.800066] Freed by task 267:
[   25.801636]  kasan_save_stack+0x3d/0x60
[   25.802066]  kasan_save_track+0x18/0x40
[   25.803361]  kasan_save_free_info+0x3f/0x60
[   25.803803]  __kasan_slab_free+0x56/0x70
[   25.804340]  kfree+0x224/0x3f0
[   25.804740]  kasan_strings+0x13c/0xb60
[   25.805747]  kunit_try_run_case+0x1b3/0x490
[   25.806237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.806805]  kthread+0x324/0x6d0
[   25.807736]  ret_from_fork+0x41/0x80
[   25.808058]  ret_from_fork_asm+0x1a/0x30
[   25.808893] 
[   25.809074] The buggy address belongs to the object at ffff888102a6d640
[   25.809074]  which belongs to the cache kmalloc-32 of size 32
[   25.810438] The buggy address is located 16 bytes inside of
[   25.810438]  freed 32-byte region [ffff888102a6d640, ffff888102a6d660)
[   25.812139] 
[   25.812387] The buggy address belongs to the physical page:
[   25.812940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6d
[   25.813804] flags: 0x200000000000000(node=0|zone=2)
[   25.814415] page_type: f5(slab)
[   25.814795] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   25.815666] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.817246] page dumped because: kasan: bad access detected
[   25.817948] 
[   25.818189] Memory state around the buggy address:
[   25.819016]  ffff888102a6d500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.819400]  ffff888102a6d580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   25.820459] >ffff888102a6d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.821210]                                                  ^
[   25.821935]  ffff888102a6d680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.822756]  ffff888102a6d700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.823490] ==================================================================

test log snippet boot parser 46

[   23.292808] ==================================================================
[   23.293913] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x19d/0x360
[   23.295767] Read of size 1 at addr ffff8881027b6340 by task kunit_try_catch/200
[   23.296661] 
[   23.296985] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   23.297051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.297081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.297133] Call Trace:
[   23.297179]  <TASK>
[   23.297222]  dump_stack_lvl+0x73/0xb0
[   23.297407]  print_report+0xd1/0x640
[   23.297619]  ? __virt_addr_valid+0x1db/0x2d0
[   23.297658]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.297696]  kasan_report+0x102/0x140
[   23.297722]  ? kmalloc_double_kzfree+0x19d/0x360
[   23.297753]  ? kmalloc_double_kzfree+0x19d/0x360
[   23.297787]  ? kmalloc_double_kzfree+0x19d/0x360
[   23.297816]  __kasan_check_byte+0x3d/0x50
[   23.297844]  kfree_sensitive+0x22/0x90
[   23.297872]  kmalloc_double_kzfree+0x19d/0x360
[   23.297901]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   23.297934]  ? __pfx_kmalloc_double_kzfree+0x10/0x10
[   23.297969]  kunit_try_run_case+0x1b3/0x490
[   23.297999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.298027]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.298060]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.298094]  ? __kthread_parkme+0x82/0x160
[   23.298192]  ? preempt_count_sub+0x50/0x80
[   23.298235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.298289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.298347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.298401]  kthread+0x324/0x6d0
[   23.298446]  ? trace_preempt_on+0x20/0xc0
[   23.298483]  ? __pfx_kthread+0x10/0x10
[   23.298513]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.298544]  ? calculate_sigpending+0x7b/0xa0
[   23.298573]  ? __pfx_kthread+0x10/0x10
[   23.298603]  ret_from_fork+0x41/0x80
[   23.298629]  ? __pfx_kthread+0x10/0x10
[   23.298658]  ret_from_fork_asm+0x1a/0x30
[   23.298702]  </TASK>
[   23.298719] 
[   23.315649] Allocated by task 200:
[   23.316029]  kasan_save_stack+0x3d/0x60
[   23.316639]  kasan_save_track+0x18/0x40
[   23.316921]  kasan_save_alloc_info+0x3b/0x50
[   23.317547]  __kasan_kmalloc+0xb7/0xc0
[   23.317987]  __kmalloc_cache_noprof+0x184/0x410
[   23.318658]  kmalloc_double_kzfree+0xaa/0x360
[   23.319016]  kunit_try_run_case+0x1b3/0x490
[   23.319806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.320532]  kthread+0x324/0x6d0
[   23.320926]  ret_from_fork+0x41/0x80
[   23.321287]  ret_from_fork_asm+0x1a/0x30
[   23.321707] 
[   23.321924] Freed by task 200:
[   23.322493]  kasan_save_stack+0x3d/0x60
[   23.322859]  kasan_save_track+0x18/0x40
[   23.323154]  kasan_save_free_info+0x3f/0x60
[   23.323793]  __kasan_slab_free+0x56/0x70
[   23.324446]  kfree+0x224/0x3f0
[   23.324789]  kfree_sensitive+0x67/0x90
[   23.325978]  kmalloc_double_kzfree+0x12c/0x360
[   23.326544]  kunit_try_run_case+0x1b3/0x490
[   23.326886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.327241]  kthread+0x324/0x6d0
[   23.327573]  ret_from_fork+0x41/0x80
[   23.327966]  ret_from_fork_asm+0x1a/0x30
[   23.329040] 
[   23.329793] The buggy address belongs to the object at ffff8881027b6340
[   23.329793]  which belongs to the cache kmalloc-16 of size 16
[   23.330929] The buggy address is located 0 bytes inside of
[   23.330929]  freed 16-byte region [ffff8881027b6340, ffff8881027b6350)
[   23.332033] 
[   23.332883] The buggy address belongs to the physical page:
[   23.333583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1027b6
[   23.334493] flags: 0x200000000000000(node=0|zone=2)
[   23.334987] page_type: f5(slab)
[   23.335534] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.336131] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.336817] page dumped because: kasan: bad access detected
[   23.338046] 
[   23.338352] Memory state around the buggy address:
[   23.338802]  ffff8881027b6200: 00 02 fc fc 00 05 fc fc 00 02 fc fc 00 02 fc fc
[   23.339452]  ffff8881027b6280: 00 02 fc fc 00 02 fc fc 00 05 fc fc fa fb fc fc
[   23.340516] >ffff8881027b6300: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   23.341239]                                            ^
[   23.341992]  ffff8881027b6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.342783]  ffff8881027b6400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.343432] ==================================================================

test log snippet boot parser 47

[   23.111043] ==================================================================
[   23.113115] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x322/0x380
[   23.113758] Read of size 1 at addr ffff888101b860c8 by task kunit_try_catch/192
[   23.115282] 
[   23.115688] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   23.115766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.115795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.115848] Call Trace:
[   23.115888]  <TASK>
[   23.115930]  dump_stack_lvl+0x73/0xb0
[   23.115997]  print_report+0xd1/0x640
[   23.116028]  ? __virt_addr_valid+0x1db/0x2d0
[   23.116060]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.116108]  kasan_report+0x102/0x140
[   23.116217]  ? kmalloc_uaf+0x322/0x380
[   23.116256]  ? kmalloc_uaf+0x322/0x380
[   23.116288]  __asan_report_load1_noabort+0x18/0x20
[   23.116341]  kmalloc_uaf+0x322/0x380
[   23.116385]  ? __pfx_kmalloc_uaf+0x10/0x10
[   23.116433]  ? __schedule+0xcdc/0x2830
[   23.116494]  ? __pfx_read_tsc+0x10/0x10
[   23.116530]  ? ktime_get_ts64+0x86/0x230
[   23.116567]  kunit_try_run_case+0x1b3/0x490
[   23.116598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.116626]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.116658]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.116689]  ? __kthread_parkme+0x82/0x160
[   23.116719]  ? preempt_count_sub+0x50/0x80
[   23.116752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.116781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.116814]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.116847]  kthread+0x324/0x6d0
[   23.116874]  ? trace_preempt_on+0x20/0xc0
[   23.116905]  ? __pfx_kthread+0x10/0x10
[   23.116933]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.116962]  ? calculate_sigpending+0x7b/0xa0
[   23.116991]  ? __pfx_kthread+0x10/0x10
[   23.117020]  ret_from_fork+0x41/0x80
[   23.117044]  ? __pfx_kthread+0x10/0x10
[   23.117073]  ret_from_fork_asm+0x1a/0x30
[   23.117135]  </TASK>
[   23.117153] 
[   23.135560] Allocated by task 192:
[   23.135980]  kasan_save_stack+0x3d/0x60
[   23.137061]  kasan_save_track+0x18/0x40
[   23.137581]  kasan_save_alloc_info+0x3b/0x50
[   23.137880]  __kasan_kmalloc+0xb7/0xc0
[   23.138280]  __kmalloc_cache_noprof+0x184/0x410
[   23.138722]  kmalloc_uaf+0xab/0x380
[   23.139047]  kunit_try_run_case+0x1b3/0x490
[   23.139539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.140176]  kthread+0x324/0x6d0
[   23.140457]  ret_from_fork+0x41/0x80
[   23.140878]  ret_from_fork_asm+0x1a/0x30
[   23.141279] 
[   23.141522] Freed by task 192:
[   23.141841]  kasan_save_stack+0x3d/0x60
[   23.142291]  kasan_save_track+0x18/0x40
[   23.142632]  kasan_save_free_info+0x3f/0x60
[   23.143057]  __kasan_slab_free+0x56/0x70
[   23.143584]  kfree+0x224/0x3f0
[   23.144011]  kmalloc_uaf+0x12d/0x380
[   23.144491]  kunit_try_run_case+0x1b3/0x490
[   23.144953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.145514]  kthread+0x324/0x6d0
[   23.145951]  ret_from_fork+0x41/0x80
[   23.146484]  ret_from_fork_asm+0x1a/0x30
[   23.146913] 
[   23.147074] The buggy address belongs to the object at ffff888101b860c0
[   23.147074]  which belongs to the cache kmalloc-16 of size 16
[   23.148357] The buggy address is located 8 bytes inside of
[   23.148357]  freed 16-byte region [ffff888101b860c0, ffff888101b860d0)
[   23.149473] 
[   23.149760] The buggy address belongs to the physical page:
[   23.150325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b86
[   23.150797] flags: 0x200000000000000(node=0|zone=2)
[   23.151363] page_type: f5(slab)
[   23.151677] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   23.152278] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   23.152962] page dumped because: kasan: bad access detected
[   23.153423] 
[   23.153638] Memory state around the buggy address:
[   23.153977]  ffff888101b85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.154592]  ffff888101b86000: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   23.155008] >ffff888101b86080: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc
[   23.155698]                                               ^
[   23.156065]  ffff888101b86100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.156616]  ffff888101b86180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.157315] ==================================================================

test log snippet boot parser 48

[   22.681935] ==================================================================
[   22.682800] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x47d/0x4c0
[   22.684005] Read of size 16 at addr ffff888101b860a0 by task kunit_try_catch/176
[   22.684751] 
[   22.684939] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   22.685545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.685580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.685619] Call Trace:
[   22.685639]  <TASK>
[   22.685666]  dump_stack_lvl+0x73/0xb0
[   22.685745]  print_report+0xd1/0x640
[   22.685777]  ? __virt_addr_valid+0x1db/0x2d0
[   22.685812]  ? kasan_complete_mode_report_info+0x64/0x200
[   22.685848]  kasan_report+0x102/0x140
[   22.685873]  ? kmalloc_uaf_16+0x47d/0x4c0
[   22.685901]  ? kmalloc_uaf_16+0x47d/0x4c0
[   22.685934]  __asan_report_load16_noabort+0x18/0x20
[   22.685964]  kmalloc_uaf_16+0x47d/0x4c0
[   22.685991]  ? __pfx_kmalloc_uaf_16+0x10/0x10
[   22.686017]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   22.686051]  ? trace_hardirqs_on+0x37/0xe0
[   22.686083]  ? __pfx_read_tsc+0x10/0x10
[   22.686380]  ? ktime_get_ts64+0x86/0x230
[   22.686442]  kunit_try_run_case+0x1b3/0x490
[   22.686479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.686510]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.686545]  ? __kthread_parkme+0x82/0x160
[   22.686576]  ? preempt_count_sub+0x50/0x80
[   22.686611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.686640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.686674]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.686708]  kthread+0x324/0x6d0
[   22.686735]  ? trace_preempt_on+0x20/0xc0
[   22.686764]  ? __pfx_kthread+0x10/0x10
[   22.686793]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.686822]  ? calculate_sigpending+0x7b/0xa0
[   22.686851]  ? __pfx_kthread+0x10/0x10
[   22.686881]  ret_from_fork+0x41/0x80
[   22.686905]  ? __pfx_kthread+0x10/0x10
[   22.686934]  ret_from_fork_asm+0x1a/0x30
[   22.686978]  </TASK>
[   22.686995] 
[   22.707011] Allocated by task 176:
[   22.707289]  kasan_save_stack+0x3d/0x60
[   22.708502]  kasan_save_track+0x18/0x40
[   22.708753]  kasan_save_alloc_info+0x3b/0x50
[   22.709027]  __kasan_kmalloc+0xb7/0xc0
[   22.709284]  __kmalloc_cache_noprof+0x184/0x410
[   22.710232]  kmalloc_uaf_16+0x15c/0x4c0
[   22.711131]  kunit_try_run_case+0x1b3/0x490
[   22.711713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.712049]  kthread+0x324/0x6d0
[   22.713919]  ret_from_fork+0x41/0x80
[   22.714902]  ret_from_fork_asm+0x1a/0x30
[   22.715414] 
[   22.715935] Freed by task 176:
[   22.716347]  kasan_save_stack+0x3d/0x60
[   22.718192]  kasan_save_track+0x18/0x40
[   22.719762]  kasan_save_free_info+0x3f/0x60
[   22.720621]  __kasan_slab_free+0x56/0x70
[   22.720895]  kfree+0x224/0x3f0
[   22.721127]  kmalloc_uaf_16+0x1d7/0x4c0
[   22.721395]  kunit_try_run_case+0x1b3/0x490
[   22.721655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.721952]  kthread+0x324/0x6d0
[   22.725180]  ret_from_fork+0x41/0x80
[   22.726190]  ret_from_fork_asm+0x1a/0x30
[   22.726885] 
[   22.727179] The buggy address belongs to the object at ffff888101b860a0
[   22.727179]  which belongs to the cache kmalloc-16 of size 16
[   22.728999] The buggy address is located 0 bytes inside of
[   22.728999]  freed 16-byte region [ffff888101b860a0, ffff888101b860b0)
[   22.729837] 
[   22.730071] The buggy address belongs to the physical page:
[   22.730986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b86
[   22.731591] flags: 0x200000000000000(node=0|zone=2)
[   22.731917] page_type: f5(slab)
[   22.732657] raw: 0200000000000000 ffff888100041640 dead000000000122 0000000000000000
[   22.733733] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000
[   22.735028] page dumped because: kasan: bad access detected
[   22.735593] 
[   22.735811] Memory state around the buggy address:
[   22.736467]  ffff888101b85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.736834]  ffff888101b86000: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc
[   22.737538] >ffff888101b86080: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc
[   22.738594]                                ^
[   22.739482]  ffff888101b86100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740400]  ffff888101b86180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740788] ==================================================================

test log snippet boot parser 49

[   24.153145] ==================================================================
[   24.153927] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x1bd/0x380
[   24.154798] Read of size 1 at addr ffff888101ae7500 by task kunit_try_catch/223
[   24.155326] 
[   24.156268] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   24.156501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.156533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.157358] Call Trace:
[   24.157401]  <TASK>
[   24.157448]  dump_stack_lvl+0x73/0xb0
[   24.157540]  print_report+0xd1/0x640
[   24.157722]  ? __virt_addr_valid+0x1db/0x2d0
[   24.157760]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.157798]  kasan_report+0x102/0x140
[   24.157825]  ? kmem_cache_double_destroy+0x1bd/0x380
[   24.157860]  ? kmem_cache_double_destroy+0x1bd/0x380
[   24.157896]  ? kmem_cache_double_destroy+0x1bd/0x380
[   24.157928]  __kasan_check_byte+0x3d/0x50
[   24.157957]  kmem_cache_destroy+0x25/0x1d0
[   24.157993]  kmem_cache_double_destroy+0x1bd/0x380
[   24.158024]  ? __pfx_kmem_cache_double_destroy+0x10/0x10
[   24.158056]  ? finish_task_switch.isra.0+0x153/0x700
[   24.158088]  ? __switch_to+0x5d9/0xf60
[   24.158143]  ? __pfx_empty_cache_ctor+0x10/0x10
[   24.158201]  ? __pfx_read_tsc+0x10/0x10
[   24.158232]  ? ktime_get_ts64+0x86/0x230
[   24.158284]  kunit_try_run_case+0x1b3/0x490
[   24.158339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.158386]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.158422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.158455]  ? __kthread_parkme+0x82/0x160
[   24.158486]  ? preempt_count_sub+0x50/0x80
[   24.158519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.158548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.158610]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.158646]  kthread+0x324/0x6d0
[   24.158675]  ? trace_preempt_on+0x20/0xc0
[   24.158707]  ? __pfx_kthread+0x10/0x10
[   24.158737]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.158767]  ? calculate_sigpending+0x7b/0xa0
[   24.158798]  ? __pfx_kthread+0x10/0x10
[   24.158828]  ret_from_fork+0x41/0x80
[   24.158853]  ? __pfx_kthread+0x10/0x10
[   24.158883]  ret_from_fork_asm+0x1a/0x30
[   24.158928]  </TASK>
[   24.158944] 
[   24.182032] Allocated by task 223:
[   24.182413]  kasan_save_stack+0x3d/0x60
[   24.183358]  kasan_save_track+0x18/0x40
[   24.183916]  kasan_save_alloc_info+0x3b/0x50
[   24.184567]  __kasan_slab_alloc+0x91/0xa0
[   24.185081]  kmem_cache_alloc_noprof+0x11e/0x3f0
[   24.186183]  __kmem_cache_create_args+0x177/0x250
[   24.186819]  kmem_cache_double_destroy+0xd3/0x380
[   24.187764]  kunit_try_run_case+0x1b3/0x490
[   24.188637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.189048]  kthread+0x324/0x6d0
[   24.189913]  ret_from_fork+0x41/0x80
[   24.190294]  ret_from_fork_asm+0x1a/0x30
[   24.191051] 
[   24.191546] Freed by task 223:
[   24.192018]  kasan_save_stack+0x3d/0x60
[   24.192699]  kasan_save_track+0x18/0x40
[   24.192927]  kasan_save_free_info+0x3f/0x60
[   24.193929]  __kasan_slab_free+0x56/0x70
[   24.194210]  kmem_cache_free+0x24b/0x420
[   24.194831]  slab_kmem_cache_release+0x2e/0x40
[   24.195726]  kmem_cache_release+0x16/0x20
[   24.196176]  kobject_put+0x181/0x450
[   24.196535]  sysfs_slab_release+0x16/0x20
[   24.196822]  kmem_cache_destroy+0xf0/0x1d0
[   24.197259]  kmem_cache_double_destroy+0x14c/0x380
[   24.197837]  kunit_try_run_case+0x1b3/0x490
[   24.198054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.199682]  kthread+0x324/0x6d0
[   24.200288]  ret_from_fork+0x41/0x80
[   24.200759]  ret_from_fork_asm+0x1a/0x30
[   24.201484] 
[   24.202586] The buggy address belongs to the object at ffff888101ae7500
[   24.202586]  which belongs to the cache kmem_cache of size 208
[   24.204770] The buggy address is located 0 bytes inside of
[   24.204770]  freed 208-byte region [ffff888101ae7500, ffff888101ae75d0)
[   24.206136] 
[   24.206325] The buggy address belongs to the physical page:
[   24.206897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101ae7
[   24.208043] flags: 0x200000000000000(node=0|zone=2)
[   24.208945] page_type: f5(slab)
[   24.209539] raw: 0200000000000000 ffff888100041000 dead000000000122 0000000000000000
[   24.209945] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000
[   24.210832] page dumped because: kasan: bad access detected
[   24.211689] 
[   24.211989] Memory state around the buggy address:
[   24.213000]  ffff888101ae7400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.213791]  ffff888101ae7480: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.214241] >ffff888101ae7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.215043]                    ^
[   24.215737]  ffff888101ae7580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[   24.216955]  ffff888101ae7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.217671] ==================================================================

test log snippet boot parser 50

[   24.056619] ==================================================================
[   24.057755] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x3e5/0x510
[   24.059427] Read of size 1 at addr ffff888102a67000 by task kunit_try_catch/221
[   24.061023] 
[   24.061832] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   24.061953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.061983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.062040] Call Trace:
[   24.062074]  <TASK>
[   24.062525]  dump_stack_lvl+0x73/0xb0
[   24.062902]  print_report+0xd1/0x640
[   24.062973]  ? __virt_addr_valid+0x1db/0x2d0
[   24.063031]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.063133]  kasan_report+0x102/0x140
[   24.063209]  ? kmem_cache_rcu_uaf+0x3e5/0x510
[   24.063266]  ? kmem_cache_rcu_uaf+0x3e5/0x510
[   24.063326]  __asan_report_load1_noabort+0x18/0x20
[   24.063798]  kmem_cache_rcu_uaf+0x3e5/0x510
[   24.063851]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   24.063912]  ? sysvec_apic_timer_interrupt+0x50/0x90
[   24.063980]  ? __pfx_kmem_cache_rcu_uaf+0x10/0x10
[   24.064043]  kunit_try_run_case+0x1b3/0x490
[   24.064356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.064431]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.064493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.064550]  ? __kthread_parkme+0x82/0x160
[   24.064607]  ? preempt_count_sub+0x50/0x80
[   24.064669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.064720]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.064773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.064828]  kthread+0x324/0x6d0
[   24.064871]  ? trace_preempt_on+0x20/0xc0
[   24.064922]  ? __pfx_kthread+0x10/0x10
[   24.064971]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.065022]  ? calculate_sigpending+0x7b/0xa0
[   24.065069]  ? __pfx_kthread+0x10/0x10
[   24.065191]  ret_from_fork+0x41/0x80
[   24.065240]  ? __pfx_kthread+0x10/0x10
[   24.065289]  ret_from_fork_asm+0x1a/0x30
[   24.065356]  </TASK>
[   24.065380] 
[   24.089593] Allocated by task 221:
[   24.090009]  kasan_save_stack+0x3d/0x60
[   24.090556]  kasan_save_track+0x18/0x40
[   24.090992]  kasan_save_alloc_info+0x3b/0x50
[   24.091496]  __kasan_slab_alloc+0x91/0xa0
[   24.091999]  kmem_cache_alloc_noprof+0x11e/0x3f0
[   24.092637]  kmem_cache_rcu_uaf+0x156/0x510
[   24.093215]  kunit_try_run_case+0x1b3/0x490
[   24.093714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.094430]  kthread+0x324/0x6d0
[   24.094827]  ret_from_fork+0x41/0x80
[   24.095363]  ret_from_fork_asm+0x1a/0x30
[   24.095888] 
[   24.096218] Freed by task 0:
[   24.096579]  kasan_save_stack+0x3d/0x60
[   24.096883]  kasan_save_track+0x18/0x40
[   24.097442]  kasan_save_free_info+0x3f/0x60
[   24.097949]  __kasan_slab_free+0x56/0x70
[   24.098461]  slab_free_after_rcu_debug+0xe4/0x310
[   24.099050]  rcu_core+0x680/0x1d70
[   24.099540]  rcu_core_si+0x12/0x20
[   24.099788]  handle_softirqs+0x209/0x720
[   24.100099]  __irq_exit_rcu+0xc9/0x110
[   24.100546]  irq_exit_rcu+0x12/0x20
[   24.100932]  sysvec_apic_timer_interrupt+0x81/0x90
[   24.101417]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   24.101943] 
[   24.102211] Last potentially related work creation:
[   24.102632]  kasan_save_stack+0x3d/0x60
[   24.102905]  kasan_record_aux_stack+0xb2/0xc0
[   24.103416]  kmem_cache_free+0x132/0x420
[   24.103826]  kmem_cache_rcu_uaf+0x195/0x510
[   24.104278]  kunit_try_run_case+0x1b3/0x490
[   24.104710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.105302]  kthread+0x324/0x6d0
[   24.105638]  ret_from_fork+0x41/0x80
[   24.106058]  ret_from_fork_asm+0x1a/0x30
[   24.106485] 
[   24.106638] The buggy address belongs to the object at ffff888102a67000
[   24.106638]  which belongs to the cache test_cache of size 200
[   24.107686] The buggy address is located 0 bytes inside of
[   24.107686]  freed 200-byte region [ffff888102a67000, ffff888102a670c8)
[   24.108473] 
[   24.108689] The buggy address belongs to the physical page:
[   24.109075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a67
[   24.109850] flags: 0x200000000000000(node=0|zone=2)
[   24.110362] page_type: f5(slab)
[   24.110722] raw: 0200000000000000 ffff888102118280 dead000000000122 0000000000000000
[   24.111419] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000
[   24.112076] page dumped because: kasan: bad access detected
[   24.112539] 
[   24.112786] Memory state around the buggy address:
[   24.113309]  ffff888102a66f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.113768]  ffff888102a66f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.114326] >ffff888102a67000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.114938]                    ^
[   24.115888]  ffff888102a67080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc
[   24.116538]  ffff888102a67100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.116896] ==================================================================

test log snippet boot parser 51

[   22.509212] ==================================================================
[   22.509954] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x1b9/0x5e0
[   22.510456] Read of size 1 at addr ffff8881003aac00 by task kunit_try_catch/172
[   22.511075] 
[   22.511395] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   22.511504] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.511538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.511594] Call Trace:
[   22.511624]  <TASK>
[   22.511663]  dump_stack_lvl+0x73/0xb0
[   22.511742]  print_report+0xd1/0x640
[   22.511791]  ? __virt_addr_valid+0x1db/0x2d0
[   22.511837]  ? kasan_complete_mode_report_info+0x64/0x200
[   22.511902]  kasan_report+0x102/0x140
[   22.511947]  ? krealloc_uaf+0x1b9/0x5e0
[   22.511993]  ? krealloc_uaf+0x1b9/0x5e0
[   22.512051]  ? krealloc_uaf+0x1b9/0x5e0
[   22.512104]  __kasan_check_byte+0x3d/0x50
[   22.512152]  krealloc_noprof+0x3f/0x340
[   22.512297]  krealloc_uaf+0x1b9/0x5e0
[   22.512353]  ? __pfx_krealloc_uaf+0x10/0x10
[   22.512402]  ? finish_task_switch.isra.0+0x153/0x700
[   22.512459]  ? __switch_to+0x5d9/0xf60
[   22.512528]  ? __schedule+0xcdc/0x2830
[   22.512585]  ? __pfx_read_tsc+0x10/0x10
[   22.512633]  ? ktime_get_ts64+0x86/0x230
[   22.512688]  kunit_try_run_case+0x1b3/0x490
[   22.512741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.512787]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   22.512845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.512905]  ? __kthread_parkme+0x82/0x160
[   22.512962]  ? preempt_count_sub+0x50/0x80
[   22.513025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.513082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.513148]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.513237]  kthread+0x324/0x6d0
[   22.513290]  ? trace_preempt_on+0x20/0xc0
[   22.513347]  ? __pfx_kthread+0x10/0x10
[   22.513447]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.513536]  ? calculate_sigpending+0x7b/0xa0
[   22.513595]  ? __pfx_kthread+0x10/0x10
[   22.513654]  ret_from_fork+0x41/0x80
[   22.513699]  ? __pfx_kthread+0x10/0x10
[   22.513732]  ret_from_fork_asm+0x1a/0x30
[   22.513778]  </TASK>
[   22.513796] 
[   22.533793] Allocated by task 172:
[   22.534920]  kasan_save_stack+0x3d/0x60
[   22.535895]  kasan_save_track+0x18/0x40
[   22.536252]  kasan_save_alloc_info+0x3b/0x50
[   22.536538]  __kasan_kmalloc+0xb7/0xc0
[   22.537086]  __kmalloc_cache_noprof+0x184/0x410
[   22.537672]  krealloc_uaf+0xbc/0x5e0
[   22.538066]  kunit_try_run_case+0x1b3/0x490
[   22.538475]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.539025]  kthread+0x324/0x6d0
[   22.539433]  ret_from_fork+0x41/0x80
[   22.540086]  ret_from_fork_asm+0x1a/0x30
[   22.540915] 
[   22.541189] Freed by task 172:
[   22.541819]  kasan_save_stack+0x3d/0x60
[   22.542429]  kasan_save_track+0x18/0x40
[   22.542926]  kasan_save_free_info+0x3f/0x60
[   22.543429]  __kasan_slab_free+0x56/0x70
[   22.543958]  kfree+0x224/0x3f0
[   22.544485]  krealloc_uaf+0x13e/0x5e0
[   22.544978]  kunit_try_run_case+0x1b3/0x490
[   22.545671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.546432]  kthread+0x324/0x6d0
[   22.546891]  ret_from_fork+0x41/0x80
[   22.547470]  ret_from_fork_asm+0x1a/0x30
[   22.548081] 
[   22.548447] The buggy address belongs to the object at ffff8881003aac00
[   22.548447]  which belongs to the cache kmalloc-256 of size 256
[   22.549678] The buggy address is located 0 bytes inside of
[   22.549678]  freed 256-byte region [ffff8881003aac00, ffff8881003aad00)
[   22.550580] 
[   22.550757] The buggy address belongs to the physical page:
[   22.551579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003aa
[   22.552443] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   22.553434] flags: 0x200000000000040(head|node=0|zone=2)
[   22.554076] page_type: f5(slab)
[   22.554569] raw: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.555668] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.556830] head: 0200000000000040 ffff888100041b40 dead000000000122 0000000000000000
[   22.558100] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   22.558872] head: 0200000000000001 ffffea000400ea81 ffffffffffffffff 0000000000000000
[   22.559834] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
[   22.560600] page dumped because: kasan: bad access detected
[   22.561072] 
[   22.561242] Memory state around the buggy address:
[   22.561495]  ffff8881003aab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.562991]  ffff8881003aab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.563857] >ffff8881003aac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.564596]                    ^
[   22.565618]  ffff8881003aac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   22.566249]  ffff8881003aad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.566689] ==================================================================

test log snippet boot parser 52

[   24.950193] ==================================================================
[   24.951464] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x394/0x400
[   24.952366] Read of size 1 at addr ffff888102a5f900 by task kunit_try_catch/235
[   24.952748] 
[   24.952932] CPU: 1 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   24.953034] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.953063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.953108] Call Trace:
[   24.953138]  <TASK>
[   24.953199]  dump_stack_lvl+0x73/0xb0
[   24.953285]  print_report+0xd1/0x640
[   24.953332]  ? __virt_addr_valid+0x1db/0x2d0
[   24.953383]  ? kasan_complete_mode_report_info+0x64/0x200
[   24.953440]  kasan_report+0x102/0x140
[   24.953479]  ? mempool_uaf_helper+0x394/0x400
[   24.953531]  ? mempool_uaf_helper+0x394/0x400
[   24.953586]  __asan_report_load1_noabort+0x18/0x20
[   24.953644]  mempool_uaf_helper+0x394/0x400
[   24.953699]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   24.953753]  ? update_load_avg+0x1c3/0x2110
[   24.953824]  ? update_curr+0x80/0x810
[   24.953940]  ? finish_task_switch.isra.0+0x153/0x700
[   24.954629]  mempool_kmalloc_uaf+0xb3/0x100
[   24.954699]  ? __pfx_mempool_kmalloc_uaf+0x10/0x10
[   24.954920]  ? __switch_to+0x5d9/0xf60
[   24.955011]  ? __pfx_mempool_kmalloc+0x10/0x10
[   24.955079]  ? __pfx_mempool_kfree+0x10/0x10
[   24.955180]  ? __pfx_read_tsc+0x10/0x10
[   24.955588]  ? ktime_get_ts64+0x86/0x230
[   24.955657]  kunit_try_run_case+0x1b3/0x490
[   24.955697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.955728]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   24.955765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.955800]  ? __kthread_parkme+0x82/0x160
[   24.955832]  ? preempt_count_sub+0x50/0x80
[   24.955868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.955913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.955950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.955987]  kthread+0x324/0x6d0
[   24.956017]  ? trace_preempt_on+0x20/0xc0
[   24.956052]  ? __pfx_kthread+0x10/0x10
[   24.956084]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.956146]  ? calculate_sigpending+0x7b/0xa0
[   24.956205]  ? __pfx_kthread+0x10/0x10
[   24.956239]  ret_from_fork+0x41/0x80
[   24.956277]  ? __pfx_kthread+0x10/0x10
[   24.956341]  ret_from_fork_asm+0x1a/0x30
[   24.956411]  </TASK>
[   24.956433] 
[   24.977525] Allocated by task 235:
[   24.978050]  kasan_save_stack+0x3d/0x60
[   24.978771]  kasan_save_track+0x18/0x40
[   24.980058]  kasan_save_alloc_info+0x3b/0x50
[   24.981283]  __kasan_mempool_unpoison_object+0x1a9/0x200
[   24.981946]  remove_element+0x11e/0x190
[   24.982566]  mempool_alloc_preallocated+0x4d/0x90
[   24.983139]  mempool_uaf_helper+0x97/0x400
[   24.984454]  mempool_kmalloc_uaf+0xb3/0x100
[   24.985038]  kunit_try_run_case+0x1b3/0x490
[   24.985883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.986275]  kthread+0x324/0x6d0
[   24.986821]  ret_from_fork+0x41/0x80
[   24.987408]  ret_from_fork_asm+0x1a/0x30
[   24.988495] 
[   24.988843] Freed by task 235:
[   24.989700]  kasan_save_stack+0x3d/0x60
[   24.990002]  kasan_save_track+0x18/0x40
[   24.990456]  kasan_save_free_info+0x3f/0x60
[   24.991076]  __kasan_mempool_poison_object+0x131/0x1d0
[   24.992217]  mempool_free+0x2ec/0x380
[   24.992632]  mempool_uaf_helper+0x11b/0x400
[   24.993018]  mempool_kmalloc_uaf+0xb3/0x100
[   24.994053]  kunit_try_run_case+0x1b3/0x490
[   24.994578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.995537]  kthread+0x324/0x6d0
[   24.996787]  ret_from_fork+0x41/0x80
[   24.997131]  ret_from_fork_asm+0x1a/0x30
[   24.997665] 
[   24.998368] The buggy address belongs to the object at ffff888102a5f900
[   24.998368]  which belongs to the cache kmalloc-128 of size 128
[   24.999388] The buggy address is located 0 bytes inside of
[   24.999388]  freed 128-byte region [ffff888102a5f900, ffff888102a5f980)
[   25.001036] 
[   25.001271] The buggy address belongs to the physical page:
[   25.001788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5f
[   25.002713] flags: 0x200000000000000(node=0|zone=2)
[   25.003467] page_type: f5(slab)
[   25.004100] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   25.005250] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   25.005898] page dumped because: kasan: bad access detected
[   25.006709] 
[   25.006891] Memory state around the buggy address:
[   25.007349]  ffff888102a5f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.007869]  ffff888102a5f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.009356] >ffff888102a5f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   25.009813]                    ^
[   25.010068]  ffff888102a5f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.010630]  ffff888102a5fa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   25.011365] ==================================================================

test log snippet boot parser 53

[   23.695563] ==================================================================
[   23.696409] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x50/0x60
[   23.697988] Read of size 4 at addr ffff888102a5cdc0 by task swapper/1/0
[   23.699065] 
[   23.699372] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G    B            N 6.13.0 #1
[   23.699483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.699517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.699659] Call Trace:
[   23.699850]  <IRQ>
[   23.699960]  dump_stack_lvl+0x73/0xb0
[   23.700078]  print_report+0xd1/0x640
[   23.700154]  ? __virt_addr_valid+0x1db/0x2d0
[   23.700212]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.700251]  kasan_report+0x102/0x140
[   23.700319]  ? rcu_uaf_reclaim+0x50/0x60
[   23.700375]  ? rcu_uaf_reclaim+0x50/0x60
[   23.700417]  __asan_report_load4_noabort+0x18/0x20
[   23.700449]  rcu_uaf_reclaim+0x50/0x60
[   23.700481]  rcu_core+0x680/0x1d70
[   23.700527]  ? __pfx_rcu_core+0x10/0x10
[   23.700571]  rcu_core_si+0x12/0x20
[   23.700599]  handle_softirqs+0x209/0x720
[   23.700632]  ? hrtimer_interrupt+0x2fe/0x780
[   23.700666]  ? __pfx_handle_softirqs+0x10/0x10
[   23.700706]  __irq_exit_rcu+0xc9/0x110
[   23.700737]  irq_exit_rcu+0x12/0x20
[   23.700767]  sysvec_apic_timer_interrupt+0x81/0x90
[   23.700803]  </IRQ>
[   23.700817]  <TASK>
[   23.700833]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   23.700991] RIP: 0010:default_idle+0xf/0x20
[   23.701186] Code: 4c 01 c7 4c 29 c2 e9 72 ff ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa eb 07 0f 00 2d d3 69 22 00 fb f4 <fa> c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   23.701357] RSP: 0000:ffff88810087fde0 EFLAGS: 00010216
[   23.701558] RAX: ffff88815b100000 RBX: ffff88810084d000 RCX: ffffffff95634a05
[   23.701658] RDX: ffffed102b626ad3 RSI: 0000000000000004 RDI: 000000000001f4dc
[   23.701752] RBP: ffff88810087fde8 R08: 0000000000000001 R09: ffffed102b626ad2
[   23.701843] R10: ffff88815b135693 R11: 0000000000000000 R12: 0000000000000001
[   23.701911] R13: ffffed1020109a00 R14: ffffffff973dde10 R15: 0000000000000000
[   23.702007]  ? ct_kernel_exit.constprop.0+0xa5/0xd0
[   23.702109]  ? arch_cpu_idle+0xd/0x20
[   23.702183]  default_idle_call+0x48/0x80
[   23.702214]  do_idle+0x310/0x3c0
[   23.702248]  ? __pfx_do_idle+0x10/0x10
[   23.702317]  ? _raw_spin_unlock_irqrestore+0x49/0x90
[   23.702374]  ? complete+0x15b/0x1d0
[   23.702412]  cpu_startup_entry+0x5c/0x70
[   23.702444]  start_secondary+0x216/0x290
[   23.702476]  ? __pfx_start_secondary+0x10/0x10
[   23.702516]  common_startup_64+0x12c/0x138
[   23.702566]  </TASK>
[   23.702582] 
[   23.723235] Allocated by task 206:
[   23.723512]  kasan_save_stack+0x3d/0x60
[   23.723962]  kasan_save_track+0x18/0x40
[   23.724618]  kasan_save_alloc_info+0x3b/0x50
[   23.725056]  __kasan_kmalloc+0xb7/0xc0
[   23.725712]  __kmalloc_cache_noprof+0x184/0x410
[   23.726837]  rcu_uaf+0xb1/0x330
[   23.727436]  kunit_try_run_case+0x1b3/0x490
[   23.728052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.728869]  kthread+0x324/0x6d0
[   23.729109]  ret_from_fork+0x41/0x80
[   23.729888]  ret_from_fork_asm+0x1a/0x30
[   23.730579] 
[   23.730809] Freed by task 0:
[   23.731803]  kasan_save_stack+0x3d/0x60
[   23.732202]  kasan_save_track+0x18/0x40
[   23.732955]  kasan_save_free_info+0x3f/0x60
[   23.733217]  __kasan_slab_free+0x56/0x70
[   23.733870]  kfree+0x224/0x3f0
[   23.734428]  rcu_uaf_reclaim+0x1f/0x60
[   23.734802]  rcu_core+0x680/0x1d70
[   23.735621]  rcu_core_si+0x12/0x20
[   23.736037]  handle_softirqs+0x209/0x720
[   23.736633]  __irq_exit_rcu+0xc9/0x110
[   23.737189]  irq_exit_rcu+0x12/0x20
[   23.737592]  sysvec_apic_timer_interrupt+0x81/0x90
[   23.738495]  asm_sysvec_apic_timer_interrupt+0x1f/0x30
[   23.738991] 
[   23.739324] Last potentially related work creation:
[   23.740325]  kasan_save_stack+0x3d/0x60
[   23.740871]  kasan_record_aux_stack+0xb2/0xc0
[   23.741127]  __call_rcu_common.constprop.0+0x72/0xaa0
[   23.742001]  call_rcu+0x12/0x20
[   23.742474]  rcu_uaf+0x169/0x330
[   23.743137]  kunit_try_run_case+0x1b3/0x490
[   23.744128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.744620]  kthread+0x324/0x6d0
[   23.744975]  ret_from_fork+0x41/0x80
[   23.745228]  ret_from_fork_asm+0x1a/0x30
[   23.745856] 
[   23.746121] The buggy address belongs to the object at ffff888102a5cdc0
[   23.746121]  which belongs to the cache kmalloc-32 of size 32
[   23.746785] The buggy address is located 0 bytes inside of
[   23.746785]  freed 32-byte region [ffff888102a5cdc0, ffff888102a5cde0)
[   23.748454] 
[   23.748629] The buggy address belongs to the physical page:
[   23.748919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5c
[   23.749677] flags: 0x200000000000000(node=0|zone=2)
[   23.750351] page_type: f5(slab)
[   23.750750] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   23.751659] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.752049] page dumped because: kasan: bad access detected
[   23.752361] 
[   23.752572] Memory state around the buggy address:
[   23.753030]  ffff888102a5cc80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.754037]  ffff888102a5cd00: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc
[   23.755244] >ffff888102a5cd80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   23.756299]                                            ^
[   23.756648]  ffff888102a5ce00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.757020]  ffff888102a5ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.758030] ==================================================================

test log snippet boot parser 54

[   25.717826] ==================================================================
[   25.720607] BUG: KASAN: slab-use-after-free in strcmp+0xb0/0xc0
[   25.721786] Read of size 1 at addr ffff888102a6d650 by task kunit_try_catch/267
[   25.722360] 
[   25.722554] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.722670] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.722707] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.722767] Call Trace:
[   25.722803]  <TASK>
[   25.722847]  dump_stack_lvl+0x73/0xb0
[   25.722935]  print_report+0xd1/0x640
[   25.722997]  ? __virt_addr_valid+0x1db/0x2d0
[   25.723059]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.723127]  kasan_report+0x102/0x140
[   25.723199]  ? strcmp+0xb0/0xc0
[   25.723253]  ? strcmp+0xb0/0xc0
[   25.723306]  __asan_report_load1_noabort+0x18/0x20
[   25.723366]  strcmp+0xb0/0xc0
[   25.723422]  kasan_strings+0x2d3/0xb60
[   25.723475]  ? __pfx_kasan_strings+0x10/0x10
[   25.723533]  ? __pfx_kasan_strings+0x10/0x10
[   25.723586]  kunit_try_run_case+0x1b3/0x490
[   25.723727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.723765]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.723801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.723835]  ? __kthread_parkme+0x82/0x160
[   25.723868]  ? preempt_count_sub+0x50/0x80
[   25.723917]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.723949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.723986]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.724022]  kthread+0x324/0x6d0
[   25.724052]  ? trace_preempt_on+0x20/0xc0
[   25.724084]  ? __pfx_kthread+0x10/0x10
[   25.724174]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.724210]  ? calculate_sigpending+0x7b/0xa0
[   25.724242]  ? __pfx_kthread+0x10/0x10
[   25.724289]  ret_from_fork+0x41/0x80
[   25.724329]  ? __pfx_kthread+0x10/0x10
[   25.724373]  ret_from_fork_asm+0x1a/0x30
[   25.724439]  </TASK>
[   25.724462] 
[   25.741141] Allocated by task 267:
[   25.741660]  kasan_save_stack+0x3d/0x60
[   25.742393]  kasan_save_track+0x18/0x40
[   25.742674]  kasan_save_alloc_info+0x3b/0x50
[   25.743489]  __kasan_kmalloc+0xb7/0xc0
[   25.743830]  __kmalloc_cache_noprof+0x184/0x410
[   25.744797]  kasan_strings+0xb9/0xb60
[   25.745199]  kunit_try_run_case+0x1b3/0x490
[   25.746097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.747035]  kthread+0x324/0x6d0
[   25.747641]  ret_from_fork+0x41/0x80
[   25.747898]  ret_from_fork_asm+0x1a/0x30
[   25.748461] 
[   25.748686] Freed by task 267:
[   25.749022]  kasan_save_stack+0x3d/0x60
[   25.749775]  kasan_save_track+0x18/0x40
[   25.750191]  kasan_save_free_info+0x3f/0x60
[   25.750831]  __kasan_slab_free+0x56/0x70
[   25.751549]  kfree+0x224/0x3f0
[   25.752794]  kasan_strings+0x13c/0xb60
[   25.753293]  kunit_try_run_case+0x1b3/0x490
[   25.753722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.753919]  kthread+0x324/0x6d0
[   25.754049]  ret_from_fork+0x41/0x80
[   25.754438]  ret_from_fork_asm+0x1a/0x30
[   25.754850] 
[   25.755079] The buggy address belongs to the object at ffff888102a6d640
[   25.755079]  which belongs to the cache kmalloc-32 of size 32
[   25.756113] The buggy address is located 16 bytes inside of
[   25.756113]  freed 32-byte region [ffff888102a6d640, ffff888102a6d660)
[   25.757998] 
[   25.758266] The buggy address belongs to the physical page:
[   25.759179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6d
[   25.759870] flags: 0x200000000000000(node=0|zone=2)
[   25.760686] page_type: f5(slab)
[   25.761511] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   25.762311] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.762964] page dumped because: kasan: bad access detected
[   25.763461] 
[   25.763660] Memory state around the buggy address:
[   25.764053]  ffff888102a6d500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.764744]  ffff888102a6d580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   25.765285] >ffff888102a6d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.766213]                                                  ^
[   25.766525]  ffff888102a6d680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.767920]  ffff888102a6d700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.769794] ==================================================================

test log snippet boot parser 55

[   25.824193] ==================================================================
[   25.824731] BUG: KASAN: slab-use-after-free in strlen+0x8f/0xb0
[   25.826152] Read of size 1 at addr ffff888102a6d650 by task kunit_try_catch/267
[   25.827133] 
[   25.827799] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.827933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.827969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.828030] Call Trace:
[   25.828070]  <TASK>
[   25.828116]  dump_stack_lvl+0x73/0xb0
[   25.828231]  print_report+0xd1/0x640
[   25.828546]  ? __virt_addr_valid+0x1db/0x2d0
[   25.828609]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.828666]  kasan_report+0x102/0x140
[   25.828704]  ? strlen+0x8f/0xb0
[   25.828743]  ? strlen+0x8f/0xb0
[   25.828788]  __asan_report_load1_noabort+0x18/0x20
[   25.828834]  strlen+0x8f/0xb0
[   25.828873]  kasan_strings+0x425/0xb60
[   25.828918]  ? __pfx_kasan_strings+0x10/0x10
[   25.828971]  ? __pfx_kasan_strings+0x10/0x10
[   25.829032]  kunit_try_run_case+0x1b3/0x490
[   25.829090]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.829145]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.829282]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.829347]  ? __kthread_parkme+0x82/0x160
[   25.829399]  ? preempt_count_sub+0x50/0x80
[   25.829438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.829471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.829508]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.829545]  kthread+0x324/0x6d0
[   25.829573]  ? trace_preempt_on+0x20/0xc0
[   25.829648]  ? __pfx_kthread+0x10/0x10
[   25.829680]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.829711]  ? calculate_sigpending+0x7b/0xa0
[   25.829742]  ? __pfx_kthread+0x10/0x10
[   25.829773]  ret_from_fork+0x41/0x80
[   25.829799]  ? __pfx_kthread+0x10/0x10
[   25.829830]  ret_from_fork_asm+0x1a/0x30
[   25.829875]  </TASK>
[   25.829891] 
[   25.848056] Allocated by task 267:
[   25.849201]  kasan_save_stack+0x3d/0x60
[   25.850262]  kasan_save_track+0x18/0x40
[   25.850646]  kasan_save_alloc_info+0x3b/0x50
[   25.850969]  __kasan_kmalloc+0xb7/0xc0
[   25.851502]  __kmalloc_cache_noprof+0x184/0x410
[   25.851905]  kasan_strings+0xb9/0xb60
[   25.852470]  kunit_try_run_case+0x1b3/0x490
[   25.852796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.854088]  kthread+0x324/0x6d0
[   25.854559]  ret_from_fork+0x41/0x80
[   25.854869]  ret_from_fork_asm+0x1a/0x30
[   25.855688] 
[   25.855844] Freed by task 267:
[   25.856079]  kasan_save_stack+0x3d/0x60
[   25.856833]  kasan_save_track+0x18/0x40
[   25.857071]  kasan_save_free_info+0x3f/0x60
[   25.858546]  __kasan_slab_free+0x56/0x70
[   25.858865]  kfree+0x224/0x3f0
[   25.859135]  kasan_strings+0x13c/0xb60
[   25.859767]  kunit_try_run_case+0x1b3/0x490
[   25.860198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.860594]  kthread+0x324/0x6d0
[   25.860952]  ret_from_fork+0x41/0x80
[   25.861924]  ret_from_fork_asm+0x1a/0x30
[   25.862557] 
[   25.862782] The buggy address belongs to the object at ffff888102a6d640
[   25.862782]  which belongs to the cache kmalloc-32 of size 32
[   25.864687] The buggy address is located 16 bytes inside of
[   25.864687]  freed 32-byte region [ffff888102a6d640, ffff888102a6d660)
[   25.865863] 
[   25.866074] The buggy address belongs to the physical page:
[   25.867247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6d
[   25.868132] flags: 0x200000000000000(node=0|zone=2)
[   25.869733] page_type: f5(slab)
[   25.870076] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   25.871053] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.871650] page dumped because: kasan: bad access detected
[   25.872071] 
[   25.872538] Memory state around the buggy address:
[   25.872873]  ffff888102a6d500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.873438]  ffff888102a6d580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   25.874582] >ffff888102a6d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.875057]                                                  ^
[   25.876474]  ffff888102a6d680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.877373]  ffff888102a6d700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.878051] ==================================================================

test log snippet boot parser 56

[   25.879266] ==================================================================
[   25.880109] BUG: KASAN: slab-use-after-free in strnlen+0x73/0x80
[   25.880601] Read of size 1 at addr ffff888102a6d650 by task kunit_try_catch/267
[   25.881625] 
[   25.882877] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.883004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.883029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.883064] Call Trace:
[   25.883089]  <TASK>
[   25.883132]  dump_stack_lvl+0x73/0xb0
[   25.883206]  print_report+0xd1/0x640
[   25.883236]  ? __virt_addr_valid+0x1db/0x2d0
[   25.883271]  ? kasan_complete_mode_report_info+0x64/0x200
[   25.883309]  kasan_report+0x102/0x140
[   25.883349]  ? strnlen+0x73/0x80
[   25.883397]  ? strnlen+0x73/0x80
[   25.883446]  __asan_report_load1_noabort+0x18/0x20
[   25.883486]  strnlen+0x73/0x80
[   25.883516]  kasan_strings+0x4c3/0xb60
[   25.883546]  ? __pfx_kasan_strings+0x10/0x10
[   25.883577]  ? __pfx_kasan_strings+0x10/0x10
[   25.883610]  kunit_try_run_case+0x1b3/0x490
[   25.883641]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.883669]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.883702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.883735]  ? __kthread_parkme+0x82/0x160
[   25.883765]  ? preempt_count_sub+0x50/0x80
[   25.883801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.883831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.883866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.883915]  kthread+0x324/0x6d0
[   25.883943]  ? trace_preempt_on+0x20/0xc0
[   25.883976]  ? __pfx_kthread+0x10/0x10
[   25.884006]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.884037]  ? calculate_sigpending+0x7b/0xa0
[   25.884067]  ? __pfx_kthread+0x10/0x10
[   25.884097]  ret_from_fork+0x41/0x80
[   25.884123]  ? __pfx_kthread+0x10/0x10
[   25.884152]  ret_from_fork_asm+0x1a/0x30
[   25.884248]  </TASK>
[   25.884296] 
[   25.897511] Allocated by task 267:
[   25.897960]  kasan_save_stack+0x3d/0x60
[   25.898575]  kasan_save_track+0x18/0x40
[   25.899001]  kasan_save_alloc_info+0x3b/0x50
[   25.899673]  __kasan_kmalloc+0xb7/0xc0
[   25.900097]  __kmalloc_cache_noprof+0x184/0x410
[   25.900569]  kasan_strings+0xb9/0xb60
[   25.900957]  kunit_try_run_case+0x1b3/0x490
[   25.902154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.902831]  kthread+0x324/0x6d0
[   25.903123]  ret_from_fork+0x41/0x80
[   25.903680]  ret_from_fork_asm+0x1a/0x30
[   25.904017] 
[   25.904236] Freed by task 267:
[   25.904632]  kasan_save_stack+0x3d/0x60
[   25.905018]  kasan_save_track+0x18/0x40
[   25.905618]  kasan_save_free_info+0x3f/0x60
[   25.906049]  __kasan_slab_free+0x56/0x70
[   25.907122]  kfree+0x224/0x3f0
[   25.907502]  kasan_strings+0x13c/0xb60
[   25.907908]  kunit_try_run_case+0x1b3/0x490
[   25.908225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.908546]  kthread+0x324/0x6d0
[   25.908788]  ret_from_fork+0x41/0x80
[   25.909033]  ret_from_fork_asm+0x1a/0x30
[   25.909692] 
[   25.909922] The buggy address belongs to the object at ffff888102a6d640
[   25.909922]  which belongs to the cache kmalloc-32 of size 32
[   25.911181] The buggy address is located 16 bytes inside of
[   25.911181]  freed 32-byte region [ffff888102a6d640, ffff888102a6d660)
[   25.912979] 
[   25.913391] The buggy address belongs to the physical page:
[   25.913910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a6d
[   25.915460] flags: 0x200000000000000(node=0|zone=2)
[   25.915946] page_type: f5(slab)
[   25.916289] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   25.916738] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   25.917106] page dumped because: kasan: bad access detected
[   25.918969] 
[   25.919241] Memory state around the buggy address:
[   25.919911]  ffff888102a6d500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.921458]  ffff888102a6d580: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc
[   25.921875] >ffff888102a6d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.922468]                                                  ^
[   25.922958]  ffff888102a6d680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   25.923756]  ffff888102a6d700: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc
[   25.924482] ==================================================================

test log snippet boot parser 57

[   23.768432] ==================================================================
[   23.769488] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x4d8/0x560
[   23.769962] Read of size 8 at addr ffff888102a5ce80 by task kunit_try_catch/208
[   23.770700] 
[   23.770866] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   23.770970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.771000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.771048] Call Trace:
[   23.771188]  <TASK>
[   23.771240]  dump_stack_lvl+0x73/0xb0
[   23.771320]  print_report+0xd1/0x640
[   23.771372]  ? __virt_addr_valid+0x1db/0x2d0
[   23.771432]  ? kasan_complete_mode_report_info+0x64/0x200
[   23.771501]  kasan_report+0x102/0x140
[   23.771551]  ? workqueue_uaf+0x4d8/0x560
[   23.771605]  ? workqueue_uaf+0x4d8/0x560
[   23.771661]  __asan_report_load8_noabort+0x18/0x20
[   23.771755]  workqueue_uaf+0x4d8/0x560
[   23.771819]  ? __pfx_workqueue_uaf+0x10/0x10
[   23.771869]  ? __schedule+0xcdc/0x2830
[   23.771936]  ? __pfx_read_tsc+0x10/0x10
[   23.771989]  ? ktime_get_ts64+0x86/0x230
[   23.772053]  kunit_try_run_case+0x1b3/0x490
[   23.772148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.772229]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   23.772336]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.772399]  ? __kthread_parkme+0x82/0x160
[   23.772455]  ? preempt_count_sub+0x50/0x80
[   23.772514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.772562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.772620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.772684]  kthread+0x324/0x6d0
[   23.772734]  ? trace_preempt_on+0x20/0xc0
[   23.772834]  ? __pfx_kthread+0x10/0x10
[   23.772895]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.772952]  ? calculate_sigpending+0x7b/0xa0
[   23.773005]  ? __pfx_kthread+0x10/0x10
[   23.773054]  ret_from_fork+0x41/0x80
[   23.773135]  ? __pfx_kthread+0x10/0x10
[   23.773220]  ret_from_fork_asm+0x1a/0x30
[   23.773382]  </TASK>
[   23.773469] 
[   23.788679] Allocated by task 208:
[   23.789068]  kasan_save_stack+0x3d/0x60
[   23.789725]  kasan_save_track+0x18/0x40
[   23.790182]  kasan_save_alloc_info+0x3b/0x50
[   23.790759]  __kasan_kmalloc+0xb7/0xc0
[   23.791152]  __kmalloc_cache_noprof+0x184/0x410
[   23.791684]  workqueue_uaf+0x153/0x560
[   23.794904]  kunit_try_run_case+0x1b3/0x490
[   23.796387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.797872]  kthread+0x324/0x6d0
[   23.798584]  ret_from_fork+0x41/0x80
[   23.800065]  ret_from_fork_asm+0x1a/0x30
[   23.801005] 
[   23.802699] Freed by task 42:
[   23.803581]  kasan_save_stack+0x3d/0x60
[   23.804949]  kasan_save_track+0x18/0x40
[   23.805472]  kasan_save_free_info+0x3f/0x60
[   23.805731]  __kasan_slab_free+0x56/0x70
[   23.805964]  kfree+0x224/0x3f0
[   23.806765]  workqueue_uaf_work+0x12/0x20
[   23.808334]  process_one_work+0x5ee/0xf60
[   23.808937]  worker_thread+0x720/0x1300
[   23.809758]  kthread+0x324/0x6d0
[   23.810050]  ret_from_fork+0x41/0x80
[   23.810695]  ret_from_fork_asm+0x1a/0x30
[   23.811109] 
[   23.811358] Last potentially related work creation:
[   23.812370]  kasan_save_stack+0x3d/0x60
[   23.813025]  kasan_record_aux_stack+0xb2/0xc0
[   23.813318]  __queue_work+0x626/0xe60
[   23.813944]  queue_work_on+0x74/0xa0
[   23.814635]  workqueue_uaf+0x26e/0x560
[   23.815537]  kunit_try_run_case+0x1b3/0x490
[   23.815853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.816557]  kthread+0x324/0x6d0
[   23.816850]  ret_from_fork+0x41/0x80
[   23.817671]  ret_from_fork_asm+0x1a/0x30
[   23.818252] 
[   23.818616] The buggy address belongs to the object at ffff888102a5ce80
[   23.818616]  which belongs to the cache kmalloc-32 of size 32
[   23.819831] The buggy address is located 0 bytes inside of
[   23.819831]  freed 32-byte region [ffff888102a5ce80, ffff888102a5cea0)
[   23.820738] 
[   23.820897] The buggy address belongs to the physical page:
[   23.821791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a5c
[   23.823151] flags: 0x200000000000000(node=0|zone=2)
[   23.823867] page_type: f5(slab)
[   23.824110] raw: 0200000000000000 ffff888100041780 dead000000000122 0000000000000000
[   23.825146] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000
[   23.825998] page dumped because: kasan: bad access detected
[   23.826554] 
[   23.826770] Memory state around the buggy address:
[   23.827196]  ffff888102a5cd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   23.827753]  ffff888102a5ce00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc
[   23.828238] >ffff888102a5ce80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc
[   23.828587]                    ^
[   23.828874]  ffff888102a5cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.829766]  ffff888102a5cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.830432] ==================================================================

test log snippet boot parser 58

[   21.700794] ==================================================================
[   21.701773] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2f3/0x340
[   21.702448] Read of size 1 at addr ffff888102910000 by task kunit_try_catch/156
[   21.703480] 
[   21.704394] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   21.704516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.704548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.704581] Call Trace:
[   21.704599]  <TASK>
[   21.704625]  dump_stack_lvl+0x73/0xb0
[   21.704678]  print_report+0xd1/0x640
[   21.704708]  ? __virt_addr_valid+0x1db/0x2d0
[   21.704740]  ? kasan_addr_to_slab+0x11/0xa0
[   21.704775]  kasan_report+0x102/0x140
[   21.704800]  ? kmalloc_large_uaf+0x2f3/0x340
[   21.704832]  ? kmalloc_large_uaf+0x2f3/0x340
[   21.704870]  __asan_report_load1_noabort+0x18/0x20
[   21.704901]  kmalloc_large_uaf+0x2f3/0x340
[   21.704931]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   21.704966]  ? __pfx_kmalloc_large_uaf+0x10/0x10
[   21.705003]  kunit_try_run_case+0x1b3/0x490
[   21.705034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.705061]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   21.705099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.705236]  ? __kthread_parkme+0x82/0x160
[   21.705314]  ? preempt_count_sub+0x50/0x80
[   21.705383]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.705462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.705520]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.705558]  kthread+0x324/0x6d0
[   21.705587]  ? trace_preempt_on+0x20/0xc0
[   21.705620]  ? __pfx_kthread+0x10/0x10
[   21.705649]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.705681]  ? calculate_sigpending+0x7b/0xa0
[   21.705711]  ? __pfx_kthread+0x10/0x10
[   21.705741]  ret_from_fork+0x41/0x80
[   21.705767]  ? __pfx_kthread+0x10/0x10
[   21.705797]  ret_from_fork_asm+0x1a/0x30
[   21.705841]  </TASK>
[   21.705858] 
[   21.724026] The buggy address belongs to the physical page:
[   21.724402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102910
[   21.724814] flags: 0x200000000000000(node=0|zone=2)
[   21.725919] raw: 0200000000000000 ffffea00040a4508 ffff88815b13f040 0000000000000000
[   21.726980] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[   21.728122] page dumped because: kasan: bad access detected
[   21.728682] 
[   21.729062] Memory state around the buggy address:
[   21.729468]  ffff88810290ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.730188]  ffff88810290ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.730968] >ffff888102910000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.731465]                    ^
[   21.731985]  ffff888102910080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.732775]  ffff888102910100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   21.733472] ==================================================================

test log snippet boot parser 59

[   25.145241] ==================================================================
[   25.146260] BUG: KASAN: use-after-free in mempool_uaf_helper+0x394/0x400
[   25.147252] Read of size 1 at addr ffff888102d68000 by task kunit_try_catch/241
[   25.148346] 
[   25.148622] CPU: 1 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G    B            N 6.13.0 #1
[   25.148756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.148793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.148853] Call Trace:
[   25.148893]  <TASK>
[   25.148942]  dump_stack_lvl+0x73/0xb0
[   25.149142]  print_report+0xd1/0x640
[   25.149219]  ? __virt_addr_valid+0x1db/0x2d0
[   25.149259]  ? kasan_addr_to_slab+0x11/0xa0
[   25.149297]  kasan_report+0x102/0x140
[   25.149323]  ? mempool_uaf_helper+0x394/0x400
[   25.149358]  ? mempool_uaf_helper+0x394/0x400
[   25.149393]  __asan_report_load1_noabort+0x18/0x20
[   25.149426]  mempool_uaf_helper+0x394/0x400
[   25.149457]  ? __pfx_mempool_uaf_helper+0x10/0x10
[   25.149492]  ? finish_task_switch.isra.0+0x153/0x700
[   25.149533]  mempool_page_alloc_uaf+0xb1/0x100
[   25.149566]  ? __pfx_mempool_page_alloc_uaf+0x10/0x10
[   25.149619]  ? __switch_to+0x5d9/0xf60
[   25.149661]  ? __pfx_mempool_alloc_pages+0x10/0x10
[   25.149698]  ? __pfx_mempool_free_pages+0x10/0x10
[   25.149735]  ? __pfx_read_tsc+0x10/0x10
[   25.149767]  ? ktime_get_ts64+0x86/0x230
[   25.149802]  kunit_try_run_case+0x1b3/0x490
[   25.149836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.149865]  ? _raw_spin_lock_irqsave+0xa2/0x110
[   25.149901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.149934]  ? __kthread_parkme+0x82/0x160
[   25.149967]  ? preempt_count_sub+0x50/0x80
[   25.150002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.150033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.150068]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.150105]  kthread+0x324/0x6d0
[   25.150133]  ? trace_preempt_on+0x20/0xc0
[   25.150193]  ? __pfx_kthread+0x10/0x10
[   25.150241]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.150293]  ? calculate_sigpending+0x7b/0xa0
[   25.150345]  ? __pfx_kthread+0x10/0x10
[   25.150401]  ret_from_fork+0x41/0x80
[   25.150453]  ? __pfx_kthread+0x10/0x10
[   25.150512]  ret_from_fork_asm+0x1a/0x30
[   25.150600]  </TASK>
[   25.150635] 
[   25.169765] The buggy address belongs to the physical page:
[   25.170575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102d68
[   25.171400] flags: 0x200000000000000(node=0|zone=2)
[   25.171753] raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
[   25.172568] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   25.173487] page dumped because: kasan: bad access detected
[   25.174062] 
[   25.174536] Memory state around the buggy address:
[   25.174994]  ffff888102d67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.175867]  ffff888102d67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.176945] >ffff888102d68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.177710]                    ^
[   25.177940]  ffff888102d68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.178675]  ffff888102d68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.179713] ==================================================================

test log snippet boot parser 60

------------[ cut here ]------------
[    4.016815] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
[    4.019866] WARNING: CPU: 1 PID: 23 at kernel/smp.c:815 smp_call_function_many_cond+0x554/0x5dc
[    4.025451] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 1
[    4.034149] Modules linked in:
[    4.044921] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0 #1
[    4.044921] Hardware name: Generic DRA74X (Flattened Device Tree)
[    4.044952] Call trace: 
[    4.044952]  unwind_backtrace from show_stack+0x10/0x14
[    4.044952]  show_stack from dump_stack_lvl+0x54/0x68
[    4.044982]  dump_stack_lvl from __warn+0x7c/0x128
[    4.044982]  __warn from warn_slowpath_fmt+0x184/0x18c
[    4.045013]  warn_slowpath_fmt from smp_call_function_many_cond+0x554/0x5dc
[    4.045013]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    4.045013]  smp_call_function from set_memory_valid+0x7c/0xbc
[    4.045043]  set_memory_valid from kfence_guarded_free+0x168/0x300
[    4.045043]  kfence_guarded_free from rcu_core+0x2b8/0x964
[    4.045074]  rcu_core from handle_softirqs+0x108/0x344
[    4.045074]  handle_softirqs from run_ksoftirqd+0x30/0x3c
[    4.045104]  run_ksoftirqd from smpboot_thread_fn+0xb8/0x154
[    4.045104]  smpboot_thread_fn from kthread+0xf8/0x248
[    4.045135]  kthread from ret_from_fork+0x14/0x38
[    4.045135] Exception stack(0xf0069fb0 to 0xf0069ff8)
[    4.045135] 9fa0:                                     00000000 00000000 00000000 00000000
[    4.045135] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.045166] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    4.045166] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 61

------------[ cut here ]------------
[    4.016815] xhci-hcd xhci-hcd.1.auto: xHCI Host Controller
[    4.019866] WARNING: CPU: 1 PID: 23 at kernel/smp.c:815 smp_call_function_many_cond+0x554/0x5dc
[    4.025451] xhci-hcd xhci-hcd.1.auto: new USB bus registered, assigned bus number 1
[    4.034149] Modules linked in:
[    4.044921] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0 #1
[    4.044921] Hardware name: Generic DRA74X (Flattened Device Tree)
[    4.044952] Call trace: 
[    4.044952]  unwind_backtrace from show_stack+0x10/0x14
[    4.044952]  show_stack from dump_stack_lvl+0x54/0x68
[    4.044982]  dump_stack_lvl from __warn+0x7c/0x128
[    4.044982]  __warn from warn_slowpath_fmt+0x184/0x18c
[    4.045013]  warn_slowpath_fmt from smp_call_function_many_cond+0x554/0x5dc
[    4.045013]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    4.045013]  smp_call_function from set_memory_valid+0x7c/0xbc
[    4.045043]  set_memory_valid from kfence_guarded_free+0x168/0x300
[    4.045043]  kfence_guarded_free from rcu_core+0x2b8/0x964
[    4.045074]  rcu_core from handle_softirqs+0x108/0x344
[    4.045074]  handle_softirqs from run_ksoftirqd+0x30/0x3c
[    4.045104]  run_ksoftirqd from smpboot_thread_fn+0xb8/0x154
[    4.045104]  smpboot_thread_fn from kthread+0xf8/0x248
[    4.045135]  kthread from ret_from_fork+0x14/0x38
[    4.045135] Exception stack(0xf0069fb0 to 0xf0069ff8)
[    4.045135] 9fa0:                                     00000000 00000000 00000000 00000000
[    4.045135] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.045166] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    4.045166] ---[ end trace 0000000000000000 ]---

test log snippet boot parser 62

------------[ cut here ]------------
[    7.457641] WARNING: CPU: 1 PID: 164 at kernel/smp.c:815 smp_call_function_many_cond+0x564/0x5e8
[    7.466522] Modules linked in:
[    7.466522] CPU: 1 UID: 0 PID: 164 Comm: udevadm Not tainted 6.13.0 #1
[    7.466552] Hardware name: Generic DRA74X (Flattened Device Tree)
[    7.466552] Call trace: 
[    7.466552]  unwind_backtrace from show_stack+0x18/0x1c
[    7.466583]  show_stack from dump_stack_lvl+0x6c/0x8c
[    7.466583]  dump_stack_lvl from __warn+0x84/0x130
[    7.466583]  __warn from warn_slowpath_fmt+0x18c/0x194
[    7.466613]  warn_slowpath_fmt from smp_call_function_many_cond+0x564/0x5e8
[    7.466613]  smp_call_function_many_cond from smp_call_function+0x34/0x3c
[    7.466644]  smp_call_function from set_memory_valid+0x84/0xc0
[    7.466644]  set_memory_valid from kfence_guarded_free+0x170/0x2dc
[    7.466674]  kfence_guarded_free from kmem_cache_free+0x364/0x424
[    7.466674]  kmem_cache_free from rcu_core+0x2d8/0x9fc
[    7.466705]  rcu_core from handle_softirqs+0x14c/0x3d0
[    7.466705]  handle_softirqs from __irq_exit_rcu+0xa0/0x114
[    7.466705]  __irq_exit_rcu from irq_exit+0x10/0x30
[    7.466735]  irq_exit from call_with_stack+0x18/0x20
[    7.466735]  call_with_stack from __irq_usr+0x84/0xa0
[    7.466766] Exception stack(0xf2031fb0 to 0xf2031ff8)
[    7.466766] 1fa0:                                     00000000 b6eb7758 00001800 000007ff
[    7.466766] 1fc0: beaba4d8 beaba700 00001000 00554ac8 00000009 beaba680 beaba690 beaba770
[    7.466766] 1fe0: 0000018d beaba450 b6e53afb b6e53afa 200f0030 ffffffff
[    7.466796] ---[ end trace 0000000000000000 ]---

test log snippet test parser 1

------------[ cut here ]------------
[   50.517974] WARNING: CPU: 0 PID: 467 at mm/util.c:674 __kvmalloc_node_noprof+0x11c/0x124
[   50.519867] Modules linked in: sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 drm fuse backlight ip_tables x_tables
[   50.523421] CPU: 0 UID: 0 PID: 467 Comm: unshare_test Not tainted 6.13.0 #1
[   50.524644] Hardware name: linux,dummy-virt (DT)
[   50.525480] pstate: 23402009 (nzCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
[   50.526561] pc : __kvmalloc_node_noprof+0x11c/0x124
[   50.527168] lr : __kvmalloc_node_noprof+0x50/0x124
[   50.527709] sp : ffff800080a5bce0
[   50.528133] x29: ffff800080a5bcf0 x28: fff8c01d0539ca00 x27: 0000000000000000
[   50.528978] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[   50.529422] x23: 0000000080001000 x22: 5bbf9f0bef15edd0 x21: 0000000200001e00
[   50.531124] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[   50.531907] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[   50.532741] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[   50.534243] x11: 0000000000000040 x10: ca8da65740b0ce00 x9 : ca8da65740b0ce00
[   50.535341] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[   50.536069] x5 : 0000000000000000 x4 : ffff800080a5bcb0 x3 : 0000000000000000
[   50.536613] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[   50.538462] Call trace:
[   50.538987]  __kvmalloc_node_noprof+0x11c/0x124 (P)
[   50.539693]  alloc_fdtable+0x74/0x118
[   50.541148]  expand_files+0x114/0x2e0
[   50.542193]  ksys_dup3+0x64/0xe8
[   50.542675]  __arm64_sys_dup3+0x20/0x30
[   50.544059]  invoke_syscall+0x40/0xf8
[   50.544324]  el0_svc_common+0xa8/0xd8
[   50.544572]  do_el0_svc+0x1c/0x28
[   50.544806]  el0_svc+0x38/0x68
[   50.545065]  el0t_64_sync_handler+0x78/0x108
[   50.545350]  el0t_64_sync+0x198/0x19c
[   50.546055] ---[ end trace 0000000000000000 ]---

test log snippet test parser 2

[  150.594640] BUG: scheduling while atomic: kworker/u8:1/13/0x00000003

test log snippet test parser 3

[  150.594640] BUG: scheduling while atomic: kworker/u8:1/13/0x00000003

test log snippet test parser 4

[   71.265438] BUG: scheduling while atomic: systemd-journal/114/0x00000003

test log snippet test parser 5

[   71.265438] BUG: scheduling while atomic: systemd-journal/114/0x00000003

test log snippet test parser 6

[  128.148792] BUG: scheduling while atomic: cron/180/0x00000003

test log snippet test parser 7

[  128.148792] BUG: scheduling while atomic: cron/180/0x00000003

test log snippet test parser 8

[   75.214022] BUG: scheduling while atomic: ftrace_stress_t/326/0x00000003
[   75.372568] BUG: scheduling while atomic: ftrace_stress_t/304/0x00000003

test log snippet test parser 9

[   75.214022] BUG: scheduling while atomic: ftrace_stress_t/326/0x00000003
---
[   75.372568] BUG: scheduling while atomic: ftrace_stress_t/304/0x00000003

test log snippet test parser 10

[   75.424578] BUG: scheduling while atomic: kcompactd0/39/0x00000003

test log snippet test parser 11

[   75.424578] BUG: scheduling while atomic: kcompactd0/39/0x00000003

test log snippet test parser 12

[  121.946927] BUG: scheduling while atomic: khungtaskd/36/0x00000003

test log snippet test parser 13

[  121.946927] BUG: scheduling while atomic: khungtaskd/36/0x00000003

test log snippet test parser 14

[   75.334959] BUG: scheduling while atomic: ksoftirqd/0/16/0x00000003

test log snippet test parser 15

[   75.334959] BUG: scheduling while atomic: ksoftirqd/0/16/0x00000003

test log snippet test parser 16

[   75.355282] BUG: scheduling while atomic: kworker/0:1/10/0x00000003

test log snippet test parser 17

[   75.355282] BUG: scheduling while atomic: kworker/0:1/10/0x00000003

test log snippet test parser 18

[   77.369797] BUG: scheduling while atomic: kworker/u9:3/119/0x00000003

test log snippet test parser 19

[   77.369797] BUG: scheduling while atomic: kworker/u9:3/119/0x00000003

test log snippet test parser 20

[   75.118753] BUG: scheduling while atomic: migration/0/20/0x00000003

test log snippet test parser 21

[   75.118753] BUG: scheduling while atomic: migration/0/20/0x00000003

test log snippet test parser 22

[   75.509950] BUG: scheduling while atomic: rcu_sched/17/0x00000003

test log snippet test parser 23

[   75.509950] BUG: scheduling while atomic: rcu_sched/17/0x00000003

test log snippet test parser 24

[   75.237725] BUG: scheduling while atomic: sh/324/0x00000003
[   75.515748] BUG: scheduling while atomic: sh/325/0x00000003
[   75.260748] BUG: scheduling while atomic: sh/319/0x00000003

test log snippet test parser 25

[   75.237725] BUG: scheduling while atomic: sh/324/0x00000003
---
[   75.515748] BUG: scheduling while atomic: sh/325/0x00000003
---
[   75.260748] BUG: scheduling while atomic: sh/319/0x00000003

test log snippet test parser 26

[   75.283727] BUG: scheduling while atomic: swapper/0/0/0x00000003

test log snippet test parser 27

[   75.283727] BUG: scheduling while atomic: swapper/0/0/0x00000003

test log snippet test parser 28

[  145.963182] BUG: scheduling while atomic: systemd-udevd/157/0x00000003

test log snippet test parser 29

[  145.963182] BUG: scheduling while atomic: systemd-udevd/157/0x00000003

test log snippet test parser 30

[   75.135108] BUG: scheduling while atomic: tee/268/0x00000003

test log snippet test parser 31

[   75.135108] BUG: scheduling while atomic: tee/268/0x00000003

test log snippet test parser 32

[   75.388578] BUG: scheduling while atomic: tst_sleep/322/0x00000003

test log snippet test parser 33

[   75.388578] BUG: scheduling while atomic: tst_sleep/322/0x00000003

test log snippet test parser 34

------------[ cut here ]------------
[   45.706594] WARNING: CPU: 1 PID: 481 at mm/util.c:674 __kvmalloc_node_noprof+0xdf/0xf0
[   45.708236] Modules linked in:
[   45.709348] CPU: 1 UID: 0 PID: 481 Comm: unshare_test Not tainted 6.13.0 #1
[   45.710219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   45.711531] RIP: 0010:__kvmalloc_node_noprof+0xdf/0xf0
[   45.712235] Code: 89 f0 ff 75 08 53 68 00 04 00 00 e8 9b 38 04 00 48 83 c4 18 5b 41 5e 41 5f 5d c3 cc cc cc cc cc 41 f7 c6 00 20 00 00 75 81 90 <0f> 0b 90 31 c0 eb e3 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90
[   45.713612] RSP: 0018:ffff9b16c0677db8 EFLAGS: 00010246
[   45.714284] RAX: 0000000000000004 RBX: 00000000ffffffff RCX: 0000000400000000
[   45.714538] RDX: 0000000200001e00 RSI: 0000000000000000 RDI: ffffffffac469e38
[   45.714772] RBP: ffff9b16c0677dd0 R08: 0000000000412cc0 R09: 00000000ffffffff
[   45.715019] R10: 0000000000000000 R11: 0000000000000000 R12: 00000000400003c0
[   45.715289] R13: 00000000400003c0 R14: 0000000000400cc0 R15: 0000000200001e00
[   45.715624] FS:  00007f519697a740(0000) GS:ffff8bd17bd00000(0000) knlGS:0000000000000000
[   45.715906] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   45.716272] CR2: 00007f51969f79e0 CR3: 000000010442c000 CR4: 00000000000006f0
[   45.717753] Call Trace:
[   45.719038]  <TASK>
[   45.719924]  ? show_regs+0x5d/0x70
[   45.720401]  ? __warn+0xcf/0x1d0
[   45.720773]  ? __kvmalloc_node_noprof+0xdf/0xf0
[   45.721401]  ? report_bug+0x14c/0x1f0
[   45.721715]  ? handle_bug+0x67/0x90
[   45.722181]  ? exc_invalid_op+0x1f/0x50
[   45.722541]  ? asm_exc_invalid_op+0x1f/0x30
[   45.722982]  ? __kvmalloc_node_noprof+0x48/0xf0
[   45.723460]  ? __kvmalloc_node_noprof+0xdf/0xf0
[   45.723994]  ? __kvmalloc_node_noprof+0x48/0xf0
[   45.724447]  alloc_fdtable+0x7b/0x120
[   45.725186]  expand_files+0x114/0x300
[   45.725550]  ? do_prlimit+0x11d/0x160
[   45.726052]  ? sysvec_apic_timer_interrupt+0x4a/0x90
[   45.726561]  ksys_dup3+0x71/0xd0
[   45.726926]  __x64_sys_dup2+0x1e/0x80
[   45.727259]  x64_sys_call+0x8cf/0x2f50
[   45.727706]  do_syscall_64+0xd0/0x1a0
[   45.728115]  ? exc_page_fault+0x68/0xc0
[   45.728495]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   45.729281] RIP: 0033:0x7f5196a72c17
[   45.730179] Code: 73 01 c3 48 8b 0d 09 62 0e 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 21 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 8b 15 d9 61 0e 00 f7 d8 64 89 02 b8
[   45.731696] RSP: 002b:00007ffd8a6aedf8 EFLAGS: 00000202 ORIG_RAX: 0000000000000021
[   45.732502] RAX: ffffffffffffffda RBX: 00007ffd8a6af658 RCX: 00007f5196a72c17
[   45.733203] RDX: 00007ffd8a6aef78 RSI: 0000000040000038 RDI: 0000000000000002
[   45.734116] RBP: 00007ffd8a6af010 R08: 0000000000000064 R09: 0000000000000000
[   45.734740] R10: 00007f519698f170 R11: 0000000000000202 R12: 0000000000000000
[   45.735424] R13: 00007ffd8a6af668 R14: 00007f5196bae000 R15: 000055b6fc79ecf8
[   45.736193]  </TASK>
[   45.736705] ---[ end trace 0000000000000000 ]---

test log snippet test parser 35

------------[ cut here ]------------
[  201.670641] WARNING: CPU: 0 PID: 1461 at mm/util.c:674 __kvmalloc_node_noprof+0x11c/0x124
[  201.671374] Modules linked in: brcmfmac brcmutil cfg80211 hantro_vpu snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio v4l2_h264 v4l2_vp9 v4l2_jpeg hci_uart btqca v4l2_mem2mem rockchipdrm btbcm videobuf2_v4l2 videodev bluetooth dw_mipi_dsi snd_soc_audio_graph_card snd_soc_simple_card panfrost dw_hdmi_qp videobuf2_dma_contig snd_soc_spdif_tx reset_gpio snd_soc_simple_card_utils analogix_dp ecdh_generic gpu_sched dw_hdmi cec ecc drm_shmem_helper videobuf2_memops drm_display_helper phy_rockchip_pcie rtc_rk808 rfkill drm_dma_helper videobuf2_common snd_soc_es8316 drm_client_lib pwrseq_core snd_soc_rockchip_i2s mc drm_kms_helper rockchip_saradc coresight_cpu_debug industrialio_triggered_buffer coresight rockchip_thermal kfifo_buf pcie_rockchip_host fuse drm backlight ip_tables x_tables
[  201.677538] CPU: 0 UID: 0 PID: 1461 Comm: unshare_test Not tainted 6.13.0 #1
[  201.678162] Hardware name: Radxa ROCK Pi 4B (DT)
[  201.678570] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  201.679184] pc : __kvmalloc_node_noprof+0x11c/0x124
[  201.679623] lr : __kvmalloc_node_noprof+0x50/0x124
[  201.680050] sp : ffff800084eabce0
[  201.680344] x29: ffff800084eabcf0 x28: ffff000006732500 x27: 0000000000000000
[  201.680980] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[  201.681613] x23: 0000000080000000 x22: ffff80008035edd0 x21: 0000000200001e00
[  201.682245] x20: 0000000000400cc0 x19: 00000000ffffffff x18: 0000000000000000
[  201.682876] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  201.683508] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000739
[  201.684141] x11: 0000000000000040 x10: f088a89d0f402300 x9 : f088a89d0f402300
[  201.684773] x8 : 0000000000000004 x7 : 0000000000000000 x6 : 0000000000000000
[  201.685405] x5 : 0000000000000000 x4 : ffff800084eabcb0 x3 : 0000000000000000
[  201.686036] x2 : 0000000000000000 x1 : 0000000000000016 x0 : 0000000000000000
[  201.686668] Call trace:
[  201.686888]  __kvmalloc_node_noprof+0x11c/0x124 (P)
[  201.687328]  alloc_fdtable+0x74/0x118
[  201.687659]  expand_files+0x114/0x2e0
[  201.687987]  ksys_dup3+0x64/0xe8
[  201.688278]  __arm64_sys_dup3+0x20/0x30
[  201.688620]  invoke_syscall+0x40/0xf8
[  201.688948]  el0_svc_common+0xa8/0xd8
[  201.689275]  do_el0_svc+0x1c/0x28
[  201.689571]  el0_svc+0x38/0x68
[  201.689850]  el0t_64_sync_handler+0x78/0x108
[  201.690231]  el0t_64_sync+0x198/0x19c
[  201.690560] ---[ end trace 0000000000000000 ]---

test log snippet test parser 36

------------[ cut here ]------------
[  248.169216] WARNING: CPU: 0 PID: 1461 at mm/util.c:674 __kvmalloc_node_noprof+0x138/0x148
[  248.169945] Modules linked in: brcmfmac brcmutil cfg80211 hci_uart btqca btbcm bluetooth ecdh_generic ecc snd_soc_simple_card snd_soc_audio_graph_card snd_soc_simple_card_utils rfkill snd_soc_hdmi_codec dw_hdmi_cec dw_hdmi_i2s_audio rockchipdrm dw_hdmi_qp analogix_dp dw_mipi_dsi dw_hdmi hantro_vpu v4l2_vp9 v4l2_h264 v4l2_jpeg v4l2_mem2mem panfrost snd_soc_spdif_tx videobuf2_dma_contig reset_gpio cec videobuf2_memops drm_shmem_helper videobuf2_v4l2 drm_display_helper gpu_sched phy_rockchip_pcie videodev videobuf2_common snd_soc_rockchip_i2s snd_soc_es8316 rtc_rk808 rockchip_saradc pwrseq_core mc drm_client_lib industrialio_triggered_buffer drm_dma_helper kfifo_buf rockchip_thermal drm_kms_helper coresight_cpu_debug pcie_rockchip_host coresight drm fuse backlight ip_tables x_tables
[  248.176107] CPU: 0 UID: 0 PID: 1461 Comm: unshare_test Not tainted 6.13.0 #1
[  248.176728] Hardware name: Radxa ROCK Pi 4B (DT)
[  248.177134] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  248.177745] pc : __kvmalloc_node_noprof+0x138/0x148
[  248.178179] lr : __kvmalloc_node_noprof+0x64/0x148
[  248.178604] sp : ffff800084f73cd0
[  248.178896] x29: ffff800084f73ce0 x28: ffff00000182a500 x27: 0000000000000000
[  248.179528] x26: 0000000000000000 x25: 0000000000000000 x24: ffff000001801e40
[  248.180159] x23: ffff000001801ec0 x22: ffff80008033990c x21: 0000000200001e00
[  248.180791] x20: 00000000ffffffff x19: 0000000000400cc0 x18: 0000000000000000
[  248.181423] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
[  248.182053] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  248.182685] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[  248.183316] x8 : 0000000000000001 x7 : 0000000000000001 x6 : 0000000000000005
[  248.183947] x5 : 0000000000000000 x4 : ffff00000182a500 x3 : 0000000000000000
[  248.184578] x2 : 0000000000000000 x1 : 000000007fffffff x0 : 0000000000000000
[  248.185209] Call trace:
[  248.185428]  __kvmalloc_node_noprof+0x138/0x148 (P)
[  248.185863]  alloc_fdtable+0x84/0x128
[  248.186192]  expand_files+0x74/0x2e4
[  248.186511]  ksys_dup3+0x60/0x120
[  248.186808]  __arm64_sys_dup3+0x20/0x30
[  248.187149]  invoke_syscall+0x48/0x10c
[  248.187488]  el0_svc_common.constprop.0+0x40/0xe0
[  248.187908]  do_el0_svc+0x1c/0x28
[  248.188207]  el0_svc+0x30/0xcc
[  248.188486]  el0t_64_sync_handler+0x10c/0x138
[  248.188874]  el0t_64_sync+0x198/0x19c
[  248.189203] ---[ end trace 0000000000000000 ]---

test log snippet test parser 37

[    3.838256] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[    3.845001] Modules linked in:
[    3.848083] CPU: 1 UID: 0 PID: 45 Comm: kworker/u10:2 Not tainted 6.13.0 #1
[    3.855102] Hardware name: Generic DRA74X (Flattened Device Tree)
[    3.861206] Workqueue: events_unbound deferred_probe_work_func
[    3.867095] PC is at edma_probe+0x1024/0x1034
[    3.871459] LR is at devm_kmalloc+0xdc/0x118
[    3.875762] pc : [<c0c1c014>]    lr : [<c0df681c>]    psr: 60000013
[    3.882080] sp : f0105970  ip : 00070007  fp : efcd56f0
[    3.887329] r10: c3cd8810  r9 : 00000003  r8 : c3cd8800
[    3.892578] r7 : 00000002  r6 : c23d3b84  r5 : c2f31440  r4 : 00000001
[    3.899139] r3 : 00000001  r2 : 00000002  r1 : 00000002  r0 : c398f8c0
[    3.905700] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[    3.912872] Control: 30c5387d  Table: 80203000  DAC: 55555555
[    3.918640] Register r0 information: slab kmalloc-rnd-11-128 start c398f880 pointer offset 64 size 128
[    3.928039] Register r1 information: non-paged memory
[    3.933105] Register r2 information: non-paged memory
[    3.938201] Register r3 information: non-paged memory
[    3.943267] Register r4 information: non-paged memory
[    3.948364] Register r5 information: slab kmalloc-rnd-06-512 start c2f31400 pointer offset 64 size 512
[    3.957733] Register r6 information: non-slab/vmalloc memory
[    3.963409] Register r7 information: non-paged memory
[    3.968505] Register r8 information: slab kmalloc-rnd-04-1k start c3cd8800 pointer offset 0 size 1024
[    3.977783] Register r9 information: non-paged memory
[    3.982879] Register r10 information: slab kmalloc-rnd-04-1k start c3cd8800 pointer offset 16 size 1024
[    3.992340] Register r11 information: non-slab/vmalloc memory
[    3.998107] Register r12 information: non-paged memory
[    4.003265] Process kworker/u10:2 (pid: 45, stack limit = 0x8ed7d642)
[    4.009765] Stack: (0xf0105970 to 0xf0106000)
[    4.014129] 5960:                                     00000001 c133c0c4 c3cd8810 c23d3b84
[    4.022338] 5980: c23d3b84 3f45655f 00000001 c0b73800 c3d17340 00000000 00000001 00000000
[    4.030578] 59a0: c24d5da8 c1338a4c c1d97060 c1d32e5b efcd56f0 3f45655f c24d5da8 fc8f9ed5
[    4.038787] 59c0: f0105ab8 c13396fc ffffffff c07160d4 00000000 00000000 00000000 00000000
[    4.047027] 59e0: 00000000 00000000 00000000 00000000 00000000 02d21419 02d21419 c3cd8810
[    4.055236] 5a00: c23d3b84 c23d3b84 3f45655f c24d5da8 fc8f9ed5 f0105ab8 00000001 c0df4384
[    4.063446] 5a20: c3cd8810 c23d3b84 00000000 c0df0af0 c3cd8810 c23d3b84 c24d5db0 000000ac
[    4.071685] 5a40: 00000001 c0defc28 c3cd8810 c3cd8810 00000001 c0df0800 c3cd8810 c23d3b84
[    4.079895] 5a60: f0105ab8 00000000 c2b84e00 c0df06b8 c0df0584 c0df0584 00000000 f0105a88
[    4.088104] 5a80: 00000001 c0decca8 c2b84e6c c29ba3b8 c2b84e00 02d21419 c3cd8810 c3cd8854
[    4.096343] 5aa0: 00000000 00000001 00000000 c2b84e00 00000000 c0defa40 c3cd8810 00000001
[    4.104553] 5ac0: 00000100 02d21419 c3cd8810 c24d5d9c c2b84e00 c1a4986c c3cd8810 c0decf14
[    4.112762] 5ae0: c3cd8810 c3cdb010 00000000 c3cdb010 c3cd8810 efcd5754 00000001 c0de8614
[    4.121002] 5b00: 02d21419 00000000 00000000 00000000 c3cd8800 efcd56f0 c3cd8810 efcd5754
[    4.129211] 5b20: 00000000 c133b6a4 efcd56f0 c3cdb010 c221d330 00000000 00000000 efcd5754
[    4.137420] 5b40: c1843b7c c133b93c c2bb9c10 c3cdb010 00000000 00000000 00000000 00000000
[    4.145660] 5b60: 00000000 00000000 00000000 00000000 00000000 00000000 02d21419 efcd56f0
[    4.153869] 5b80: c221d330 c1843b7c efcd539c 00000000 c3cdb010 00000001 c24c4778 c133bbb8
[    4.162109] 5ba0: 00000001 c1d0821f c3d1cf40 efcd5520 f0105be0 00000001 00000000 c1d0821f
[    4.170318] 5bc0: c1e0e816 c0a471ec 00000000 00000000 c24d5da8 c3cdb010 c221d300 efcd539c
[    4.178527] 5be0: 00000002 00000000 43300000 00000000 43300000 00000000 00100000 00000000
[    4.186767] 5c00: 00000200 00000000 efcd539c c1b18920 ff9e8308 ff9e8308 00000001 00000001
[    4.194976] 5c20: 00000001 00000000 02d21419 c3cdb010 c230f140 c230f140 3f45655f c24d5da8
[    4.203186] 5c40: fc8f9ed5 f0105ce8 00000001 c0df4384 c3cdb010 c230f140 00000000 c0df0af0
[    4.211425] 5c60: c3cdb010 c230f140 c24d5db0 000000ac 00000001 c0defc28 c3cdb010 c3cdb010
[    4.219635] 5c80: 00000001 c0df0800 c3cdb010 c230f140 f0105ce8 00000000 c2b84e00 c0df06b8
[    4.227844] 5ca0: c0df0584 c0df0584 00000000 f0105cb8 00000001 c0decca8 c2b84e6c c3850738
[    4.236083] 5cc0: c2b84e00 02d21419 c3cdb010 c3cdb054 00000000 00000001 00000000 c2b84e00
[    4.244293] 5ce0: c221d300 c0defa40 c3cdb010 00000001 00000100 02d21419 c3cdb010 c24d5d9c
[    4.252502] 5d00: c2b84e00 c1a4986c c3cdb010 c0decf14 c3cdb010 c2bb9c10 00000000 c2bb9c10
[    4.260742] 5d20: c3cdb010 efcd5400 00000001 c0de8614 02d21419 00000000 00000000 00000000
[    4.268951] 5d40: c3cdb000 efcd539c c3cdb010 efcd5400 c221d300 c133b6a4 efcd539c c2bb9c10
[    4.277160] 5d60: c221d330 c221d300 00000000 efcd5400 00000000 c133b93c 00000000 c2bb9c10
[    4.285400] 5d80: 43300000 00000000 43300003 00000000 ff9e826c 00000200 00000000 00000000
[    4.293609] 5da0: 00000000 00000000 02d21419 efcd539c c221d330 00000000 efc693ec 00000000
[    4.301818] 5dc0: c2bb9c10 00000001 c2919e0d c133bbb8 00000001 f0105eb0 c2bb9c10 efc693ec
[    4.310058] 5de0: c3873bc0 c2bb9c00 c230f064 c221d330 f0105eb0 c0a464c8 c2bb9c10 c230f064
[    4.318267] 5e00: c230f064 3f45655f c24d5da8 fc8f9ed5 c2919e0d c0df4384 c2bb9c10 c230f064
[    4.326477] 5e20: 00000000 c0df0af0 c2bb9c10 c230f064 c24d5db0 00000001 c2919e0d c0defc28
[    4.334716] 5e40: c2bb9c10 c2bb9c10 c2919e0d c0df0800 c2bb9c10 c230f064 f0105eb0 00000000
[    4.342926] 5e60: c2b84e00 c0df06b8 c0df0584 c0df0584 00000000 f0105e80 c2919e0d c0decca8
[    4.351135] 5e80: c2b84e6c c3850538 c2b84e00 02d21419 c2bb9c10 c2bb9c54 00000000 00000001
[    4.359374] 5ea0: 00000000 c2b84e00 c2919e00 c0defa40 c2bb9c10 00000001 c2919e0d 02d21419
[    4.367584] 5ec0: c2bb9c10 c24d5d9c c2b84e00 c1a4986c 00000000 c0decf14 c23ffdb4 c2bb9c10
[    4.375793] 5ee0: c2940dd4 c23ffdd0 00000000 00000004 c2919e0d c0df0318 c29c5180 c23ffdd8
[    4.384033] 5f00: c2972a00 c2919e80 0000000a c0495454 f0105f68 c1805d2c 00000000 00000002
[    4.392242] 5f20: 02d21419 c3821280 c29c5198 c29c51d0 c29c51ac c2972a00 c29c5180 c29c51ac
[    4.400451] 5f40: c3821280 c2972a20 c246c83c 00000402 00000000 c04978c4 c2e84a80 c0497614
[    4.408691] 5f60: c29c5180 00000040 c3821964 c2e84a9c c2e84a80 c0497614 c29c5180 c3821280
[    4.416900] 5f80: 00000000 c049e4ec 00000000 00000000 c29c6080 c049e3a8 00000000 00000000
[    4.425109] 5fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[    4.433349] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.441558] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[    4.449768] Call trace: 
[    4.449798]  edma_probe from platform_probe+0xac/0xe0
[    4.457427]  platform_probe from really_probe+0x170/0x3cc
[    4.462860]  really_probe from __driver_probe_device+0x94/0xdc
[    4.468719]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.475280]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.482025]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.488525]  bus_for_each_drv from __device_attach+0xcc/0x180
[    4.494293]  __device_attach from bus_probe_device+0xac/0x128
[    4.500091]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.505523]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.512115]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.519897]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.526550]  of_platform_populate from sysc_probe+0xa88/0xb98
[    4.532348]  sysc_probe from platform_probe+0xac/0xe0
[    4.537414]  platform_probe from really_probe+0x170/0x3cc
[    4.542846]  really_probe from __driver_probe_device+0x94/0xdc
[    4.548736]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.555297]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.562042]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.568511]  bus_for_each_drv from __device_attach+0xcc/0x180
[    4.574310]  __device_attach from bus_probe_device+0xac/0x128
[    4.580078]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.585510]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.592102]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.599884]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.606536]  of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[    4.612945]  simple_pm_bus_probe from platform_probe+0xac/0xe0
[    4.618804]  platform_probe from really_probe+0x170/0x3cc
[    4.624237]  really_probe from __driver_probe_device+0x94/0xdc
[    4.630096]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.636657]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.643402]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.649902]  bus_for_each_drv from __device_attach+0xcc/0x180
[    4.655670]  __device_attach from bus_probe_device+0xac/0x128
[    4.661468]  bus_probe_device from deferred_probe_work_func+0x94/0xd4
[    4.667938]  deferred_probe_work_func from process_scheduled_works+0x25c/0x418
[    4.675231]  process_scheduled_works from worker_thread+0x2b0/0x3ac
[    4.681518]  worker_thread from kthread+0x144/0x350
[    4.686431]  kthread from ret_from_fork+0x14/0x38
[    4.691192] Exception stack(0xf0105fb0 to 0xf0105ff8)
[    4.696258] 5fa0:                                     00000000 00000000 00000000 00000000
[    4.704467] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.712707] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    4.719360] Code: e3a01004 e3570008 e5c01008 1a000001 (e7ffdefe) 
[    4.725463] ---[ end trace 0000000000000000 ]---

test log snippet test parser 38

------------[ cut here ]------------
[    6.157287] WARNING: CPU: 0 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x494/0x5cc
[    6.165954] Modules linked in:
[    6.169036] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.13.0 #1
[    6.169067] Hardware name: Generic DRA74X (Flattened Device Tree)
[    6.169067] Call trace: 
[    6.169067]  unwind_backtrace from show_stack+0x10/0x14
[    6.169067]  show_stack from dump_stack_lvl+0x50/0x64
[    6.169097]  dump_stack_lvl from __warn+0x80/0x130
[    6.169097]  __warn from warn_slowpath_fmt+0x170/0x178
[    6.169128]  warn_slowpath_fmt from smp_call_function_many_cond+0x494/0x5cc
[    6.169128]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    6.169158]  smp_call_function from flush_tlb_kernel_range+0x5c/0xa4
[    6.169158]  flush_tlb_kernel_range from __change_memory_common+0x5c/0x7c
[    6.169189]  __change_memory_common from set_memory_valid+0x4c/0x54
[    6.169189]  set_memory_valid from kfence_guarded_free+0x2ac/0x594
[    6.169219]  kfence_guarded_free from rcu_core+0x2c0/0x980
[    6.169219]  rcu_core from handle_softirqs+0x108/0x314
[    6.169250]  handle_softirqs from irq_exit+0xa4/0x110
[    6.169250]  irq_exit from __irq_svc+0x7c/0xa4
[    6.169250] Exception stack(0xc1e01f18 to 0xc1e01f60)
[    6.169281] 1f00:                                                       0000373c 00000001
[    6.169281] 1f20: c1e09880 00000000 c2071cc0 c1e04e9c 00000001 c1e04edc c1d7ac28 00000000
[    6.169281] 1f40: c206fced c1e09880 c2071100 c1e01f68 c1391db0 c13932c8 600b0013 ffffffff
[    6.169281]  __irq_svc from default_idle_call+0x4c/0xb4
[    6.169311]  default_idle_call from do_idle+0x208/0x27c
[    6.169311]  do_idle from cpu_startup_entry+0x28/0x2c
[    6.169342]  cpu_startup_entry from kernel_init+0x0/0x12c
[    6.169342] ---[ end trace 0000000000000000 ]---

test log snippet test parser 39

------------[ cut here ]------------
[    6.157287] WARNING: CPU: 0 PID: 0 at kernel/smp.c:815 smp_call_function_many_cond+0x494/0x5cc
[    6.165954] Modules linked in:
[    6.169036] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.13.0 #1
[    6.169067] Hardware name: Generic DRA74X (Flattened Device Tree)
[    6.169067] Call trace: 
[    6.169067]  unwind_backtrace from show_stack+0x10/0x14
[    6.169067]  show_stack from dump_stack_lvl+0x50/0x64
[    6.169097]  dump_stack_lvl from __warn+0x80/0x130
[    6.169097]  __warn from warn_slowpath_fmt+0x170/0x178
[    6.169128]  warn_slowpath_fmt from smp_call_function_many_cond+0x494/0x5cc
[    6.169128]  smp_call_function_many_cond from smp_call_function+0x2c/0x34
[    6.169158]  smp_call_function from flush_tlb_kernel_range+0x5c/0xa4
[    6.169158]  flush_tlb_kernel_range from __change_memory_common+0x5c/0x7c
[    6.169189]  __change_memory_common from set_memory_valid+0x4c/0x54
[    6.169189]  set_memory_valid from kfence_guarded_free+0x2ac/0x594
[    6.169219]  kfence_guarded_free from rcu_core+0x2c0/0x980
[    6.169219]  rcu_core from handle_softirqs+0x108/0x314
[    6.169250]  handle_softirqs from irq_exit+0xa4/0x110
[    6.169250]  irq_exit from __irq_svc+0x7c/0xa4
[    6.169250] Exception stack(0xc1e01f18 to 0xc1e01f60)
[    6.169281] 1f00:                                                       0000373c 00000001
[    6.169281] 1f20: c1e09880 00000000 c2071cc0 c1e04e9c 00000001 c1e04edc c1d7ac28 00000000
[    6.169281] 1f40: c206fced c1e09880 c2071100 c1e01f68 c1391db0 c13932c8 600b0013 ffffffff
[    6.169281]  __irq_svc from default_idle_call+0x4c/0xb4
[    6.169311]  default_idle_call from do_idle+0x208/0x27c
[    6.169311]  do_idle from cpu_startup_entry+0x28/0x2c
[    6.169342]  cpu_startup_entry from kernel_init+0x0/0x12c
[    6.169342] ---[ end trace 0000000000000000 ]---

test log snippet test parser 40

[    3.856048] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[    3.862792] Modules linked in:
[    3.865875] CPU: 1 UID: 0 PID: 45 Comm: kworker/u10:2 Not tainted 6.13.0 #1
[    3.872863] Hardware name: Generic DRA74X (Flattened Device Tree)
[    3.878997] Workqueue: events_unbound deferred_probe_work_func
[    3.884887] PC is at edma_probe+0xb34/0xfe4
[    3.889068] LR is at devm_kmalloc+0xdc/0x110
[    3.893371] pc : [<c0c0d864>]    lr : [<c0de8ba8>]    psr: 60000013
[    3.899688] sp : f0105928  ip : 00070007  fp : efcd56f0
[    3.904937] r10: c3cd5410  r9 : c2f5ba40  r8 : c3cd5400
[    3.910186] r7 : 00000002  r6 : 00000000  r5 : 00000003  r4 : 00000001
[    3.916748] r3 : 00000001  r2 : 00000002  r1 : 00000002  r0 : c3a65c40
[    3.923309] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[    3.930480] Control: 30c5387d  Table: 80203000  DAC: 55555555
[    3.936248] Register r0 information: slab kmalloc-128 start c3a65c00 pointer offset 64 size 128
[    3.945037] Register r1 information: non-paged memory
[    3.950103] Register r2 information: non-paged memory
[    3.955169] Register r3 information: non-paged memory
[    3.960266] Register r4 information: non-paged memory
[    3.965332] Register r5 information: non-paged memory
[    3.970428] Register r6 information: NULL pointer
[    3.975158] Register r7 information: non-paged memory
[    3.980224] Register r8 information: slab kmalloc-rnd-04-1k start c3cd5400 pointer offset 0 size 1024
[    3.989532] Register r9 information: slab kmalloc-rnd-05-512 start c2f5ba00 pointer offset 64 size 512
[    3.998901] Register r10 information: slab kmalloc-rnd-04-1k start c3cd5400 pointer offset 16 size 1024
[    4.008361] Register r11 information: non-slab/vmalloc memory
[    4.014129] Register r12 information: non-paged memory
[    4.019317] Process kworker/u10:2 (pid: 45, stack limit = 0x5f5f91ef)
[    4.025787] Stack: (0xf0105928 to 0xf0106000)
[    4.030181] 5920:                   00000001 c1337fcc c3cd5410 c23d3aac c23d3aac efcd56f0
[    4.038391] 5940: 00000001 c3b9c240 c28150fc 00000000 00000001 00000000 c24d5d30 c1334998
[    4.046600] 5960: c1d96c54 c1d32a35 efcd56f0 3f45655f c24d5d30 fc8f9ed5 f0105a88 c13355f8
[    4.054840] 5980: ffffffff c07045d0 00000000 00000000 00000000 00000000 00000000 00000000
[    4.063049] 59a0: 00000000 00000000 00000000 8477db81 8477db81 c3cd5410 c23d3aac c23d3aac
[    4.071258] 59c0: 3f45655f c24d5d30 fc8f9ed5 f0105a88 00000001 c0de6750 c3cd5410 c23d3aac
[    4.079498] 59e0: 00000000 c0de2ee0 c3cd5410 c23d3aac c24d5d38 000000ab 00000001 c0de1f64
[    4.087707] 5a00: 60000013 efcd56f0 c3cd5410 c3cd5410 c24d5d38 000000ab c24d5d30 fc8f9ed5
[    4.095916] 5a20: 00000001 c0de2bf0 c3cd5410 c23d3aac f0105a88 00000000 c28cd000 c0de2aa8
[    4.104156] 5a40: c0de2974 c0de2974 00000000 f0105a58 00000001 c0ddefe4 c28cd06c c2e2c238
[    4.112365] 5a60: c28cd000 8477db81 c3cd5410 c3cd5454 00000000 00000001 00000000 c28cd000
[    4.120574] 5a80: 00000000 c0de1d7c c3cd5410 00000001 00000100 8477db81 c3cd5410 c24d5d24
[    4.128814] 5aa0: c28cd000 c1a49918 c3cd5410 c0ddf250 c3cd5410 c3cd4010 00000000 c3cd4010
[    4.137023] 5ac0: c3cd5410 efcd5754 00000001 c0dda934 8477db81 00000000 00000000 00000000
[    4.145233] 5ae0: c3cd5400 efcd56f0 c3cd5410 efcd5754 00000000 c13375ac efcd56f0 c3cd4010
[    4.153472] 5b00: c221d2b8 00000000 00000000 efcd5754 c1843cfc c1337844 c2bbac10 c3cd4010
[    4.161682] 5b20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.169891] 5b40: 00000000 00000000 8477db81 efcd56f0 c221d2b8 c1843cfc efcd539c 00000000
[    4.178131] 5b60: c3cd4010 00000001 c24c46f8 c1337ac0 00000001 c1d07df9 c3cf5640 efcd5520
[    4.186340] 5b80: f0105bb0 00000001 00000000 c1d07df9 c1e0e3f2 c0a387c0 00000000 00000000
[    4.194549] 5ba0: c24d5d30 c3cd4010 c221d524 efcd539c 00000002 00000000 43300000 00000000
[    4.202789] 5bc0: 43300000 00000000 00100000 00000000 00000200 00000000 efcd539c c1b18a60
[    4.210998] 5be0: ff9e8308 ff9e8308 00000001 00000001 00000001 00000000 8477db81 c3cd4010
[    4.219207] 5c00: c230f080 c230f080 3f45655f c24d5d30 fc8f9ed5 f0105cd0 00000001 c0de6750
[    4.227447] 5c20: c3cd4010 c230f080 00000000 c0de2ee0 c3cd4010 c230f080 c24d5d38 000000ab
[    4.235656] 5c40: 00000001 c0de1f64 60000013 efcd539c c3cd4010 c3cd4010 c24d5d38 000000ab
[    4.243865] 5c60: c24d5d30 fc8f9ed5 00000001 c0de2bf0 c3cd4010 c230f080 f0105cd0 00000000
[    4.252105] 5c80: c28cd000 c0de2aa8 c0de2974 c0de2974 00000000 f0105ca0 00000001 c0ddefe4
[    4.260314] 5ca0: c28cd06c c386c3b8 c28cd000 8477db81 c3cd4010 c3cd4054 00000000 00000001
[    4.268524] 5cc0: 00000000 c28cd000 c221d524 c0de1d7c c3cd4010 00000001 00000100 8477db81
[    4.276763] 5ce0: c3cd4010 c24d5d24 c28cd000 c1a49918 c3cd4010 c0ddf250 c3cd4010 c2bbac10
[    4.284973] 5d00: 00000000 c2bbac10 c3cd4010 efcd5400 00000001 c0dda934 8477db81 00000000
[    4.293182] 5d20: 00000000 00000000 c3cd4000 efcd539c c3cd4010 efcd5400 c221d524 c13375ac
[    4.301422] 5d40: efcd539c c2bbac10 c221d2b8 c221d524 00000000 efcd5400 00000000 c1337844
[    4.309631] 5d60: 00000000 c2bbac10 43300000 00000000 43300003 00000000 ff9e826c 00000200
[    4.317871] 5d80: 00000000 00000000 00000000 00000000 8477db81 efcd539c c221d2b8 00000000
[    4.326080] 5da0: efc693ec 00000000 c2bbac10 00000001 c291760d c1337ac0 00000001 f0105eb0
[    4.334289] 5dc0: c2bbac10 efc693ec c2e32d40 c2bbac00 c230efa4 c221d2b8 f0105eb0 c0a37a98
[    4.342498] 5de0: c2bbac10 c230efa4 c230efa4 3f45655f c24d5d30 fc8f9ed5 c291760d c0de6750
[    4.350738] 5e00: c2bbac10 c230efa4 00000000 c0de2ee0 c2bbac10 c230efa4 c24d5d38 00000001
[    4.358947] 5e20: c291760d c0de1f64 60000013 efc693ec c2bbac10 c2bbac10 c24d5d38 00000001
[    4.367156] 5e40: c24d5d30 fc8f9ed5 c291760d c0de2bf0 c2bbac10 c230efa4 f0105eb0 00000000
[    4.375396] 5e60: c28cd000 c0de2aa8 c0de2974 c0de2974 00000000 f0105e80 c291760d c0ddefe4
[    4.383605] 5e80: c28cd06c c386cd38 c28cd000 8477db81 c2bbac10 c2bbac54 00000000 00000001
[    4.391845] 5ea0: 00000000 c28cd000 c2917600 c0de1d7c c2bbac10 00000001 c291760d 8477db81
[    4.400054] 5ec0: c2bbac10 c24d5d24 c28cd000 c1a49918 00000000 c0ddf250 c23ffcdc c2bbac10
[    4.408264] 5ee0: c2c4b4d4 c23ffcf8 00000000 00000004 c291760d c0de2708 c29bc980 c23ffd00
[    4.416503] 5f00: c2818800 c2917680 0000000a c047f318 f0105f68 c1805e28 00000000 00000002
[    4.424713] 5f20: 8477db81 c3819280 c29bc998 c29bc9d0 c29bc9ac c2818800 c29bc980 c29bc9ac
[    4.432922] 5f40: c3819280 c2818820 c246c73c 00000402 00000000 c048180c c29b5200 c048155c
[    4.441162] 5f60: c29bc980 00000040 c3819964 c29b521c c29b5200 c048155c c29bc980 c3819280
[    4.449371] 5f80: 00000000 c048848c 00000000 00000000 c29bd440 c0488348 00000000 00000000
[    4.457580] 5fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[    4.465820] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.474029] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[    4.482238] Call trace: 
[    4.482269]  edma_probe from platform_probe+0xac/0xe0
[    4.489898]  platform_probe from really_probe+0x170/0x3cc
[    4.495330]  really_probe from __driver_probe_device+0x90/0x18c
[    4.501281]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.507843]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.514587]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.521087]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.526855]  __device_attach from bus_probe_device+0xac/0x128
[    4.532623]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.538085]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.544647]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.552429]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.559112]  of_platform_populate from sysc_probe+0xa8c/0xb9c
[    4.564880]  sysc_probe from platform_probe+0xac/0xe0
[    4.569976]  platform_probe from really_probe+0x170/0x3cc
[    4.575408]  really_probe from __driver_probe_device+0x90/0x18c
[    4.581359]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.587951]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.594696]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.601165]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.606933]  __device_attach from bus_probe_device+0xac/0x128
[    4.612731]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.618164]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.624725]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.632537]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.639190]  of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[    4.645568]  simple_pm_bus_probe from platform_probe+0xac/0xe0
[    4.651458]  platform_probe from really_probe+0x170/0x3cc
[    4.656890]  really_probe from __driver_probe_device+0x90/0x18c
[    4.662841]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.669403]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.676147]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.682617]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.688415]  __device_attach from bus_probe_device+0xac/0x128
[    4.694183]  bus_probe_device from deferred_probe_work_func+0x94/0xd4
[    4.700683]  deferred_probe_work_func from process_scheduled_works+0x25c/0x418
[    4.707946]  process_scheduled_works from worker_thread+0x2b0/0x3ac
[    4.714263]  worker_thread from kthread+0x144/0x350
[    4.719177]  kthread from ret_from_fork+0x14/0x38
[    4.723907] Exception stack(0xf0105fb0 to 0xf0105ff8)
[    4.728973] 5fa0:                                     00000000 00000000 00000000 00000000
[    4.737213] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.745422] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    4.752075] Code: e3a03001 13540001 e5c03002 1a000006 (e7ffdefe) 
[    4.758209] ---[ end trace 0000000000000000 ]---

test log snippet test parser 41

[    3.856048] Internal error: Oops - undefined instruction: 0 [#1] SMP ARM
[    3.862792] Modules linked in:
[    3.865875] CPU: 1 UID: 0 PID: 45 Comm: kworker/u10:2 Not tainted 6.13.0 #1
[    3.872863] Hardware name: Generic DRA74X (Flattened Device Tree)
[    3.878997] Workqueue: events_unbound deferred_probe_work_func
[    3.884887] PC is at edma_probe+0xb34/0xfe4
[    3.889068] LR is at devm_kmalloc+0xdc/0x110
[    3.893371] pc : [<c0c0d864>]    lr : [<c0de8ba8>]    psr: 60000013
[    3.899688] sp : f0105928  ip : 00070007  fp : efcd56f0
[    3.904937] r10: c3cd5410  r9 : c2f5ba40  r8 : c3cd5400
[    3.910186] r7 : 00000002  r6 : 00000000  r5 : 00000003  r4 : 00000001
[    3.916748] r3 : 00000001  r2 : 00000002  r1 : 00000002  r0 : c3a65c40
[    3.923309] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
[    3.930480] Control: 30c5387d  Table: 80203000  DAC: 55555555
[    3.936248] Register r0 information: slab kmalloc-128 start c3a65c00 pointer offset 64 size 128
[    3.945037] Register r1 information: non-paged memory
[    3.950103] Register r2 information: non-paged memory
[    3.955169] Register r3 information: non-paged memory
[    3.960266] Register r4 information: non-paged memory
[    3.965332] Register r5 information: non-paged memory
[    3.970428] Register r6 information: NULL pointer
[    3.975158] Register r7 information: non-paged memory
[    3.980224] Register r8 information: slab kmalloc-rnd-04-1k start c3cd5400 pointer offset 0 size 1024
[    3.989532] Register r9 information: slab kmalloc-rnd-05-512 start c2f5ba00 pointer offset 64 size 512
[    3.998901] Register r10 information: slab kmalloc-rnd-04-1k start c3cd5400 pointer offset 16 size 1024
[    4.008361] Register r11 information: non-slab/vmalloc memory
[    4.014129] Register r12 information: non-paged memory
[    4.019317] Process kworker/u10:2 (pid: 45, stack limit = 0x5f5f91ef)
[    4.025787] Stack: (0xf0105928 to 0xf0106000)
[    4.030181] 5920:                   00000001 c1337fcc c3cd5410 c23d3aac c23d3aac efcd56f0
[    4.038391] 5940: 00000001 c3b9c240 c28150fc 00000000 00000001 00000000 c24d5d30 c1334998
[    4.046600] 5960: c1d96c54 c1d32a35 efcd56f0 3f45655f c24d5d30 fc8f9ed5 f0105a88 c13355f8
[    4.054840] 5980: ffffffff c07045d0 00000000 00000000 00000000 00000000 00000000 00000000
[    4.063049] 59a0: 00000000 00000000 00000000 8477db81 8477db81 c3cd5410 c23d3aac c23d3aac
[    4.071258] 59c0: 3f45655f c24d5d30 fc8f9ed5 f0105a88 00000001 c0de6750 c3cd5410 c23d3aac
[    4.079498] 59e0: 00000000 c0de2ee0 c3cd5410 c23d3aac c24d5d38 000000ab 00000001 c0de1f64
[    4.087707] 5a00: 60000013 efcd56f0 c3cd5410 c3cd5410 c24d5d38 000000ab c24d5d30 fc8f9ed5
[    4.095916] 5a20: 00000001 c0de2bf0 c3cd5410 c23d3aac f0105a88 00000000 c28cd000 c0de2aa8
[    4.104156] 5a40: c0de2974 c0de2974 00000000 f0105a58 00000001 c0ddefe4 c28cd06c c2e2c238
[    4.112365] 5a60: c28cd000 8477db81 c3cd5410 c3cd5454 00000000 00000001 00000000 c28cd000
[    4.120574] 5a80: 00000000 c0de1d7c c3cd5410 00000001 00000100 8477db81 c3cd5410 c24d5d24
[    4.128814] 5aa0: c28cd000 c1a49918 c3cd5410 c0ddf250 c3cd5410 c3cd4010 00000000 c3cd4010
[    4.137023] 5ac0: c3cd5410 efcd5754 00000001 c0dda934 8477db81 00000000 00000000 00000000
[    4.145233] 5ae0: c3cd5400 efcd56f0 c3cd5410 efcd5754 00000000 c13375ac efcd56f0 c3cd4010
[    4.153472] 5b00: c221d2b8 00000000 00000000 efcd5754 c1843cfc c1337844 c2bbac10 c3cd4010
[    4.161682] 5b20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.169891] 5b40: 00000000 00000000 8477db81 efcd56f0 c221d2b8 c1843cfc efcd539c 00000000
[    4.178131] 5b60: c3cd4010 00000001 c24c46f8 c1337ac0 00000001 c1d07df9 c3cf5640 efcd5520
[    4.186340] 5b80: f0105bb0 00000001 00000000 c1d07df9 c1e0e3f2 c0a387c0 00000000 00000000
[    4.194549] 5ba0: c24d5d30 c3cd4010 c221d524 efcd539c 00000002 00000000 43300000 00000000
[    4.202789] 5bc0: 43300000 00000000 00100000 00000000 00000200 00000000 efcd539c c1b18a60
[    4.210998] 5be0: ff9e8308 ff9e8308 00000001 00000001 00000001 00000000 8477db81 c3cd4010
[    4.219207] 5c00: c230f080 c230f080 3f45655f c24d5d30 fc8f9ed5 f0105cd0 00000001 c0de6750
[    4.227447] 5c20: c3cd4010 c230f080 00000000 c0de2ee0 c3cd4010 c230f080 c24d5d38 000000ab
[    4.235656] 5c40: 00000001 c0de1f64 60000013 efcd539c c3cd4010 c3cd4010 c24d5d38 000000ab
[    4.243865] 5c60: c24d5d30 fc8f9ed5 00000001 c0de2bf0 c3cd4010 c230f080 f0105cd0 00000000
[    4.252105] 5c80: c28cd000 c0de2aa8 c0de2974 c0de2974 00000000 f0105ca0 00000001 c0ddefe4
[    4.260314] 5ca0: c28cd06c c386c3b8 c28cd000 8477db81 c3cd4010 c3cd4054 00000000 00000001
[    4.268524] 5cc0: 00000000 c28cd000 c221d524 c0de1d7c c3cd4010 00000001 00000100 8477db81
[    4.276763] 5ce0: c3cd4010 c24d5d24 c28cd000 c1a49918 c3cd4010 c0ddf250 c3cd4010 c2bbac10
[    4.284973] 5d00: 00000000 c2bbac10 c3cd4010 efcd5400 00000001 c0dda934 8477db81 00000000
[    4.293182] 5d20: 00000000 00000000 c3cd4000 efcd539c c3cd4010 efcd5400 c221d524 c13375ac
[    4.301422] 5d40: efcd539c c2bbac10 c221d2b8 c221d524 00000000 efcd5400 00000000 c1337844
[    4.309631] 5d60: 00000000 c2bbac10 43300000 00000000 43300003 00000000 ff9e826c 00000200
[    4.317871] 5d80: 00000000 00000000 00000000 00000000 8477db81 efcd539c c221d2b8 00000000
[    4.326080] 5da0: efc693ec 00000000 c2bbac10 00000001 c291760d c1337ac0 00000001 f0105eb0
[    4.334289] 5dc0: c2bbac10 efc693ec c2e32d40 c2bbac00 c230efa4 c221d2b8 f0105eb0 c0a37a98
[    4.342498] 5de0: c2bbac10 c230efa4 c230efa4 3f45655f c24d5d30 fc8f9ed5 c291760d c0de6750
[    4.350738] 5e00: c2bbac10 c230efa4 00000000 c0de2ee0 c2bbac10 c230efa4 c24d5d38 00000001
[    4.358947] 5e20: c291760d c0de1f64 60000013 efc693ec c2bbac10 c2bbac10 c24d5d38 00000001
[    4.367156] 5e40: c24d5d30 fc8f9ed5 c291760d c0de2bf0 c2bbac10 c230efa4 f0105eb0 00000000
[    4.375396] 5e60: c28cd000 c0de2aa8 c0de2974 c0de2974 00000000 f0105e80 c291760d c0ddefe4
[    4.383605] 5e80: c28cd06c c386cd38 c28cd000 8477db81 c2bbac10 c2bbac54 00000000 00000001
[    4.391845] 5ea0: 00000000 c28cd000 c2917600 c0de1d7c c2bbac10 00000001 c291760d 8477db81
[    4.400054] 5ec0: c2bbac10 c24d5d24 c28cd000 c1a49918 00000000 c0ddf250 c23ffcdc c2bbac10
[    4.408264] 5ee0: c2c4b4d4 c23ffcf8 00000000 00000004 c291760d c0de2708 c29bc980 c23ffd00
[    4.416503] 5f00: c2818800 c2917680 0000000a c047f318 f0105f68 c1805e28 00000000 00000002
[    4.424713] 5f20: 8477db81 c3819280 c29bc998 c29bc9d0 c29bc9ac c2818800 c29bc980 c29bc9ac
[    4.432922] 5f40: c3819280 c2818820 c246c73c 00000402 00000000 c048180c c29b5200 c048155c
[    4.441162] 5f60: c29bc980 00000040 c3819964 c29b521c c29b5200 c048155c c29bc980 c3819280
[    4.449371] 5f80: 00000000 c048848c 00000000 00000000 c29bd440 c0488348 00000000 00000000
[    4.457580] 5fa0: 00000000 00000000 00000000 c040029c 00000000 00000000 00000000 00000000
[    4.465820] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.474029] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000
[    4.482238] Call trace: 
[    4.482269]  edma_probe from platform_probe+0xac/0xe0
[    4.489898]  platform_probe from really_probe+0x170/0x3cc
[    4.495330]  really_probe from __driver_probe_device+0x90/0x18c
[    4.501281]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.507843]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.514587]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.521087]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.526855]  __device_attach from bus_probe_device+0xac/0x128
[    4.532623]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.538085]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.544647]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.552429]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.559112]  of_platform_populate from sysc_probe+0xa8c/0xb9c
[    4.564880]  sysc_probe from platform_probe+0xac/0xe0
[    4.569976]  platform_probe from really_probe+0x170/0x3cc
[    4.575408]  really_probe from __driver_probe_device+0x90/0x18c
[    4.581359]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.587951]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.594696]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.601165]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.606933]  __device_attach from bus_probe_device+0xac/0x128
[    4.612731]  bus_probe_device from device_add+0x2b0/0x4d0
[    4.618164]  device_add from of_platform_device_create_pdata+0xc4/0xf8
[    4.624725]  of_platform_device_create_pdata from of_platform_bus_create+0x170/0x370
[    4.632537]  of_platform_bus_create from of_platform_populate+0x7c/0xc4
[    4.639190]  of_platform_populate from simple_pm_bus_probe+0xa8/0xf4
[    4.645568]  simple_pm_bus_probe from platform_probe+0xac/0xe0
[    4.651458]  platform_probe from really_probe+0x170/0x3cc
[    4.656890]  really_probe from __driver_probe_device+0x90/0x18c
[    4.662841]  __driver_probe_device from driver_probe_device+0x3c/0x1bc
[    4.669403]  driver_probe_device from __device_attach_driver+0x134/0x17c
[    4.676147]  __device_attach_driver from bus_for_each_drv+0x130/0x18c
[    4.682617]  bus_for_each_drv from __device_attach+0xcc/0x184
[    4.688415]  __device_attach from bus_probe_device+0xac/0x128
[    4.694183]  bus_probe_device from deferred_probe_work_func+0x94/0xd4
[    4.700683]  deferred_probe_work_func from process_scheduled_works+0x25c/0x418
[    4.707946]  process_scheduled_works from worker_thread+0x2b0/0x3ac
[    4.714263]  worker_thread from kthread+0x144/0x350
[    4.719177]  kthread from ret_from_fork+0x14/0x38
[    4.723907] Exception stack(0xf0105fb0 to 0xf0105ff8)
[    4.728973] 5fa0:                                     00000000 00000000 00000000 00000000
[    4.737213] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[    4.745422] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[    4.752075] Code: e3a03001 13540001 e5c03002 1a000006 (e7ffdefe) 
[    4.758209] ---[ end trace 0000000000000000 ]---