[ 0.000000] Booting Linux on physical CPU 0x0000000000 [0x000f0510] [ 0.000000] Linux version 6.10.0-rc7-00076-g9d9a2f29aefd (tuxmake@tuxmake) (aarch64-linux-gnu-gcc (Debian 13.2.0-12) 13.2.0, GNU ld (GNU Binutils for Debian) 2.42) #1 SMP PREEMPT @1720648781 [ 0.000000] KASLR enabled [ 0.000000] random: crng init done [ 0.000000] Machine model: linux,dummy-virt [ 0.000000] efi: UEFI not found. [ 0.000000] earlycon: pl11 at MMIO 0x0000000009000000 (options '') [ 0.000000] printk: legacy bootconsole [pl11] enabled [ 0.000000] NUMA: No NUMA configuration found [ 0.000000] NUMA: Faking a node at [mem 0x0000000040000000-0x000000013fffffff] [ 0.000000] NUMA: NODE_DATA [mem 0x13f6139c0-0x13f615fff] [ 0.000000] Zone ranges: [ 0.000000] DMA [mem 0x0000000040000000-0x00000000ffffffff] [ 0.000000] DMA32 empty [ 0.000000] Normal [mem 0x0000000100000000-0x000000013fffffff] [ 0.000000] Movable zone start for each node [ 0.000000] Early memory node ranges [ 0.000000] node 0: [mem 0x0000000040000000-0x000000013fffffff] [ 0.000000] Initmem setup node 0 [mem 0x0000000040000000-0x000000013fffffff] [ 0.000000] cma: Reserved 32 MiB at 0x00000000fe000000 on node -1 [ 0.000000] kasan: KernelAddressSanitizer initialized (generic) [ 0.000000] psci: probing for conduit method from DT. [ 0.000000] psci: PSCIv1.1 detected in firmware. [ 0.000000] psci: Using standard PSCI v0.2 function IDs [ 0.000000] psci: Trusted OS migration not required [ 0.000000] psci: SMC Calling Convention v1.0 [ 0.000000] percpu: Embedded 34 pages/cpu s99048 r8192 d32024 u139264 [ 0.000000] pcpu-alloc: s99048 r8192 d32024 u139264 alloc=34*4096 [ 0.000000] pcpu-alloc: [0] 0 [0] 1 [ 0.000000] Detected PIPT I-cache on CPU0 [ 0.000000] CPU features: detected: Address authentication (IMP DEF algorithm) [ 0.000000] CPU features: detected: GIC system register CPU interface [ 0.000000] CPU features: detected: HCRX_EL2 register [ 0.000000] CPU features: detected: 52-bit Virtual Addressing (LPA2) [ 0.000000] CPU features: detected: Virtualization Host Extensions [ 0.000000] CPU features: detected: Memory Tagging Extension [ 0.000000] CPU features: detected: Asymmetric MTE Tag Check Fault [ 0.000000] CPU features: detected: Spectre-v4 [ 0.000000] alternatives: applying boot alternatives [ 0.000000] Kernel command line: console=ttyAMA0,115200 rootwait root=/dev/vda debug verbose console_msg_format=syslog systemd.log_level=warning rw earlycon <5>[ 0.000000] Unknown kernel command line parameters "verbose", will be passed to user space. <6>[ 0.000000] Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) <6>[ 0.000000] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) <6>[ 0.000000] Fallback order for Node 0: 0 <6>[ 0.000000] Built 1 zonelists, mobility grouping on. Total pages: 1048576 <6>[ 0.000000] Policy zone: Normal <6>[ 0.000000] mem auto-init: stack:all(zero), heap alloc:off, heap free:off <6>[ 0.000000] stackdepot: allocating hash table via alloc_large_system_hash <6>[ 0.000000] stackdepot hash table entries: 1048576 (order: 12, 16777216 bytes, linear) <6>[ 0.000000] software IO TLB: area num 2. <6>[ 0.000000] software IO TLB: mapped [mem 0x00000000fa000000-0x00000000fe000000] (64MB) <6>[ 0.000000] Memory: 3295032K/4194304K available (56640K kernel code, 27964K rwdata, 27404K rodata, 41280K init, 1131K bss, 866504K reserved, 32768K cma-reserved) <6>[ 0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 <6>[ 0.000000] ftrace: allocating 80706 entries in 316 pages <6>[ 0.000000] ftrace: allocated 316 pages with 5 groups <6>[ 0.000000] trace event string verifier disabled <6>[ 0.000000] rcu: Preemptible hierarchical RCU implementation. <6>[ 0.000000] rcu: RCU event tracing is enabled. <6>[ 0.000000] rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. <6>[ 0.000000] Trampoline variant of Tasks RCU enabled. <6>[ 0.000000] Rude variant of Tasks RCU enabled. <6>[ 0.000000] Tracing variant of Tasks RCU enabled. <6>[ 0.000000] rcu: RCU calculated value of scheduler-enlistment delay is 25 jiffies. <6>[ 0.000000] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 <6>[ 0.000000] RCU Tasks: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1. <6>[ 0.000000] RCU Tasks Rude: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1. <6>[ 0.000000] RCU Tasks Trace: Setting shift to 1 and lim to 1 rcu_task_cb_adjust=1. <6>[ 0.000000] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 <6>[ 0.000000] GICv3: GIC: Using split EOI/Deactivate mode <6>[ 0.000000] GICv3: 256 SPIs implemented <6>[ 0.000000] GICv3: 0 Extended SPIs implemented <6>[ 0.000000] Root IRQ handler: gic_handle_irq <6>[ 0.000000] GICv3: GICv3 features: 16 PPIs <6>[ 0.000000] GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 <6>[ 0.000000] ITS [mem 0x08080000-0x0809ffff] <6>[ 0.000000] ITS@0x0000000008080000: allocated 8192 Devices @100880000 (indirect, esz 8, psz 64K, shr 1) <6>[ 0.000000] ITS@0x0000000008080000: allocated 8192 Interrupt Collections @100890000 (flat, esz 8, psz 64K, shr 1) <6>[ 0.000000] GICv3: using LPI property table @0x00000001008a0000 <6>[ 0.000000] GICv3: CPU0: using allocated LPI pending table @0x00000001008b0000 <6>[ 0.000000] rcu: srcu_init: Setting srcu_struct sizes based on contention. <6>[ 0.000000] arch_timer: cp15 timer(s) running at 62.50MHz (phys). <6>[ 0.000000] clocksource: arch_sys_counter: mask: 0x1ffffffffffffff max_cycles: 0x1cd42e208c, max_idle_ns: 881590405314 ns <6>[ 0.000074] sched_clock: 57 bits at 63MHz, resolution 16ns, wraps every 4398046511096ns <6>[ 0.004020] kfence: initialized - using 2097152 bytes for 255 objects at 0x(____ptrval____)-0x(____ptrval____) <6>[ 0.027348] Console: colour dummy device 80x25 <6>[ 0.035960] Calibrating delay loop (skipped), value calculated using timer frequency.. 125.00 BogoMIPS (lpj=250000) <6>[ 0.037068] pid_max: default: 32768 minimum: 301 <6>[ 0.039764] LSM: initializing lsm=capability <6>[ 0.046348] Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) <6>[ 0.046751] Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) <4>[ 0.103071] cacheinfo: Unable to detect cache hierarchy for CPU 0 <6>[ 0.129915] rcu: Hierarchical SRCU implementation. <6>[ 0.130179] rcu: Max phase no-delay instances is 1000. <6>[ 0.153449] Platform MSI: its@8080000 domain created <6>[ 0.154502] PCI/MSI: /intc@8000000/its@8080000 domain created <6>[ 0.155599] fsl-mc MSI: its@8080000 domain created <6>[ 0.159666] EFI services will not be available. <6>[ 0.162968] smp: Bringing up secondary CPUs ... <6>[ 0.179056] Detected PIPT I-cache on CPU1 <6>[ 0.187869] GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 <6>[ 0.190554] GICv3: CPU1: using allocated LPI pending table @0x00000001008c0000 <6>[ 0.196745] CPU1: Booted secondary processor 0x0000000001 [0x000f0510] <6>[ 0.213137] smp: Brought up 1 node, 2 CPUs <6>[ 0.214470] SMP: Total of 2 processors activated. <6>[ 0.214738] CPU: All CPU(s) started at EL2 <6>[ 0.215066] CPU features: detected: Branch Target Identification <6>[ 0.215506] CPU features: detected: 32-bit EL0 Support <6>[ 0.215738] CPU features: detected: 32-bit EL1 Support <6>[ 0.215952] CPU features: detected: ARMv8.4 Translation Table Level <6>[ 0.216211] CPU features: detected: Data cache clean to the PoU not required for I/D coherence <6>[ 0.216588] CPU features: detected: Common not Private translations <6>[ 0.216869] CPU features: detected: CRC32 instructions <6>[ 0.217103] CPU features: detected: Data independent timing control (DIT) <6>[ 0.217357] CPU features: detected: E0PD <6>[ 0.217541] CPU features: detected: Enhanced Privileged Access Never <6>[ 0.217776] CPU features: detected: Enhanced Virtualization Traps <6>[ 0.218011] CPU features: detected: Fine Grained Traps <6>[ 0.218305] CPU features: detected: Generic authentication (IMP DEF algorithm) <6>[ 0.218656] CPU features: detected: RCpc load-acquire (LDAPR) <6>[ 0.218946] CPU features: detected: 52-bit Virtual Addressing for KVM (LPA2) <6>[ 0.219419] CPU features: detected: LSE atomic instructions <6>[ 0.219658] CPU features: detected: Memory Copy and Memory Set instructions <6>[ 0.219919] CPU features: detected: Privileged Access Never <6>[ 0.220136] CPU features: detected: RAS Extension Support <6>[ 0.220352] CPU features: detected: Random Number Generator <6>[ 0.220570] CPU features: detected: Speculation barrier (SB) <6>[ 0.220791] CPU features: detected: Stage-2 Force Write-Back <6>[ 0.221029] CPU features: detected: Trap EL0 IMPLEMENTATION DEFINED functionality <6>[ 0.221312] CPU features: detected: TLB range maintenance instructions <6>[ 0.221600] CPU features: detected: Scalable Matrix Extension <6>[ 0.221829] CPU features: detected: FA64 <6>[ 0.222009] CPU features: detected: Speculative Store Bypassing Safe (SSBS) <6>[ 0.222265] CPU features: detected: Scalable Vector Extension <6>[ 0.253999] alternatives: applying system-wide alternatives <6>[ 0.271224] CPU features: detected: Hardware dirty bit management on CPU0-1 <6>[ 0.272665] SVE: maximum available vector length 256 bytes per vector <6>[ 0.273038] SVE: default vector length 64 bytes per vector <6>[ 0.275520] SME: minimum available vector length 16 bytes per vector <6>[ 0.275815] SME: maximum available vector length 256 bytes per vector <6>[ 0.276089] SME: default vector length 32 bytes per vector <6>[ 0.362786] devtmpfs: initialized <6>[ 0.582748] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns <6>[ 0.585208] futex hash table entries: 512 (order: 3, 32768 bytes, linear) <6>[ 0.611439] 2G module region forced by RANDOMIZE_MODULE_REGION_FULL <6>[ 0.612147] 0 pages in range for non-PLT usage <6>[ 0.612394] 485616 pages in range for PLT usage <6>[ 0.623821] pinctrl core: initialized pinctrl subsystem <6>[ 0.661438] DMI not present or invalid. <6>[ 0.697333] NET: Registered PF_NETLINK/PF_ROUTE protocol family <6>[ 0.721042] DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations <6>[ 0.723111] DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations <6>[ 0.725967] DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations <6>[ 0.726945] audit: initializing netlink subsys (disabled) <5>[ 0.733496] audit: type=2000 audit(0.672:1): state=initialized audit_enabled=0 res=1 <6>[ 0.770504] thermal_sys: Registered thermal governor 'step_wise' <6>[ 0.770623] thermal_sys: Registered thermal governor 'power_allocator' <6>[ 0.772195] cpuidle: using governor menu <6>[ 0.776679] hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. <6>[ 0.778488] ASID allocator initialised with 65536 entries <6>[ 0.823533] Serial: AMBA PL011 UART driver <6>[ 1.080077] 9000000.pl011: ttyAMA0 at MMIO 0x9000000 (irq = 14, base_baud = 0) is a PL011 rev1 <6>[ 1.083566] printk: legacy console [ttyAMA0] enabled <6>[ 1.083566] printk: legacy console [ttyAMA0] enabled <6>[ 1.084374] printk: legacy bootconsole [pl11] disabled <6>[ 1.084374] printk: legacy bootconsole [pl11] disabled <6>[ 1.142269] HugeTLB: registered 1.00 GiB page size, pre-allocated 0 pages <6>[ 1.142808] HugeTLB: 0 KiB vmemmap can be freed for a 1.00 GiB page <6>[ 1.143270] HugeTLB: registered 32.0 MiB page size, pre-allocated 0 pages <6>[ 1.144339] HugeTLB: 0 KiB vmemmap can be freed for a 32.0 MiB page <6>[ 1.144777] HugeTLB: registered 2.00 MiB page size, pre-allocated 0 pages <6>[ 1.145217] HugeTLB: 0 KiB vmemmap can be freed for a 2.00 MiB page <6>[ 1.145650] HugeTLB: registered 64.0 KiB page size, pre-allocated 0 pages <6>[ 1.146100] HugeTLB: 0 KiB vmemmap can be freed for a 64.0 KiB page <6>[ 1.156968] Demotion targets for Node 0: null <6>[ 1.175086] cryptd: max_cpu_qlen set to 1000 <6>[ 1.193191] ACPI: Interpreter disabled. <6>[ 1.264845] iommu: Default domain type: Translated <6>[ 1.265120] iommu: DMA domain TLB invalidation policy: strict mode <5>[ 1.270302] SCSI subsystem initialized <7>[ 1.273274] libata version 3.00 loaded. <6>[ 1.278934] usbcore: registered new interface driver usbfs <6>[ 1.279984] usbcore: registered new interface driver hub <6>[ 1.280880] usbcore: registered new device driver usb <6>[ 1.293407] mc: Linux media interface: v0.10 <6>[ 1.294419] videodev: Linux video capture interface: v2.00 <6>[ 1.295546] pps_core: LinuxPPS API ver. 1 registered <6>[ 1.295779] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <6>[ 1.296549] PTP clock support registered <6>[ 1.299188] EDAC MC: Ver: 3.0.0 <6>[ 1.305282] scmi_core: SCMI protocol bus registered <6>[ 1.321649] FPGA manager framework <6>[ 1.324250] Advanced Linux Sound Architecture Driver Initialized. <6>[ 1.350775] vgaarb: loaded <6>[ 1.358540] clocksource: Switched to clocksource arch_sys_counter <5>[ 1.370327] VFS: Disk quotas dquot_6.6.0 <6>[ 1.370829] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) <6>[ 1.378193] pnp: PnP ACPI: disabled <6>[ 1.465040] NET: Registered PF_INET protocol family <6>[ 1.467977] IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) <6>[ 1.480702] tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) <6>[ 1.481375] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) <6>[ 1.482716] TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) <6>[ 1.484037] TCP bind hash table entries: 32768 (order: 8, 1048576 bytes, linear) <6>[ 1.485268] TCP: Hash tables configured (established 32768 bind 32768) <6>[ 1.491368] MPTCP token hash table entries: 4096 (order: 4, 98304 bytes, linear) <6>[ 1.492452] UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) <6>[ 1.493240] UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) <6>[ 1.496025] NET: Registered PF_UNIX/PF_LOCAL protocol family <6>[ 1.507899] RPC: Registered named UNIX socket transport module. <6>[ 1.508241] RPC: Registered udp transport module. <6>[ 1.508483] RPC: Registered tcp transport module. <6>[ 1.508782] RPC: Registered tcp-with-tls transport module. <6>[ 1.509044] RPC: Registered tcp NFSv4.1 backchannel transport module. <6>[ 1.509590] PCI: CLS 0 bytes, default 64 <6>[ 1.556269] kvm [1]: nv: 477 coarse grained trap handlers <6>[ 1.561822] kvm [1]: nv: 668 fine grained trap handlers <6>[ 1.565012] kvm [1]: IPA Size Limit: 52 bits <6>[ 1.566311] kvm [1]: GICv3: no GICV resource entry <6>[ 1.566663] kvm [1]: disabling GICv2 emulation <6>[ 1.567216] kvm [1]: GIC system register CPU interface enabled <6>[ 1.568918] kvm [1]: vgic interrupt IRQ9 <6>[ 1.570147] kvm [1]: VHE mode initialized successfully <5>[ 1.588068] Initialise system trusted keyrings <6>[ 1.591329] workingset: timestamp_bits=42 max_order=20 bucket_order=0 <6>[ 1.602595] squashfs: version 4.0 (2009/01/31) Phillip Lougher <5>[ 1.609660] NFS: Registering the id_resolver key type <5>[ 1.611240] Key type id_resolver registered <5>[ 1.611593] Key type id_legacy registered <6>[ 1.612644] nfs4filelayout_init: NFSv4 File Layout Driver Registering... <6>[ 1.613246] nfs4flexfilelayout_init: NFSv4 Flexfile Layout Driver Registering... <6>[ 1.616445] 9p: Installing v9fs 9p2000 file system support <6>[ 1.734461] NET: Registered PF_ALG protocol family <5>[ 1.735057] Key type asymmetric registered <5>[ 1.735381] Asymmetric key parser 'x509' registered <6>[ 1.736415] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 244) <6>[ 1.736936] io scheduler mq-deadline registered <6>[ 1.737263] io scheduler kyber registered <6>[ 1.895317] pl061_gpio 9030000.pl061: PL061 GPIO chip registered <6>[ 1.929712] pci-host-generic 4010000000.pcie: host bridge /pcie@10000000 ranges: <6>[ 1.931307] pci-host-generic 4010000000.pcie: IO 0x003eff0000..0x003effffff -> 0x0000000000 <6>[ 1.932561] pci-host-generic 4010000000.pcie: MEM 0x0010000000..0x003efeffff -> 0x0010000000 <6>[ 1.933055] pci-host-generic 4010000000.pcie: MEM 0x8000000000..0xffffffffff -> 0x8000000000 <4>[ 1.934316] pci-host-generic 4010000000.pcie: Memory resource size exceeds max for 32 bits <6>[ 2.033206] pci-host-generic 4010000000.pcie: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] <6>[ 2.037342] pci-host-generic 4010000000.pcie: PCI host bridge to bus 0000:00 <6>[ 2.038110] pci_bus 0000:00: root bus resource [bus 00-ff] <6>[ 2.038508] pci_bus 0000:00: root bus resource [io 0x0000-0xffff] <6>[ 2.038831] pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff] <6>[ 2.039107] pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff] <6>[ 2.041777] pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 conventional PCI endpoint <6>[ 2.526238] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled <6>[ 2.575438] msm_serial: driver initialized <6>[ 2.580485] SuperH (H)SCI(F) driver initialized <6>[ 2.582444] STM32 USART driver initialized <6>[ 2.680934] loop: module loaded <6>[ 2.682735] virtio_blk virtio0: 1/0/0 default/read/poll queues <5>[ 2.690281] virtio_blk virtio0: [vda] 5293056 512-byte logical blocks (2.71 GB/2.52 GiB) <6>[ 2.736388] megasas: 07.727.03.00-rc1 <5>[ 2.784485] physmap-flash 0.flash: physmap platform flash device: [mem 0x00000000-0x03ffffff] <6>[ 2.786864] 0.flash: Found 2 x16 devices at 0x0 in 32-bit bank. Manufacturer ID 0x000000 Chip ID 0x000000 <6>[ 2.787955] Intel/Sharp Extended Query Table at 0x0031 <6>[ 2.788994] Using buffer write method <7>[ 2.790041] erase region 0: offset=0x0,size=0x40000,blocks=256 <5>[ 2.814592] physmap-flash 0.flash: physmap platform flash device: [mem 0x04000000-0x07ffffff] <6>[ 2.815461] 0.flash: Found 2 x16 devices at 0x0 in 32-bit bank. Manufacturer ID 0x000000 Chip ID 0x000000 <6>[ 2.815919] Intel/Sharp Extended Query Table at 0x0031 <6>[ 2.816584] Using buffer write method <7>[ 2.816816] erase region 0: offset=0x0,size=0x40000,blocks=256 <5>[ 2.817175] Concatenating MTD devices: <5>[ 2.817443] (0): "0.flash" <5>[ 2.817618] (1): "0.flash" <5>[ 2.817774] into device "0.flash" <6>[ 2.955552] thunder_xcv, ver 1.0 <6>[ 2.956271] thunder_bgx, ver 1.0 <6>[ 2.956866] nicpf, ver 1.0 <6>[ 2.977028] hns3: Hisilicon Ethernet Network Driver for Hip08 Family - version <6>[ 2.977362] hns3: Copyright (c) 2017 Huawei Corporation. <6>[ 2.978462] hclge is initializing <6>[ 2.979137] e1000: Intel(R) PRO/1000 Network Driver <6>[ 2.979385] e1000: Copyright (c) 1999-2006 Intel Corporation. <6>[ 2.980231] e1000e: Intel(R) PRO/1000 Network Driver <6>[ 2.980468] e1000e: Copyright(c) 1999 - 2015 Intel Corporation. <6>[ 2.981233] igb: Intel(R) Gigabit Ethernet Network Driver <6>[ 2.981479] igb: Copyright (c) 2007-2014 Intel Corporation. <6>[ 2.982291] igbvf: Intel(R) Gigabit Virtual Function Network Driver <6>[ 2.982566] igbvf: Copyright (c) 2009 - 2012 Intel Corporation. <6>[ 2.988188] sky2: driver version 1.30 <6>[ 3.011586] VFIO - User Level meta-driver version: 0.3 <6>[ 3.057671] usbcore: registered new interface driver usb-storage <6>[ 3.109612] rtc-pl031 9010000.pl031: registered as rtc0 <6>[ 3.110905] rtc-pl031 9010000.pl031: setting system clock to 2024-07-11T11:38:15 UTC (1720697895) <6>[ 3.122538] i2c_dev: i2c /dev entries driver <6>[ 3.235275] sdhci: Secure Digital Host Controller Interface driver <6>[ 3.235576] sdhci: Copyright(c) Pierre Ossman <6>[ 3.246102] Synopsys Designware Multimedia Card Interface Driver <6>[ 3.260709] sdhci-pltfm: SDHCI platform and OF driver helper <6>[ 3.289222] ledtrig-cpu: registered to indicate activity on CPUs <6>[ 3.342225] usbcore: registered new interface driver usbhid <6>[ 3.342549] usbhid: USB HID core driver <6>[ 3.396841] hw perfevents: enabled with armv8_pmuv3 PMU driver, 7 counters available <6>[ 3.414664] cs_system_cfg: CoreSight Configuration manager initialised <6>[ 3.481574] NET: Registered PF_INET6 protocol family <6>[ 3.496350] Segment Routing with IPv6 <6>[ 3.497108] In-situ OAM (IOAM) with IPv6 <6>[ 3.498506] NET: Registered PF_PACKET protocol family <6>[ 3.500900] 9pnet: Installing 9P2000 support <5>[ 3.502032] Key type dns_resolver registered <6>[ 3.704091] Timer migration: 1 hierarchy levels; 8 children per group; 1 crossnode level <6>[ 3.708798] registered taskstats version 1 <5>[ 3.712677] Loading compiled-in X.509 certificates <6>[ 3.879105] Demotion targets for Node 0: null <6>[ 3.899663] input: gpio-keys as /devices/platform/gpio-keys/input/input0 <6>[ 3.917812] clk: Disabling unused clocks <6>[ 3.919435] PM: genpd: Disabling unused power domains <6>[ 3.920920] ALSA device list: <6>[ 3.921533] No soundcards found. <6>[ 3.923230] KTAP version 1 <6>[ 3.923588] 1..91 <6>[ 3.927071] KTAP version 1 <6>[ 3.927507] # Subtest: example_init <6>[ 3.928426] # module: kunit_example_test <6>[ 3.929538] # is_init: true <6>[ 3.930436] 1..1 <6>[ 3.936254] ok 1 example_init_test <6>[ 3.936542] ok 1 example_init <6>[ 3.937256] KTAP version 1 <6>[ 3.937442] # Subtest: time_test_cases <6>[ 3.937652] # module: time_test <6>[ 3.937767] 1..1 <6>[ 14.282851] # time64_to_tm_test_date_range.speed: slow <6>[ 14.283017] ok 1 time64_to_tm_test_date_range <6>[ 14.283325] ok 2 time_test_cases <6>[ 14.283963] KTAP version 1 <6>[ 14.284126] # Subtest: hw_breakpoint <6>[ 14.284351] # module: hw_breakpoint_test <6>[ 14.284436] 1..9 <6>[ 14.300228] ok 1 test_one_cpu <6>[ 14.307750] ok 2 test_many_cpus <3>[ 14.312434] # test_one_task_on_all_cpus: ASSERTION FAILED at kernel/events/hw_breakpoint_test.c:70 <3>[ 14.312434] Expected IS_ERR(bp) to be false, but is true <6>[ 14.316299] not ok 3 test_one_task_on_all_cpus <3>[ 14.318776] # test_two_tasks_on_all_cpus: ASSERTION FAILED at kernel/events/hw_breakpoint_test.c:70 <3>[ 14.318776] Expected IS_ERR(bp) to be false, but is true <6>[ 14.322274] not ok 4 test_two_tasks_on_all_cpus <3>[ 14.324209] # test_one_task_on_one_cpu: ASSERTION FAILED at kernel/events/hw_breakpoint_test.c:70 <3>[ 14.324209] Expected IS_ERR(bp) to be false, but is true <6>[ 14.327993] not ok 5 test_one_task_on_one_cpu <3>[ 14.330426] # test_one_task_mixed: ASSERTION FAILED at kernel/events/hw_breakpoint_test.c:70 <3>[ 14.330426] Expected IS_ERR(bp) to be false, but is true <6>[ 14.333700] not ok 6 test_one_task_mixed <3>[ 14.335654] # test_two_tasks_on_one_cpu: ASSERTION FAILED at kernel/events/hw_breakpoint_test.c:70 <3>[ 14.335654] Expected IS_ERR(bp) to be false, but is true <6>[ 14.339331] not ok 7 test_two_tasks_on_one_cpu <3>[ 14.340959] # test_two_tasks_on_one_all_cpus: ASSERTION FAILED at kernel/events/hw_breakpoint_test.c:70 <3>[ 14.340959] Expected IS_ERR(bp) to be false, but is true <6>[ 14.345455] not ok 8 test_two_tasks_on_one_all_cpus <3>[ 14.347331] # test_task_on_all_and_one_cpu: ASSERTION FAILED at kernel/events/hw_breakpoint_test.c:70 <3>[ 14.347331] Expected IS_ERR(bp) to be false, but is true <6>[ 14.349645] not ok 9 test_task_on_all_and_one_cpu <6>[ 14.349789] # hw_breakpoint: pass:2 fail:7 skip:0 total:9 <6>[ 14.350405] # Totals: pass:2 fail:7 skip:0 total:9 <6>[ 14.350747] not ok 3 hw_breakpoint <6>[ 14.351356] KTAP version 1 <6>[ 14.351534] # Subtest: resource <6>[ 14.351699] # module: resource_kunit <6>[ 14.351776] 1..2 <6>[ 14.355748] ok 1 resource_test_union <6>[ 14.358722] ok 2 resource_test_intersection <6>[ 14.358976] # resource: pass:2 fail:0 skip:0 total:2 <6>[ 14.359231] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 14.359484] ok 4 resource <6>[ 14.360082] KTAP version 1 <6>[ 14.360256] # Subtest: sysctl_test <6>[ 14.360454] # module: sysctl_test <6>[ 14.360528] 1..10 <6>[ 14.364685] ok 1 sysctl_test_api_dointvec_null_tbl_data <6>[ 14.368166] ok 2 sysctl_test_api_dointvec_table_maxlen_unset <6>[ 14.371942] ok 3 sysctl_test_api_dointvec_table_len_is_zero <6>[ 14.375115] ok 4 sysctl_test_api_dointvec_table_read_but_position_set <6>[ 14.378425] ok 5 sysctl_test_dointvec_read_happy_single_positive <6>[ 14.381449] ok 6 sysctl_test_dointvec_read_happy_single_negative <6>[ 14.385433] ok 7 sysctl_test_dointvec_write_happy_single_positive <6>[ 14.389240] ok 8 sysctl_test_dointvec_write_happy_single_negative <6>[ 14.392569] ok 9 sysctl_test_api_dointvec_write_single_less_int_min <6>[ 14.396096] ok 10 sysctl_test_api_dointvec_write_single_greater_int_max <6>[ 14.396423] # sysctl_test: pass:10 fail:0 skip:0 total:10 <6>[ 14.396712] # Totals: pass:10 fail:0 skip:0 total:10 <6>[ 14.397017] ok 5 sysctl_test <6>[ 14.398715] KTAP version 1 <6>[ 14.399152] # Subtest: kasan <6>[ 14.399353] # module: kasan_test <6>[ 14.399445] 1..71 <3>[ 14.401405] ================================================================== <3>[ 14.402077] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x564/0x5e8 <3>[ 14.403129] Write of size 1 at addr fff00000c5646f73 by task kunit_try_catch/121 <3>[ 14.403560] <3>[ 14.403971] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.404595] Hardware name: linux,dummy-virt (DT) <3>[ 14.405216] Call trace: <3>[ 14.405428] dump_backtrace+0x9c/0x128 <3>[ 14.405742] show_stack+0x20/0x38 <3>[ 14.406044] dump_stack_lvl+0x8c/0xd0 <3>[ 14.406321] print_report+0x118/0x5e0 <3>[ 14.406548] kasan_report+0xc8/0x118 <3>[ 14.406782] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.407069] kmalloc_oob_right+0x564/0x5e8 <3>[ 14.407320] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.407581] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.407892] kthread+0x24c/0x2d0 <3>[ 14.408110] ret_from_fork+0x10/0x20 <3>[ 14.408415] <3>[ 14.408570] Allocated by task 121: <4>[ 14.408862] kasan_save_stack+0x3c/0x68 <4>[ 14.409138] kasan_save_track+0x20/0x40 <4>[ 14.409381] kasan_save_alloc_info+0x40/0x58 <4>[ 14.409582] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.409820] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.410141] kmalloc_oob_right+0xb8/0x5e8 <4>[ 14.410376] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.410610] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.410917] kthread+0x24c/0x2d0 <4>[ 14.411127] ret_from_fork+0x10/0x20 <3>[ 14.411362] <3>[ 14.411532] The buggy address belongs to the object at fff00000c5646f00 <3>[ 14.411532] which belongs to the cache kmalloc-128 of size 128 <3>[ 14.412031] The buggy address is located 0 bytes to the right of <3>[ 14.412031] allocated 115-byte region [fff00000c5646f00, fff00000c5646f73) <3>[ 14.412666] <3>[ 14.412867] The buggy address belongs to the physical page: <4>[ 14.413230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105646 <4>[ 14.413788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.414359] page_type: 0xffffefff(slab) <4>[ 14.414830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 14.415171] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.415608] page dumped because: kasan: bad access detected <3>[ 14.415834] <3>[ 14.415942] Memory state around the buggy address: <3>[ 14.416339] fff00000c5646e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 14.416762] fff00000c5646e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.417193] >fff00000c5646f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 14.417582] ^ <3>[ 14.418053] fff00000c5646f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.418496] fff00000c5647000: 00 00 00 00 00 00 00 00 00 fc fc fc fc 00 00 00 <3>[ 14.418893] ================================================================== <4>[ 14.419658] Disabling lock debugging due to kernel taint <3>[ 14.420051] ================================================================== <3>[ 14.420409] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x520/0x5e8 <3>[ 14.420772] Write of size 1 at addr fff00000c5646f78 by task kunit_try_catch/121 <3>[ 14.421171] <3>[ 14.421320] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.421849] Hardware name: linux,dummy-virt (DT) <3>[ 14.422187] Call trace: <3>[ 14.422386] dump_backtrace+0x9c/0x128 <3>[ 14.422618] show_stack+0x20/0x38 <3>[ 14.422842] dump_stack_lvl+0x8c/0xd0 <3>[ 14.423078] print_report+0x118/0x5e0 <3>[ 14.423305] kasan_report+0xc8/0x118 <3>[ 14.423525] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.423803] kmalloc_oob_right+0x520/0x5e8 <3>[ 14.424055] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.424278] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.424557] kthread+0x24c/0x2d0 <3>[ 14.424755] ret_from_fork+0x10/0x20 <3>[ 14.424975] <3>[ 14.425078] Allocated by task 121: <4>[ 14.425291] kasan_save_stack+0x3c/0x68 <4>[ 14.425535] kasan_save_track+0x20/0x40 <4>[ 14.425781] kasan_save_alloc_info+0x40/0x58 <4>[ 14.426103] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.426344] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.426600] kmalloc_oob_right+0xb8/0x5e8 <4>[ 14.426855] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.427110] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.427411] kthread+0x24c/0x2d0 <4>[ 14.427580] ret_from_fork+0x10/0x20 <3>[ 14.427785] <3>[ 14.427890] The buggy address belongs to the object at fff00000c5646f00 <3>[ 14.427890] which belongs to the cache kmalloc-128 of size 128 <3>[ 14.428419] The buggy address is located 5 bytes to the right of <3>[ 14.428419] allocated 115-byte region [fff00000c5646f00, fff00000c5646f73) <3>[ 14.428876] <3>[ 14.428973] The buggy address belongs to the physical page: <4>[ 14.429245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105646 <4>[ 14.429662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.430041] page_type: 0xffffefff(slab) <4>[ 14.430298] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 14.430677] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.430977] page dumped because: kasan: bad access detected <3>[ 14.431198] <3>[ 14.431300] Memory state around the buggy address: <3>[ 14.431498] fff00000c5646e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 14.431817] fff00000c5646e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.432195] >fff00000c5646f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 14.432548] ^ <3>[ 14.432911] fff00000c5646f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.433265] fff00000c5647000: 00 00 00 00 00 00 00 00 00 fc fc fc fc 00 00 00 <3>[ 14.433607] ================================================================== <3>[ 14.434209] ================================================================== <3>[ 14.434594] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x580/0x5e8 <3>[ 14.434939] Read of size 1 at addr fff00000c5646f80 by task kunit_try_catch/121 <3>[ 14.435228] <3>[ 14.435326] CPU: 0 PID: 121 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.435676] Hardware name: linux,dummy-virt (DT) <3>[ 14.435855] Call trace: <3>[ 14.435975] dump_backtrace+0x9c/0x128 <3>[ 14.436146] show_stack+0x20/0x38 <3>[ 14.436335] dump_stack_lvl+0x8c/0xd0 <3>[ 14.436548] print_report+0x118/0x5e0 <3>[ 14.436733] kasan_report+0xc8/0x118 <3>[ 14.436900] __asan_report_load1_noabort+0x20/0x30 <3>[ 14.437095] kmalloc_oob_right+0x580/0x5e8 <3>[ 14.437295] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.437473] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.437698] kthread+0x24c/0x2d0 <3>[ 14.437863] ret_from_fork+0x10/0x20 <3>[ 14.438071] <3>[ 14.438180] Allocated by task 121: <4>[ 14.438338] kasan_save_stack+0x3c/0x68 <4>[ 14.438514] kasan_save_track+0x20/0x40 <4>[ 14.438684] kasan_save_alloc_info+0x40/0x58 <4>[ 14.438882] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.439070] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.439334] kmalloc_oob_right+0xb8/0x5e8 <4>[ 14.439589] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.439861] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.440162] kthread+0x24c/0x2d0 <4>[ 14.440368] ret_from_fork+0x10/0x20 <3>[ 14.440620] <3>[ 14.440742] The buggy address belongs to the object at fff00000c5646f00 <3>[ 14.440742] which belongs to the cache kmalloc-128 of size 128 <3>[ 14.441339] The buggy address is located 13 bytes to the right of <3>[ 14.441339] allocated 115-byte region [fff00000c5646f00, fff00000c5646f73) <3>[ 14.441969] <3>[ 14.442150] The buggy address belongs to the physical page: <4>[ 14.442417] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105646 <4>[ 14.442711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.442965] page_type: 0xffffefff(slab) <4>[ 14.443137] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 14.443418] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.443690] page dumped because: kasan: bad access detected <3>[ 14.443905] <3>[ 14.443997] Memory state around the buggy address: <3>[ 14.444189] fff00000c5646e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.444458] fff00000c5646f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 14.444722] >fff00000c5646f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.444976] ^ <3>[ 14.445121] fff00000c5647000: 00 00 00 00 00 00 00 00 00 fc fc fc fc 00 00 00 <3>[ 14.445374] fff00000c5647080: 00 00 00 00 00 00 fc fc fc fc 00 00 00 00 00 00 <3>[ 14.445628] ================================================================== <6>[ 14.447890] ok 1 kmalloc_oob_right <3>[ 14.449338] ================================================================== <3>[ 14.450436] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x308/0x340 <3>[ 14.451122] Read of size 1 at addr fff00000c6289bff by task kunit_try_catch/123 <3>[ 14.451705] <3>[ 14.451927] CPU: 1 PID: 123 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.452706] Hardware name: linux,dummy-virt (DT) <3>[ 14.453105] Call trace: <3>[ 14.453365] dump_backtrace+0x9c/0x128 <3>[ 14.453739] show_stack+0x20/0x38 <3>[ 14.454112] dump_stack_lvl+0x8c/0xd0 <3>[ 14.454513] print_report+0x118/0x5e0 <3>[ 14.454904] kasan_report+0xc8/0x118 <3>[ 14.455287] __asan_report_load1_noabort+0x20/0x30 <3>[ 14.455749] kmalloc_oob_left+0x308/0x340 <3>[ 14.456158] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.456584] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.457101] kthread+0x24c/0x2d0 <3>[ 14.457461] ret_from_fork+0x10/0x20 <3>[ 14.457861] <3>[ 14.458078] Allocated by task 1: <4>[ 14.458408] kasan_save_stack+0x3c/0x68 <4>[ 14.458781] kasan_save_track+0x20/0x40 <4>[ 14.459140] kasan_save_alloc_info+0x40/0x58 <4>[ 14.459534] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.459894] kmalloc_node_track_caller_noprof+0x1a8/0x480 <4>[ 14.460354] kvasprintf+0xcc/0x170 <4>[ 14.460689] __kthread_create_on_node+0x16c/0x348 <4>[ 14.461097] kthread_create_on_node+0xac/0xf0 <4>[ 14.461484] create_worker+0x380/0x6b8 <4>[ 14.461868] alloc_unbound_pwq+0x630/0x780 <4>[ 14.462263] apply_wqattrs_prepare+0x1a0/0x6e0 <4>[ 14.462664] apply_workqueue_attrs_locked+0x58/0xb8 <4>[ 14.463090] alloc_workqueue+0x930/0x1430 <4>[ 14.463469] latency_fsnotify_init+0x28/0x60 <4>[ 14.463868] do_one_initcall+0xd0/0x630 <4>[ 14.464225] kernel_init_freeable+0x3e0/0x8c8 <4>[ 14.464616] kernel_init+0x2c/0x1f8 <4>[ 14.464956] ret_from_fork+0x10/0x20 <3>[ 14.465297] <3>[ 14.465505] The buggy address belongs to the object at fff00000c6289be0 <3>[ 14.465505] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.466530] The buggy address is located 18 bytes to the right of <3>[ 14.466530] allocated 13-byte region [fff00000c6289be0, fff00000c6289bed) <3>[ 14.467469] <3>[ 14.467680] The buggy address belongs to the physical page: <4>[ 14.468152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106289 <4>[ 14.468786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.469339] page_type: 0xffffefff(slab) <4>[ 14.469740] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 14.470483] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 14.471096] page dumped because: kasan: bad access detected <3>[ 14.471598] <3>[ 14.471802] Memory state around the buggy address: <3>[ 14.472256] fff00000c6289a80: 00 02 fc fc 00 03 fc fc fa fb fc fc fa fb fc fc <3>[ 14.472834] fff00000c6289b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.473422] >fff00000c6289b80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 05 fc fc <3>[ 14.474060] ^ <3>[ 14.474642] fff00000c6289c00: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.475215] fff00000c6289c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.475792] ================================================================== <6>[ 14.478677] ok 2 kmalloc_oob_left <3>[ 14.479979] ================================================================== <3>[ 14.480847] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x308/0x340 <3>[ 14.481443] Read of size 1 at addr fff00000c6709000 by task kunit_try_catch/125 <3>[ 14.482109] <3>[ 14.482349] CPU: 1 PID: 125 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.483127] Hardware name: linux,dummy-virt (DT) <3>[ 14.483519] Call trace: <3>[ 14.483796] dump_backtrace+0x9c/0x128 <3>[ 14.484186] show_stack+0x20/0x38 <3>[ 14.484534] dump_stack_lvl+0x8c/0xd0 <3>[ 14.484906] print_report+0x118/0x5e0 <3>[ 14.485280] kasan_report+0xc8/0x118 <3>[ 14.485641] __asan_report_load1_noabort+0x20/0x30 <3>[ 14.486174] kmalloc_node_oob_right+0x308/0x340 <3>[ 14.486538] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.486883] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.487280] kthread+0x24c/0x2d0 <3>[ 14.487560] ret_from_fork+0x10/0x20 <3>[ 14.487865] <3>[ 14.488036] Allocated by task 125: <4>[ 14.488306] kasan_save_stack+0x3c/0x68 <4>[ 14.488617] kasan_save_track+0x20/0x40 <4>[ 14.488934] kasan_save_alloc_info+0x40/0x58 <4>[ 14.489248] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.489527] kmalloc_node_trace_noprof+0x17c/0x368 <4>[ 14.489896] kmalloc_node_oob_right+0xbc/0x340 <4>[ 14.490251] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.490602] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.491022] kthread+0x24c/0x2d0 <4>[ 14.491293] ret_from_fork+0x10/0x20 <3>[ 14.491570] <3>[ 14.491729] The buggy address belongs to the object at fff00000c6708000 <3>[ 14.491729] which belongs to the cache kmalloc-4k of size 4096 <3>[ 14.492472] The buggy address is located 0 bytes to the right of <3>[ 14.492472] allocated 4096-byte region [fff00000c6708000, fff00000c6709000) <3>[ 14.493305] <3>[ 14.493485] The buggy address belongs to the physical page: <4>[ 14.493953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106708 <4>[ 14.494635] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.495130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.495654] page_type: 0xffffefff(slab) <4>[ 14.495984] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 <4>[ 14.496528] raw: 0000000000000000 0000000080040004 00000001ffffefff 0000000000000000 <4>[ 14.497080] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 <4>[ 14.497638] head: 0000000000000000 0000000080040004 00000001ffffefff 0000000000000000 <4>[ 14.498275] head: 0bfffe0000000003 ffffc1ffc319c201 ffffffffffffffff 0000000000000000 <4>[ 14.498840] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.499382] page dumped because: kasan: bad access detected <3>[ 14.499797] <3>[ 14.499980] Memory state around the buggy address: <3>[ 14.500348] fff00000c6708f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.500871] fff00000c6708f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.501360] >fff00000c6709000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.501819] ^ <3>[ 14.502122] fff00000c6709080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.502641] fff00000c6709100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.503123] ================================================================== <6>[ 14.505650] ok 3 kmalloc_node_oob_right <3>[ 14.507606] ================================================================== <3>[ 14.508320] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2b8/0x308 <3>[ 14.508766] Write of size 1 at addr fff00000c6739f00 by task kunit_try_catch/127 <3>[ 14.509207] <3>[ 14.509375] CPU: 0 PID: 127 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.510039] Hardware name: linux,dummy-virt (DT) <3>[ 14.510363] Call trace: <3>[ 14.510584] dump_backtrace+0x9c/0x128 <3>[ 14.510884] show_stack+0x20/0x38 <3>[ 14.511227] dump_stack_lvl+0x8c/0xd0 <3>[ 14.511598] print_report+0x118/0x5e0 <3>[ 14.511891] kasan_report+0xc8/0x118 <3>[ 14.512186] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.512529] kmalloc_big_oob_right+0x2b8/0x308 <3>[ 14.512851] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.513151] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.513524] kthread+0x24c/0x2d0 <3>[ 14.513783] ret_from_fork+0x10/0x20 <3>[ 14.514137] <3>[ 14.514326] Allocated by task 127: <4>[ 14.514600] kasan_save_stack+0x3c/0x68 <4>[ 14.514931] kasan_save_track+0x20/0x40 <4>[ 14.515224] kasan_save_alloc_info+0x40/0x58 <4>[ 14.515568] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.515955] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.516313] kmalloc_big_oob_right+0xb8/0x308 <4>[ 14.516731] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.517175] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.517636] kthread+0x24c/0x2d0 <4>[ 14.518067] ret_from_fork+0x10/0x20 <3>[ 14.518503] <3>[ 14.518730] The buggy address belongs to the object at fff00000c6738000 <3>[ 14.518730] which belongs to the cache kmalloc-8k of size 8192 <3>[ 14.519771] The buggy address is located 0 bytes to the right of <3>[ 14.519771] allocated 7936-byte region [fff00000c6738000, fff00000c6739f00) <3>[ 14.520769] <3>[ 14.520987] The buggy address belongs to the physical page: <4>[ 14.521474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106738 <4>[ 14.522163] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.522533] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.522915] page_type: 0xffffefff(slab) <4>[ 14.523174] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 <4>[ 14.523587] raw: 0000000000000000 0000000080020002 00000001ffffefff 0000000000000000 <4>[ 14.524012] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 <4>[ 14.524417] head: 0000000000000000 0000000080020002 00000001ffffefff 0000000000000000 <4>[ 14.524815] head: 0bfffe0000000003 ffffc1ffc319ce01 ffffffffffffffff 0000000000000000 <4>[ 14.525204] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.525625] page dumped because: kasan: bad access detected <3>[ 14.525988] <3>[ 14.526130] Memory state around the buggy address: <3>[ 14.526387] fff00000c6739e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.526681] fff00000c6739e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.527036] >fff00000c6739f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.527331] ^ <3>[ 14.527492] fff00000c6739f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.527776] fff00000c673a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.528099] ================================================================== <6>[ 14.530593] ok 4 kmalloc_big_oob_right <3>[ 14.532116] ================================================================== <3>[ 14.533018] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x28c/0x2d0 <3>[ 14.533609] Write of size 1 at addr fff00000c66e200a by task kunit_try_catch/129 <3>[ 14.534277] <3>[ 14.534494] CPU: 1 PID: 129 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.535187] Hardware name: linux,dummy-virt (DT) <3>[ 14.535585] Call trace: <3>[ 14.535851] dump_backtrace+0x9c/0x128 <3>[ 14.536227] show_stack+0x20/0x38 <3>[ 14.536581] dump_stack_lvl+0x8c/0xd0 <3>[ 14.536949] print_report+0x118/0x5e0 <3>[ 14.537327] kasan_report+0xc8/0x118 <3>[ 14.537689] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.538232] kmalloc_large_oob_right+0x28c/0x2d0 <3>[ 14.538656] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.539060] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.539604] kthread+0x24c/0x2d0 <3>[ 14.540033] ret_from_fork+0x10/0x20 <3>[ 14.540467] <3>[ 14.540765] The buggy address belongs to the physical page: <4>[ 14.541383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e0 <4>[ 14.542234] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.542808] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.543293] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.543772] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.544254] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.544728] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.545211] head: 0bfffe0000000002 ffffc1ffc319b801 ffffffffffffffff 0000000000000000 <4>[ 14.545681] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.546250] page dumped because: kasan: bad access detected <3>[ 14.546637] <3>[ 14.546791] Memory state around the buggy address: <3>[ 14.547110] fff00000c66e1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.547551] fff00000c66e1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.547988] >fff00000c66e2000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.548421] ^ <3>[ 14.548682] fff00000c66e2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.549120] fff00000c66e2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.549549] ================================================================== <6>[ 14.552050] ok 5 kmalloc_large_oob_right <3>[ 14.553436] ================================================================== <3>[ 14.553970] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2d8/0x300 <3>[ 14.554317] Read of size 1 at addr fff00000c5e38000 by task kunit_try_catch/131 <3>[ 14.554621] <3>[ 14.554766] CPU: 0 PID: 131 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.555200] Hardware name: linux,dummy-virt (DT) <3>[ 14.555411] Call trace: <3>[ 14.555564] dump_backtrace+0x9c/0x128 <3>[ 14.555772] show_stack+0x20/0x38 <3>[ 14.555958] dump_stack_lvl+0x8c/0xd0 <3>[ 14.556158] print_report+0x118/0x5e0 <3>[ 14.556367] kasan_report+0xc8/0x118 <3>[ 14.556564] __asan_report_load1_noabort+0x20/0x30 <3>[ 14.556795] kmalloc_large_uaf+0x2d8/0x300 <3>[ 14.557003] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.557227] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.557481] kthread+0x24c/0x2d0 <3>[ 14.557668] ret_from_fork+0x10/0x20 <3>[ 14.557897] <3>[ 14.558050] The buggy address belongs to the physical page: <4>[ 14.558310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105e38 <4>[ 14.558642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.558935] raw: 0bfffe0000000000 ffffc1ffc3178f08 fff00000da0f1840 0000000000000000 <4>[ 14.559247] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.559556] page dumped because: kasan: bad access detected <3>[ 14.559795] <3>[ 14.559921] Memory state around the buggy address: <3>[ 14.560150] fff00000c5e37f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.560456] fff00000c5e37f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.560760] >fff00000c5e38000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 14.561047] ^ <3>[ 14.561228] fff00000c5e38080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 14.561534] fff00000c5e38100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 14.561829] ================================================================== <6>[ 14.564366] ok 6 kmalloc_large_uaf <3>[ 14.565785] ================================================================== <3>[ 14.566522] BUG: KASAN: invalid-free in kfree+0x288/0x2f0 <3>[ 14.566923] Free of addr fff00000c66e0001 by task kunit_try_catch/133 <3>[ 14.567337] <3>[ 14.567526] CPU: 1 PID: 133 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.568108] Hardware name: linux,dummy-virt (DT) <3>[ 14.568430] Call trace: <3>[ 14.568652] dump_backtrace+0x9c/0x128 <3>[ 14.568958] show_stack+0x20/0x38 <3>[ 14.569231] dump_stack_lvl+0x8c/0xd0 <3>[ 14.569511] print_report+0x118/0x5e0 <3>[ 14.569807] kasan_report_invalid_free+0xb0/0xd8 <3>[ 14.570162] __kasan_kfree_large+0x5c/0xa8 <3>[ 14.570487] free_large_kmalloc+0x58/0x140 <3>[ 14.570796] kfree+0x288/0x2f0 <3>[ 14.571068] kmalloc_large_invalid_free+0x114/0x290 <3>[ 14.571409] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.571724] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.572098] kthread+0x24c/0x2d0 <3>[ 14.572379] ret_from_fork+0x10/0x20 <3>[ 14.572669] <3>[ 14.572848] The buggy address belongs to the physical page: <4>[ 14.573195] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e0 <4>[ 14.573674] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.574259] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.574737] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.575214] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.575694] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.576172] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.576652] head: 0bfffe0000000002 ffffc1ffc319b801 ffffffffffffffff 0000000000000000 <4>[ 14.577128] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.577590] page dumped because: kasan: bad access detected <3>[ 14.577997] <3>[ 14.578183] Memory state around the buggy address: <3>[ 14.578484] fff00000c66dff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.578850] fff00000c66dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.579182] >fff00000c66e0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.579440] ^ <3>[ 14.579588] fff00000c66e0080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.579864] fff00000c66e0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.580131] ================================================================== <6>[ 14.582189] ok 7 kmalloc_large_invalid_free <6>[ 14.584487] ok 8 page_alloc_oob_right # SKIP Test requires CONFIG_KASAN_GENERIC=n <3>[ 14.585777] ================================================================== <3>[ 14.586426] BUG: KASAN: use-after-free in page_alloc_uaf+0x33c/0x368 <3>[ 14.586740] Read of size 1 at addr fff00000c6770000 by task kunit_try_catch/137 <3>[ 14.587069] <3>[ 14.587275] CPU: 0 PID: 137 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.587707] Hardware name: linux,dummy-virt (DT) <3>[ 14.587949] Call trace: <3>[ 14.588132] dump_backtrace+0x9c/0x128 <3>[ 14.588365] show_stack+0x20/0x38 <3>[ 14.588587] dump_stack_lvl+0x8c/0xd0 <3>[ 14.588830] print_report+0x118/0x5e0 <3>[ 14.589068] kasan_report+0xc8/0x118 <3>[ 14.589300] __asan_report_load1_noabort+0x20/0x30 <3>[ 14.589564] page_alloc_uaf+0x33c/0x368 <3>[ 14.589809] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.590110] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.590404] kthread+0x24c/0x2d0 <3>[ 14.590628] ret_from_fork+0x10/0x20 <3>[ 14.590858] <3>[ 14.591013] The buggy address belongs to the physical page: <4>[ 14.591288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106770 <4>[ 14.591647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.591950] page_type: 0xffffff7f(buddy) <4>[ 14.592186] raw: 0bfffe0000000000 fff00000ff614960 fff00000ff614960 0000000000000000 <4>[ 14.592535] raw: 0000000000000000 0000000000000004 00000000ffffff7f 0000000000000000 <4>[ 14.592869] page dumped because: kasan: bad access detected <3>[ 14.593146] <3>[ 14.593297] Memory state around the buggy address: <3>[ 14.593551] fff00000c676ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 14.593921] fff00000c676ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 14.594274] >fff00000c6770000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 14.594589] ^ <3>[ 14.594794] fff00000c6770080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 14.595115] fff00000c6770100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 14.595431] ================================================================== <6>[ 14.597679] ok 9 page_alloc_uaf <3>[ 14.599030] ================================================================== <3>[ 14.599519] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x630/0x698 <3>[ 14.599874] Write of size 1 at addr fff00000c0961ceb by task kunit_try_catch/139 <3>[ 14.600207] <3>[ 14.600404] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.600829] Hardware name: linux,dummy-virt (DT) <3>[ 14.601059] Call trace: <3>[ 14.601243] dump_backtrace+0x9c/0x128 <3>[ 14.601473] show_stack+0x20/0x38 <3>[ 14.601688] dump_stack_lvl+0x8c/0xd0 <3>[ 14.601968] print_report+0x118/0x5e0 <3>[ 14.602209] kasan_report+0xc8/0x118 <3>[ 14.602453] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.602713] krealloc_more_oob_helper+0x630/0x698 <3>[ 14.602972] krealloc_more_oob+0x20/0x38 <3>[ 14.603209] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.603453] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.603738] kthread+0x24c/0x2d0 <3>[ 14.603971] ret_from_fork+0x10/0x20 <3>[ 14.604207] <3>[ 14.604357] Allocated by task 139: <4>[ 14.604564] kasan_save_stack+0x3c/0x68 <4>[ 14.604801] kasan_save_track+0x20/0x40 <4>[ 14.605029] kasan_save_alloc_info+0x40/0x58 <4>[ 14.605271] __kasan_krealloc+0x128/0x188 <4>[ 14.605509] krealloc_noprof+0xec/0x180 <4>[ 14.605759] krealloc_more_oob_helper+0x170/0x698 <4>[ 14.606074] krealloc_more_oob+0x20/0x38 <4>[ 14.606276] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.606553] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.606834] kthread+0x24c/0x2d0 <4>[ 14.607040] ret_from_fork+0x10/0x20 <3>[ 14.607255] <3>[ 14.607358] The buggy address belongs to the object at fff00000c0961c00 <3>[ 14.607358] which belongs to the cache kmalloc-256 of size 256 <3>[ 14.607923] The buggy address is located 0 bytes to the right of <3>[ 14.607923] allocated 235-byte region [fff00000c0961c00, fff00000c0961ceb) <3>[ 14.608472] <3>[ 14.608623] The buggy address belongs to the physical page: <4>[ 14.608893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100960 <4>[ 14.609249] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.609578] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.609934] page_type: 0xffffefff(slab) <4>[ 14.610179] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.610534] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.610869] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.611208] head: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.611551] head: 0bfffe0000000001 ffffc1ffc3025801 ffffffffffffffff 0000000000000000 <4>[ 14.611891] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.612229] page dumped because: kasan: bad access detected <3>[ 14.612503] <3>[ 14.612656] Memory state around the buggy address: <3>[ 14.612903] fff00000c0961b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.613218] fff00000c0961c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.613541] >fff00000c0961c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc <3>[ 14.613896] ^ <3>[ 14.614222] fff00000c0961d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.614551] fff00000c0961d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.614859] ================================================================== <3>[ 14.615494] ================================================================== <3>[ 14.615884] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5e4/0x698 <3>[ 14.616209] Write of size 1 at addr fff00000c0961cf0 by task kunit_try_catch/139 <3>[ 14.616570] <3>[ 14.616742] CPU: 0 PID: 139 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.617130] Hardware name: linux,dummy-virt (DT) <3>[ 14.617359] Call trace: <3>[ 14.617530] dump_backtrace+0x9c/0x128 <3>[ 14.617752] show_stack+0x20/0x38 <3>[ 14.618019] dump_stack_lvl+0x8c/0xd0 <3>[ 14.618258] print_report+0x118/0x5e0 <3>[ 14.618542] kasan_report+0xc8/0x118 <3>[ 14.618766] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.619026] krealloc_more_oob_helper+0x5e4/0x698 <3>[ 14.619290] krealloc_more_oob+0x20/0x38 <3>[ 14.619529] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.619777] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.620061] kthread+0x24c/0x2d0 <3>[ 14.620279] ret_from_fork+0x10/0x20 <3>[ 14.620507] <3>[ 14.620657] Allocated by task 139: <4>[ 14.620868] kasan_save_stack+0x3c/0x68 <4>[ 14.621059] kasan_save_track+0x20/0x40 <4>[ 14.621332] kasan_save_alloc_info+0x40/0x58 <4>[ 14.621578] __kasan_krealloc+0x128/0x188 <4>[ 14.621812] krealloc_noprof+0xec/0x180 <4>[ 14.622062] krealloc_more_oob_helper+0x170/0x698 <4>[ 14.622322] krealloc_more_oob+0x20/0x38 <4>[ 14.622551] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.622790] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.623067] kthread+0x24c/0x2d0 <4>[ 14.623279] ret_from_fork+0x10/0x20 <3>[ 14.623498] <3>[ 14.623647] The buggy address belongs to the object at fff00000c0961c00 <3>[ 14.623647] which belongs to the cache kmalloc-256 of size 256 <3>[ 14.624162] The buggy address is located 5 bytes to the right of <3>[ 14.624162] allocated 235-byte region [fff00000c0961c00, fff00000c0961ceb) <3>[ 14.624700] <3>[ 14.624854] The buggy address belongs to the physical page: <4>[ 14.625123] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100960 <4>[ 14.625486] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.625826] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.626144] page_type: 0xffffefff(slab) <4>[ 14.626385] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.626724] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.627063] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.627398] head: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.627736] head: 0bfffe0000000001 ffffc1ffc3025801 ffffffffffffffff 0000000000000000 <4>[ 14.628075] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.628407] page dumped because: kasan: bad access detected <3>[ 14.628668] <3>[ 14.628817] Memory state around the buggy address: <3>[ 14.629062] fff00000c0961b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.629376] fff00000c0961c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.629706] >fff00000c0961c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc <3>[ 14.630118] ^ <3>[ 14.630434] fff00000c0961d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.630752] fff00000c0961d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.631069] ================================================================== <6>[ 14.633712] ok 10 krealloc_more_oob <3>[ 14.635077] ================================================================== <3>[ 14.635519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa24/0xbc0 <3>[ 14.635863] Write of size 1 at addr fff00000c0961ec9 by task kunit_try_catch/141 <3>[ 14.636230] <3>[ 14.636409] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.636812] Hardware name: linux,dummy-virt (DT) <3>[ 14.637047] Call trace: <3>[ 14.637224] dump_backtrace+0x9c/0x128 <3>[ 14.637448] show_stack+0x20/0x38 <3>[ 14.637659] dump_stack_lvl+0x8c/0xd0 <3>[ 14.637941] print_report+0x118/0x5e0 <3>[ 14.638172] kasan_report+0xc8/0x118 <3>[ 14.638444] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.638726] krealloc_less_oob_helper+0xa24/0xbc0 <3>[ 14.638992] krealloc_less_oob+0x20/0x38 <3>[ 14.639240] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.639491] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.639781] kthread+0x24c/0x2d0 <3>[ 14.640000] ret_from_fork+0x10/0x20 <3>[ 14.640238] <3>[ 14.640389] Allocated by task 141: <4>[ 14.640596] kasan_save_stack+0x3c/0x68 <4>[ 14.640840] kasan_save_track+0x20/0x40 <4>[ 14.641069] kasan_save_alloc_info+0x40/0x58 <4>[ 14.641320] __kasan_krealloc+0x128/0x188 <4>[ 14.641553] krealloc_noprof+0xec/0x180 <4>[ 14.641788] krealloc_less_oob_helper+0x170/0xbc0 <4>[ 14.642072] krealloc_less_oob+0x20/0x38 <4>[ 14.642308] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.642545] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.642834] kthread+0x24c/0x2d0 <4>[ 14.643048] ret_from_fork+0x10/0x20 <3>[ 14.643266] <3>[ 14.643417] The buggy address belongs to the object at fff00000c0961e00 <3>[ 14.643417] which belongs to the cache kmalloc-256 of size 256 <3>[ 14.643920] The buggy address is located 0 bytes to the right of <3>[ 14.643920] allocated 201-byte region [fff00000c0961e00, fff00000c0961ec9) <3>[ 14.644471] <3>[ 14.644627] The buggy address belongs to the physical page: <4>[ 14.644893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100960 <4>[ 14.645243] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.645573] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.645919] page_type: 0xffffefff(slab) <4>[ 14.646160] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.646547] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.646905] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.647275] head: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.647618] head: 0bfffe0000000001 ffffc1ffc3025801 ffffffffffffffff 0000000000000000 <4>[ 14.647961] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.648300] page dumped because: kasan: bad access detected <3>[ 14.648574] <3>[ 14.648727] Memory state around the buggy address: <3>[ 14.648976] fff00000c0961d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.649303] fff00000c0961e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.649618] >fff00000c0961e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 14.649977] ^ <3>[ 14.650279] fff00000c0961f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.650596] fff00000c0961f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.650905] ================================================================== <3>[ 14.651546] ================================================================== <3>[ 14.651946] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb18/0xbc0 <3>[ 14.652273] Write of size 1 at addr fff00000c0961ed0 by task kunit_try_catch/141 <3>[ 14.652592] <3>[ 14.652730] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.653211] Hardware name: linux,dummy-virt (DT) <3>[ 14.653443] Call trace: <3>[ 14.653614] dump_backtrace+0x9c/0x128 <3>[ 14.653852] show_stack+0x20/0x38 <3>[ 14.654098] dump_stack_lvl+0x8c/0xd0 <3>[ 14.654370] print_report+0x118/0x5e0 <3>[ 14.654607] kasan_report+0xc8/0x118 <3>[ 14.654835] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.655109] krealloc_less_oob_helper+0xb18/0xbc0 <3>[ 14.655378] krealloc_less_oob+0x20/0x38 <3>[ 14.655614] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.655871] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.656169] kthread+0x24c/0x2d0 <3>[ 14.656390] ret_from_fork+0x10/0x20 <3>[ 14.656624] <3>[ 14.656779] Allocated by task 141: <4>[ 14.656995] kasan_save_stack+0x3c/0x68 <4>[ 14.657240] kasan_save_track+0x20/0x40 <4>[ 14.657468] kasan_save_alloc_info+0x40/0x58 <4>[ 14.657715] __kasan_krealloc+0x128/0x188 <4>[ 14.658058] krealloc_noprof+0xec/0x180 <4>[ 14.658320] krealloc_less_oob_helper+0x170/0xbc0 <4>[ 14.658577] krealloc_less_oob+0x20/0x38 <4>[ 14.658764] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.659039] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.659330] kthread+0x24c/0x2d0 <4>[ 14.659571] ret_from_fork+0x10/0x20 <3>[ 14.659794] <3>[ 14.659949] The buggy address belongs to the object at fff00000c0961e00 <3>[ 14.659949] which belongs to the cache kmalloc-256 of size 256 <3>[ 14.660457] The buggy address is located 7 bytes to the right of <3>[ 14.660457] allocated 201-byte region [fff00000c0961e00, fff00000c0961ec9) <3>[ 14.661002] <3>[ 14.661158] The buggy address belongs to the physical page: <4>[ 14.661432] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100960 <4>[ 14.661790] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.662153] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.662487] page_type: 0xffffefff(slab) <4>[ 14.662716] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.663056] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.663400] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.663781] head: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.664176] head: 0bfffe0000000001 ffffc1ffc3025801 ffffffffffffffff 0000000000000000 <4>[ 14.664547] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.664897] page dumped because: kasan: bad access detected <3>[ 14.665162] <3>[ 14.665314] Memory state around the buggy address: <3>[ 14.665563] fff00000c0961d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.665927] fff00000c0961e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.666273] >fff00000c0961e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 14.666583] ^ <3>[ 14.666861] fff00000c0961f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.667177] fff00000c0961f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.667486] ================================================================== <3>[ 14.668859] ================================================================== <3>[ 14.669132] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa4c/0xbc0 <3>[ 14.669469] Write of size 1 at addr fff00000c0961eda by task kunit_try_catch/141 <3>[ 14.669884] <3>[ 14.670056] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.670483] Hardware name: linux,dummy-virt (DT) <3>[ 14.670726] Call trace: <3>[ 14.670907] dump_backtrace+0x9c/0x128 <3>[ 14.671139] show_stack+0x20/0x38 <3>[ 14.671357] dump_stack_lvl+0x8c/0xd0 <3>[ 14.671589] print_report+0x118/0x5e0 <3>[ 14.671825] kasan_report+0xc8/0x118 <3>[ 14.672053] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.672319] krealloc_less_oob_helper+0xa4c/0xbc0 <3>[ 14.672577] krealloc_less_oob+0x20/0x38 <3>[ 14.672811] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.673057] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.673340] kthread+0x24c/0x2d0 <3>[ 14.673561] ret_from_fork+0x10/0x20 <3>[ 14.673793] <3>[ 14.673948] Allocated by task 141: <4>[ 14.674167] kasan_save_stack+0x3c/0x68 <4>[ 14.674415] kasan_save_track+0x20/0x40 <4>[ 14.674644] kasan_save_alloc_info+0x40/0x58 <4>[ 14.674892] __kasan_krealloc+0x128/0x188 <4>[ 14.675129] krealloc_noprof+0xec/0x180 <4>[ 14.675359] krealloc_less_oob_helper+0x170/0xbc0 <4>[ 14.675618] krealloc_less_oob+0x20/0x38 <4>[ 14.675847] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.676085] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.676365] kthread+0x24c/0x2d0 <4>[ 14.676573] ret_from_fork+0x10/0x20 <3>[ 14.676790] <3>[ 14.676943] The buggy address belongs to the object at fff00000c0961e00 <3>[ 14.676943] which belongs to the cache kmalloc-256 of size 256 <3>[ 14.677481] The buggy address is located 17 bytes to the right of <3>[ 14.677481] allocated 201-byte region [fff00000c0961e00, fff00000c0961ec9) <3>[ 14.678012] <3>[ 14.678164] The buggy address belongs to the physical page: <4>[ 14.678432] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100960 <4>[ 14.678766] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.679088] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.679400] page_type: 0xffffefff(slab) <4>[ 14.679627] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.679955] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.680291] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.680639] head: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.680975] head: 0bfffe0000000001 ffffc1ffc3025801 ffffffffffffffff 0000000000000000 <4>[ 14.681313] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.681641] page dumped because: kasan: bad access detected <3>[ 14.681919] <3>[ 14.682068] Memory state around the buggy address: <3>[ 14.682323] fff00000c0961d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.682640] fff00000c0961e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.682952] >fff00000c0961e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 14.683257] ^ <3>[ 14.683550] fff00000c0961f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.683864] fff00000c0961f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.684172] ================================================================== <3>[ 14.684920] ================================================================== <3>[ 14.685332] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa90/0xbc0 <3>[ 14.685662] Write of size 1 at addr fff00000c0961eea by task kunit_try_catch/141 <3>[ 14.685960] <3>[ 14.686160] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.686598] Hardware name: linux,dummy-virt (DT) <3>[ 14.686836] Call trace: <3>[ 14.687012] dump_backtrace+0x9c/0x128 <3>[ 14.687248] show_stack+0x20/0x38 <3>[ 14.687475] dump_stack_lvl+0x8c/0xd0 <3>[ 14.687708] print_report+0x118/0x5e0 <3>[ 14.687938] kasan_report+0xc8/0x118 <3>[ 14.688160] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.688420] krealloc_less_oob_helper+0xa90/0xbc0 <3>[ 14.688678] krealloc_less_oob+0x20/0x38 <3>[ 14.688919] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.689160] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.689444] kthread+0x24c/0x2d0 <3>[ 14.689661] ret_from_fork+0x10/0x20 <3>[ 14.689892] <3>[ 14.690042] Allocated by task 141: <4>[ 14.690259] kasan_save_stack+0x3c/0x68 <4>[ 14.690485] kasan_save_track+0x20/0x40 <4>[ 14.690706] kasan_save_alloc_info+0x40/0x58 <4>[ 14.690940] __kasan_krealloc+0x128/0x188 <4>[ 14.691166] krealloc_noprof+0xec/0x180 <4>[ 14.691391] krealloc_less_oob_helper+0x170/0xbc0 <4>[ 14.691637] krealloc_less_oob+0x20/0x38 <4>[ 14.691866] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.692096] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.692367] kthread+0x24c/0x2d0 <4>[ 14.692571] ret_from_fork+0x10/0x20 <3>[ 14.692786] <3>[ 14.692931] The buggy address belongs to the object at fff00000c0961e00 <3>[ 14.692931] which belongs to the cache kmalloc-256 of size 256 <3>[ 14.693456] The buggy address is located 33 bytes to the right of <3>[ 14.693456] allocated 201-byte region [fff00000c0961e00, fff00000c0961ec9) <3>[ 14.693973] <3>[ 14.694123] The buggy address belongs to the physical page: <4>[ 14.694403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100960 <4>[ 14.694740] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.695069] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.695382] page_type: 0xffffefff(slab) <4>[ 14.695605] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.695948] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.696288] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.696622] head: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.696965] head: 0bfffe0000000001 ffffc1ffc3025801 ffffffffffffffff 0000000000000000 <4>[ 14.697302] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.697629] page dumped because: kasan: bad access detected <3>[ 14.697888] <3>[ 14.698036] Memory state around the buggy address: <3>[ 14.698289] fff00000c0961d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.698604] fff00000c0961e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.698914] >fff00000c0961e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 14.699214] ^ <3>[ 14.699506] fff00000c0961f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.699815] fff00000c0961f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.700117] ================================================================== <3>[ 14.700839] ================================================================== <3>[ 14.701179] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa34/0xbc0 <3>[ 14.701496] Write of size 1 at addr fff00000c0961eeb by task kunit_try_catch/141 <3>[ 14.701868] <3>[ 14.702035] CPU: 0 PID: 141 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.702448] Hardware name: linux,dummy-virt (DT) <3>[ 14.702679] Call trace: <3>[ 14.702852] dump_backtrace+0x9c/0x128 <3>[ 14.703079] show_stack+0x20/0x38 <3>[ 14.703292] dump_stack_lvl+0x8c/0xd0 <3>[ 14.703525] print_report+0x118/0x5e0 <3>[ 14.703755] kasan_report+0xc8/0x118 <3>[ 14.703980] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.704248] krealloc_less_oob_helper+0xa34/0xbc0 <3>[ 14.704502] krealloc_less_oob+0x20/0x38 <3>[ 14.704734] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.704972] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.705248] kthread+0x24c/0x2d0 <3>[ 14.705462] ret_from_fork+0x10/0x20 <3>[ 14.705692] <3>[ 14.705840] Allocated by task 141: <4>[ 14.706049] kasan_save_stack+0x3c/0x68 <4>[ 14.706287] kasan_save_track+0x20/0x40 <4>[ 14.706513] kasan_save_alloc_info+0x40/0x58 <4>[ 14.706753] __kasan_krealloc+0x128/0x188 <4>[ 14.706977] krealloc_noprof+0xec/0x180 <4>[ 14.707214] krealloc_less_oob_helper+0x170/0xbc0 <4>[ 14.707461] krealloc_less_oob+0x20/0x38 <4>[ 14.707681] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.707912] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.708174] kthread+0x24c/0x2d0 <4>[ 14.708375] ret_from_fork+0x10/0x20 <3>[ 14.708584] <3>[ 14.708718] The buggy address belongs to the object at fff00000c0961e00 <3>[ 14.708718] which belongs to the cache kmalloc-256 of size 256 <3>[ 14.709230] The buggy address is located 34 bytes to the right of <3>[ 14.709230] allocated 201-byte region [fff00000c0961e00, fff00000c0961ec9) <3>[ 14.709746] <3>[ 14.709897] The buggy address belongs to the physical page: <4>[ 14.710155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100960 <4>[ 14.710512] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.710833] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.711150] page_type: 0xffffefff(slab) <4>[ 14.711375] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.711708] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.712038] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.712375] head: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.712711] head: 0bfffe0000000001 ffffc1ffc3025801 ffffffffffffffff 0000000000000000 <4>[ 14.713043] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.713365] page dumped because: kasan: bad access detected <3>[ 14.713624] <3>[ 14.713769] Memory state around the buggy address: <3>[ 14.714007] fff00000c0961d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.714327] fff00000c0961e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.714634] >fff00000c0961e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc <3>[ 14.714942] ^ <3>[ 14.715236] fff00000c0961f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.715545] fff00000c0961f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.715850] ================================================================== <6>[ 14.718191] ok 11 krealloc_less_oob <3>[ 14.719211] ================================================================== <3>[ 14.719710] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x630/0x698 <3>[ 14.720006] Write of size 1 at addr fff00000c66e60eb by task kunit_try_catch/143 <3>[ 14.720301] <3>[ 14.720421] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.720869] Hardware name: linux,dummy-virt (DT) <3>[ 14.721080] Call trace: <3>[ 14.721216] dump_backtrace+0x9c/0x128 <3>[ 14.721402] show_stack+0x20/0x38 <3>[ 14.721574] dump_stack_lvl+0x8c/0xd0 <3>[ 14.721760] print_report+0x118/0x5e0 <3>[ 14.722008] kasan_report+0xc8/0x118 <3>[ 14.722231] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.722440] krealloc_more_oob_helper+0x630/0x698 <3>[ 14.722636] krealloc_large_more_oob+0x20/0x38 <3>[ 14.722835] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.723025] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.723286] kthread+0x24c/0x2d0 <3>[ 14.723446] ret_from_fork+0x10/0x20 <3>[ 14.723628] <3>[ 14.723732] The buggy address belongs to the physical page: <4>[ 14.723942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 <4>[ 14.724230] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.724498] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.724774] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.725058] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.725335] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.725609] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.725928] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 <4>[ 14.726272] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.726570] page dumped because: kasan: bad access detected <3>[ 14.726792] <3>[ 14.726896] Memory state around the buggy address: <3>[ 14.727102] fff00000c66e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.727372] fff00000c66e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.727638] >fff00000c66e6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe <3>[ 14.727899] ^ <3>[ 14.728163] fff00000c66e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.728457] fff00000c66e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.728725] ================================================================== <3>[ 14.729186] ================================================================== <3>[ 14.729482] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5e4/0x698 <3>[ 14.729764] Write of size 1 at addr fff00000c66e60f0 by task kunit_try_catch/143 <3>[ 14.730164] <3>[ 14.730331] CPU: 1 PID: 143 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.730729] Hardware name: linux,dummy-virt (DT) <3>[ 14.730909] Call trace: <3>[ 14.731033] dump_backtrace+0x9c/0x128 <3>[ 14.731208] show_stack+0x20/0x38 <3>[ 14.731366] dump_stack_lvl+0x8c/0xd0 <3>[ 14.731532] print_report+0x118/0x5e0 <3>[ 14.731704] kasan_report+0xc8/0x118 <3>[ 14.731868] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.732067] krealloc_more_oob_helper+0x5e4/0x698 <3>[ 14.732259] krealloc_large_more_oob+0x20/0x38 <3>[ 14.732449] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.732629] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.732852] kthread+0x24c/0x2d0 <3>[ 14.733008] ret_from_fork+0x10/0x20 <3>[ 14.733178] <3>[ 14.733280] The buggy address belongs to the physical page: <4>[ 14.733488] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 <4>[ 14.733769] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.734178] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.734452] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.734741] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.735030] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.735320] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.735617] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 <4>[ 14.735908] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.736227] page dumped because: kasan: bad access detected <3>[ 14.736466] <3>[ 14.736566] Memory state around the buggy address: <3>[ 14.736762] fff00000c66e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.737020] fff00000c66e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.737276] >fff00000c66e6080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe <3>[ 14.737525] ^ <3>[ 14.737763] fff00000c66e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.738104] fff00000c66e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.738439] ================================================================== <6>[ 14.740096] ok 12 krealloc_large_more_oob <3>[ 14.740887] ================================================================== <3>[ 14.741384] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa24/0xbc0 <3>[ 14.741724] Write of size 1 at addr fff00000c66e60c9 by task kunit_try_catch/145 <3>[ 14.742178] <3>[ 14.742341] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.742838] Hardware name: linux,dummy-virt (DT) <3>[ 14.743020] Call trace: <3>[ 14.743144] dump_backtrace+0x9c/0x128 <3>[ 14.743320] show_stack+0x20/0x38 <3>[ 14.743476] dump_stack_lvl+0x8c/0xd0 <3>[ 14.743645] print_report+0x118/0x5e0 <3>[ 14.743815] kasan_report+0xc8/0x118 <3>[ 14.743983] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.744181] krealloc_less_oob_helper+0xa24/0xbc0 <3>[ 14.744370] krealloc_large_less_oob+0x20/0x38 <3>[ 14.744554] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.744735] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.744963] kthread+0x24c/0x2d0 <3>[ 14.745135] ret_from_fork+0x10/0x20 <3>[ 14.745341] <3>[ 14.745452] The buggy address belongs to the physical page: <4>[ 14.745672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 <4>[ 14.746119] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.746525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.746866] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.747182] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.747556] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.747847] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.748124] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 <4>[ 14.748475] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.748768] page dumped because: kasan: bad access detected <3>[ 14.749046] <3>[ 14.749178] Memory state around the buggy address: <3>[ 14.749439] fff00000c66e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.749795] fff00000c66e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.750187] >fff00000c66e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 14.750579] ^ <3>[ 14.750861] fff00000c66e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.751125] fff00000c66e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.751471] ================================================================== <3>[ 14.751929] ================================================================== <3>[ 14.752270] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb18/0xbc0 <3>[ 14.752593] Write of size 1 at addr fff00000c66e60d0 by task kunit_try_catch/145 <3>[ 14.752854] <3>[ 14.752966] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.753329] Hardware name: linux,dummy-virt (DT) <3>[ 14.753525] Call trace: <3>[ 14.753660] dump_backtrace+0x9c/0x128 <3>[ 14.753855] show_stack+0x20/0x38 <3>[ 14.754072] dump_stack_lvl+0x8c/0xd0 <3>[ 14.754295] print_report+0x118/0x5e0 <3>[ 14.754522] kasan_report+0xc8/0x118 <3>[ 14.754743] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.755009] krealloc_less_oob_helper+0xb18/0xbc0 <3>[ 14.755257] krealloc_large_less_oob+0x20/0x38 <3>[ 14.755496] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.755739] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.756039] kthread+0x24c/0x2d0 <3>[ 14.756284] ret_from_fork+0x10/0x20 <3>[ 14.756492] <3>[ 14.756619] The buggy address belongs to the physical page: <4>[ 14.756907] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 <4>[ 14.757292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.757665] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.758188] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.758627] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.759040] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.759399] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.759771] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 <4>[ 14.760076] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.760374] page dumped because: kasan: bad access detected <3>[ 14.760588] <3>[ 14.760695] Memory state around the buggy address: <3>[ 14.760899] fff00000c66e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.761172] fff00000c66e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.761494] >fff00000c66e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 14.761747] ^ <3>[ 14.762100] fff00000c66e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.762560] fff00000c66e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.762913] ================================================================== <3>[ 14.763324] ================================================================== <3>[ 14.763652] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa4c/0xbc0 <3>[ 14.763975] Write of size 1 at addr fff00000c66e60da by task kunit_try_catch/145 <3>[ 14.764324] <3>[ 14.764437] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.764896] Hardware name: linux,dummy-virt (DT) <3>[ 14.765138] Call trace: <3>[ 14.765280] dump_backtrace+0x9c/0x128 <3>[ 14.765506] show_stack+0x20/0x38 <3>[ 14.765696] dump_stack_lvl+0x8c/0xd0 <3>[ 14.765928] print_report+0x118/0x5e0 <3>[ 14.766186] kasan_report+0xc8/0x118 <3>[ 14.766406] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.766672] krealloc_less_oob_helper+0xa4c/0xbc0 <3>[ 14.766898] krealloc_large_less_oob+0x20/0x38 <3>[ 14.767152] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.767373] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.767631] kthread+0x24c/0x2d0 <3>[ 14.767808] ret_from_fork+0x10/0x20 <3>[ 14.768016] <3>[ 14.768148] The buggy address belongs to the physical page: <4>[ 14.768429] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 <4>[ 14.768719] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.769083] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.769387] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.769752] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.770194] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.770614] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.770961] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 <4>[ 14.771301] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.771657] page dumped because: kasan: bad access detected <3>[ 14.771926] <3>[ 14.772052] Memory state around the buggy address: <3>[ 14.772313] fff00000c66e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.772629] fff00000c66e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.772977] >fff00000c66e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 14.773291] ^ <3>[ 14.773562] fff00000c66e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.773955] fff00000c66e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.774329] ================================================================== <3>[ 14.774724] ================================================================== <3>[ 14.775025] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa90/0xbc0 <3>[ 14.775326] Write of size 1 at addr fff00000c66e60ea by task kunit_try_catch/145 <3>[ 14.775587] <3>[ 14.775690] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.776042] Hardware name: linux,dummy-virt (DT) <3>[ 14.776219] Call trace: <3>[ 14.776340] dump_backtrace+0x9c/0x128 <3>[ 14.776514] show_stack+0x20/0x38 <3>[ 14.776676] dump_stack_lvl+0x8c/0xd0 <3>[ 14.776852] print_report+0x118/0x5e0 <3>[ 14.777041] kasan_report+0xc8/0x118 <3>[ 14.777207] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.777460] krealloc_less_oob_helper+0xa90/0xbc0 <3>[ 14.777668] krealloc_large_less_oob+0x20/0x38 <3>[ 14.777917] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.778141] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.778418] kthread+0x24c/0x2d0 <3>[ 14.778588] ret_from_fork+0x10/0x20 <3>[ 14.778772] <3>[ 14.778879] The buggy address belongs to the physical page: <4>[ 14.779094] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 <4>[ 14.779396] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.779686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.779961] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.780253] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.780536] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.780817] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.781091] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 <4>[ 14.781369] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.781645] page dumped because: kasan: bad access detected <3>[ 14.781888] <3>[ 14.782017] Memory state around the buggy address: <3>[ 14.782222] fff00000c66e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.782494] fff00000c66e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.782758] >fff00000c66e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 14.783013] ^ <3>[ 14.783251] fff00000c66e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.783511] fff00000c66e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.783759] ================================================================== <3>[ 14.784077] ================================================================== <3>[ 14.784341] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa34/0xbc0 <3>[ 14.784649] Write of size 1 at addr fff00000c66e60eb by task kunit_try_catch/145 <3>[ 14.784906] <3>[ 14.785003] CPU: 1 PID: 145 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.785350] Hardware name: linux,dummy-virt (DT) <3>[ 14.785519] Call trace: <3>[ 14.785641] dump_backtrace+0x9c/0x128 <3>[ 14.785819] show_stack+0x20/0x38 <3>[ 14.786027] dump_stack_lvl+0x8c/0xd0 <3>[ 14.786236] print_report+0x118/0x5e0 <3>[ 14.786418] kasan_report+0xc8/0x118 <3>[ 14.786595] __asan_report_store1_noabort+0x20/0x30 <3>[ 14.786809] krealloc_less_oob_helper+0xa34/0xbc0 <3>[ 14.787013] krealloc_large_less_oob+0x20/0x38 <3>[ 14.787210] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.787394] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.787608] kthread+0x24c/0x2d0 <3>[ 14.787771] ret_from_fork+0x10/0x20 <3>[ 14.787941] <3>[ 14.788039] The buggy address belongs to the physical page: <4>[ 14.788245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1066e4 <4>[ 14.788547] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.788829] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.789123] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.789403] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.789686] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 14.790069] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 14.790370] head: 0bfffe0000000002 ffffc1ffc319b901 ffffffffffffffff 0000000000000000 <4>[ 14.790656] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.790932] page dumped because: kasan: bad access detected <3>[ 14.791148] <3>[ 14.791245] Memory state around the buggy address: <3>[ 14.791433] fff00000c66e5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.791693] fff00000c66e6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.791948] >fff00000c66e6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe <3>[ 14.792210] ^ <3>[ 14.792450] fff00000c66e6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.792706] fff00000c66e6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 14.792955] ================================================================== <6>[ 14.794900] ok 13 krealloc_large_less_oob <3>[ 14.796449] ================================================================== <3>[ 14.797548] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x18c/0x510 <3>[ 14.798488] Read of size 1 at addr fff00000c0964000 by task kunit_try_catch/147 <3>[ 14.799339] <3>[ 14.799697] CPU: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.800637] Hardware name: linux,dummy-virt (DT) <3>[ 14.801162] Call trace: <3>[ 14.801559] dump_backtrace+0x9c/0x128 <3>[ 14.802247] show_stack+0x20/0x38 <3>[ 14.802720] dump_stack_lvl+0x8c/0xd0 <3>[ 14.803126] print_report+0x118/0x5e0 <3>[ 14.803525] kasan_report+0xc8/0x118 <3>[ 14.803918] __kasan_check_byte+0x54/0x70 <3>[ 14.804330] krealloc_noprof+0x48/0x180 <3>[ 14.804744] krealloc_uaf+0x18c/0x510 <3>[ 14.805138] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.805564] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.806168] kthread+0x24c/0x2d0 <3>[ 14.806563] ret_from_fork+0x10/0x20 <3>[ 14.806946] <3>[ 14.807208] Allocated by task 147: <4>[ 14.807559] kasan_save_stack+0x3c/0x68 <4>[ 14.807957] kasan_save_track+0x20/0x40 <4>[ 14.808357] kasan_save_alloc_info+0x40/0x58 <4>[ 14.808761] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.809135] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.809556] krealloc_uaf+0xc8/0x510 <4>[ 14.809984] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.810404] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.810869] kthread+0x24c/0x2d0 <4>[ 14.811209] ret_from_fork+0x10/0x20 <3>[ 14.811613] <3>[ 14.811891] Freed by task 147: <4>[ 14.812258] kasan_save_stack+0x3c/0x68 <4>[ 14.812665] kasan_save_track+0x20/0x40 <4>[ 14.813059] kasan_save_free_info+0x4c/0x78 <4>[ 14.813459] __kasan_slab_free+0x118/0x188 <4>[ 14.813864] kfree+0xec/0x2f0 <4>[ 14.814223] krealloc_uaf+0x130/0x510 <4>[ 14.814611] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.815012] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.815480] kthread+0x24c/0x2d0 <4>[ 14.815835] ret_from_fork+0x10/0x20 <3>[ 14.816225] <3>[ 14.816501] The buggy address belongs to the object at fff00000c0964000 <3>[ 14.816501] which belongs to the cache kmalloc-256 of size 256 <3>[ 14.817427] The buggy address is located 0 bytes inside of <3>[ 14.817427] freed 256-byte region [fff00000c0964000, fff00000c0964100) <3>[ 14.818641] <3>[ 14.818798] The buggy address belongs to the physical page: <4>[ 14.819102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100964 <4>[ 14.819438] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.819764] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.820076] page_type: 0xffffefff(slab) <4>[ 14.820302] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.820630] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.820958] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.821294] head: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.821623] head: 0bfffe0000000001 ffffc1ffc3025901 ffffffffffffffff 0000000000000000 <4>[ 14.822046] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.822382] page dumped because: kasan: bad access detected <3>[ 14.822651] <3>[ 14.822773] Memory state around the buggy address: <3>[ 14.823058] fff00000c0963f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.823401] fff00000c0963f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.823729] >fff00000c0964000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 14.824033] ^ <3>[ 14.824237] fff00000c0964080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 14.824551] fff00000c0964100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.824861] ================================================================== <3>[ 14.825522] ================================================================== <3>[ 14.825940] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c4/0x510 <3>[ 14.826301] Read of size 1 at addr fff00000c0964000 by task kunit_try_catch/147 <3>[ 14.826626] <3>[ 14.826819] CPU: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.827255] Hardware name: linux,dummy-virt (DT) <3>[ 14.827490] Call trace: <3>[ 14.827669] dump_backtrace+0x9c/0x128 <3>[ 14.827910] show_stack+0x20/0x38 <3>[ 14.828129] dump_stack_lvl+0x8c/0xd0 <3>[ 14.828355] print_report+0x118/0x5e0 <3>[ 14.828583] kasan_report+0xc8/0x118 <3>[ 14.828806] __asan_report_load1_noabort+0x20/0x30 <3>[ 14.829061] krealloc_uaf+0x4c4/0x510 <3>[ 14.829288] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.829527] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.829799] kthread+0x24c/0x2d0 <3>[ 14.830046] ret_from_fork+0x10/0x20 <3>[ 14.830232] <3>[ 14.830419] Allocated by task 147: <4>[ 14.830631] kasan_save_stack+0x3c/0x68 <4>[ 14.830853] kasan_save_track+0x20/0x40 <4>[ 14.831090] kasan_save_alloc_info+0x40/0x58 <4>[ 14.831327] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.831553] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.831795] krealloc_uaf+0xc8/0x510 <4>[ 14.832025] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.832262] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.832532] kthread+0x24c/0x2d0 <4>[ 14.832744] ret_from_fork+0x10/0x20 <3>[ 14.832963] <3>[ 14.833093] Freed by task 147: <4>[ 14.833318] kasan_save_stack+0x3c/0x68 <4>[ 14.833552] kasan_save_track+0x20/0x40 <4>[ 14.833779] kasan_save_free_info+0x4c/0x78 <4>[ 14.834113] __kasan_slab_free+0x118/0x188 <4>[ 14.834370] kfree+0xec/0x2f0 <4>[ 14.834572] krealloc_uaf+0x130/0x510 <4>[ 14.834793] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.835026] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.835297] kthread+0x24c/0x2d0 <4>[ 14.835506] ret_from_fork+0x10/0x20 <3>[ 14.835733] <3>[ 14.835872] The buggy address belongs to the object at fff00000c0964000 <3>[ 14.835872] which belongs to the cache kmalloc-256 of size 256 <3>[ 14.836392] The buggy address is located 0 bytes inside of <3>[ 14.836392] freed 256-byte region [fff00000c0964000, fff00000c0964100) <3>[ 14.836891] <3>[ 14.837022] The buggy address belongs to the physical page: <4>[ 14.837307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100964 <4>[ 14.837645] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 14.838020] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.838351] page_type: 0xffffefff(slab) <4>[ 14.838579] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.838914] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.839244] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 <4>[ 14.839578] head: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.839907] head: 0bfffe0000000001 ffffc1ffc3025901 ffffffffffffffff 0000000000000000 <4>[ 14.840242] head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 14.840560] page dumped because: kasan: bad access detected <3>[ 14.840822] <3>[ 14.840936] Memory state around the buggy address: <3>[ 14.841207] fff00000c0963f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.841532] fff00000c0963f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.841872] >fff00000c0964000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 14.842176] ^ <3>[ 14.842393] fff00000c0964080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 14.842707] fff00000c0964100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.843009] ================================================================== <6>[ 14.844852] ok 14 krealloc_uaf <3>[ 14.846097] ================================================================== <3>[ 14.846538] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a8/0x400 <3>[ 14.846823] Write of size 16 at addr fff00000c6289c20 by task kunit_try_catch/149 <3>[ 14.847109] <3>[ 14.847234] CPU: 1 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.847627] Hardware name: linux,dummy-virt (DT) <3>[ 14.847826] Call trace: <3>[ 14.847951] dump_backtrace+0x9c/0x128 <3>[ 14.848167] show_stack+0x20/0x38 <3>[ 14.848334] dump_stack_lvl+0x8c/0xd0 <3>[ 14.848540] print_report+0x118/0x5e0 <3>[ 14.848724] kasan_report+0xc8/0x118 <3>[ 14.848918] __asan_report_store16_noabort+0x20/0x30 <3>[ 14.849140] kmalloc_oob_16+0x3a8/0x400 <3>[ 14.849337] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.849541] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.849794] kthread+0x24c/0x2d0 <3>[ 14.850030] ret_from_fork+0x10/0x20 <3>[ 14.850260] <3>[ 14.850395] Allocated by task 149: <4>[ 14.850568] kasan_save_stack+0x3c/0x68 <4>[ 14.850788] kasan_save_track+0x20/0x40 <4>[ 14.850985] kasan_save_alloc_info+0x40/0x58 <4>[ 14.851194] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.851392] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.851611] kmalloc_oob_16+0xb4/0x400 <4>[ 14.851819] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.852029] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.852280] kthread+0x24c/0x2d0 <4>[ 14.852473] ret_from_fork+0x10/0x20 <3>[ 14.852672] <3>[ 14.852776] The buggy address belongs to the object at fff00000c6289c20 <3>[ 14.852776] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.853239] The buggy address is located 0 bytes inside of <3>[ 14.853239] allocated 13-byte region [fff00000c6289c20, fff00000c6289c2d) <3>[ 14.853689] <3>[ 14.853806] The buggy address belongs to the physical page: <4>[ 14.854130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106289 <4>[ 14.854463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.854734] page_type: 0xffffefff(slab) <4>[ 14.854933] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 14.855242] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 14.855532] page dumped because: kasan: bad access detected <3>[ 14.855793] <3>[ 14.855905] Memory state around the buggy address: <3>[ 14.856153] fff00000c6289b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 14.856438] fff00000c6289b80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 05 fc fc <3>[ 14.856733] >fff00000c6289c00: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc <3>[ 14.857002] ^ <3>[ 14.857201] fff00000c6289c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.857465] fff00000c6289d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.857725] ================================================================== <6>[ 14.859474] ok 15 kmalloc_oob_16 <3>[ 14.860536] ================================================================== <3>[ 14.860948] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3b4/0x430 <3>[ 14.861297] Read of size 16 at addr fff00000c55d3980 by task kunit_try_catch/151 <3>[ 14.861634] <3>[ 14.861750] CPU: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.862397] Hardware name: linux,dummy-virt (DT) <3>[ 14.862639] Call trace: <3>[ 14.862827] dump_backtrace+0x9c/0x128 <3>[ 14.863071] show_stack+0x20/0x38 <3>[ 14.863289] dump_stack_lvl+0x8c/0xd0 <3>[ 14.863515] print_report+0x118/0x5e0 <3>[ 14.863745] kasan_report+0xc8/0x118 <3>[ 14.863970] __asan_report_load16_noabort+0x20/0x30 <3>[ 14.864231] kmalloc_uaf_16+0x3b4/0x430 <3>[ 14.864461] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.864705] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.864985] kthread+0x24c/0x2d0 <3>[ 14.865203] ret_from_fork+0x10/0x20 <3>[ 14.865430] <3>[ 14.865557] Allocated by task 151: <4>[ 14.865794] kasan_save_stack+0x3c/0x68 <4>[ 14.866064] kasan_save_track+0x20/0x40 <4>[ 14.866315] kasan_save_alloc_info+0x40/0x58 <4>[ 14.866556] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.866779] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.867019] kmalloc_uaf_16+0x144/0x430 <4>[ 14.867249] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.867483] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.867752] kthread+0x24c/0x2d0 <4>[ 14.867957] ret_from_fork+0x10/0x20 <3>[ 14.868180] <3>[ 14.868284] Freed by task 151: <4>[ 14.868513] kasan_save_stack+0x3c/0x68 <4>[ 14.868744] kasan_save_track+0x20/0x40 <4>[ 14.868972] kasan_save_free_info+0x4c/0x78 <4>[ 14.869202] __kasan_slab_free+0x118/0x188 <4>[ 14.869432] kfree+0xec/0x2f0 <4>[ 14.869633] kmalloc_uaf_16+0x198/0x430 <4>[ 14.869865] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.870053] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.870364] kthread+0x24c/0x2d0 <4>[ 14.870583] ret_from_fork+0x10/0x20 <3>[ 14.870811] <3>[ 14.870949] The buggy address belongs to the object at fff00000c55d3980 <3>[ 14.870949] which belongs to the cache kmalloc-16 of size 16 <3>[ 14.871488] The buggy address is located 0 bytes inside of <3>[ 14.871488] freed 16-byte region [fff00000c55d3980, fff00000c55d3990) <3>[ 14.872036] <3>[ 14.872165] The buggy address belongs to the physical page: <4>[ 14.872454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 14.872801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.873109] page_type: 0xffffefff(slab) <4>[ 14.873340] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 14.873699] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 14.874106] page dumped because: kasan: bad access detected <3>[ 14.874359] <3>[ 14.874545] Memory state around the buggy address: <3>[ 14.874774] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 14.875118] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc <3>[ 14.875461] >fff00000c55d3980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.875772] ^ <3>[ 14.875978] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.876294] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.876607] ================================================================== <6>[ 14.878800] ok 16 kmalloc_uaf_16 <3>[ 14.879731] ================================================================== <3>[ 14.880180] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x150/0x2e8 <3>[ 14.880492] Write of size 128 at addr fff00000c567a600 by task kunit_try_catch/153 <3>[ 14.880783] <3>[ 14.880881] CPU: 1 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.881286] Hardware name: linux,dummy-virt (DT) <3>[ 14.881510] Call trace: <3>[ 14.881664] dump_backtrace+0x9c/0x128 <3>[ 14.881907] show_stack+0x20/0x38 <3>[ 14.882123] dump_stack_lvl+0x8c/0xd0 <3>[ 14.882350] print_report+0x118/0x5e0 <3>[ 14.882544] kasan_report+0xc8/0x118 <3>[ 14.882740] kasan_check_range+0x100/0x1a8 <3>[ 14.882959] __asan_memset+0x34/0x78 <3>[ 14.883167] kmalloc_oob_in_memset+0x150/0x2e8 <3>[ 14.883384] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.883602] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.883848] kthread+0x24c/0x2d0 <3>[ 14.884038] ret_from_fork+0x10/0x20 <3>[ 14.884229] <3>[ 14.884331] Allocated by task 153: <4>[ 14.884519] kasan_save_stack+0x3c/0x68 <4>[ 14.884727] kasan_save_track+0x20/0x40 <4>[ 14.884931] kasan_save_alloc_info+0x40/0x58 <4>[ 14.885142] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.885323] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.885553] kmalloc_oob_in_memset+0xb0/0x2e8 <4>[ 14.885779] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.886062] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.886372] kthread+0x24c/0x2d0 <4>[ 14.886535] ret_from_fork+0x10/0x20 <3>[ 14.886738] <3>[ 14.886842] The buggy address belongs to the object at fff00000c567a600 <3>[ 14.886842] which belongs to the cache kmalloc-128 of size 128 <3>[ 14.887311] The buggy address is located 0 bytes inside of <3>[ 14.887311] allocated 120-byte region [fff00000c567a600, fff00000c567a678) <3>[ 14.887753] <3>[ 14.887853] The buggy address belongs to the physical page: <4>[ 14.888100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10567a <4>[ 14.888407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.888675] page_type: 0xffffefff(slab) <4>[ 14.888874] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 14.889175] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.889461] page dumped because: kasan: bad access detected <3>[ 14.889691] <3>[ 14.889790] Memory state around the buggy address: <3>[ 14.890077] fff00000c567a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 14.890370] fff00000c567a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.890659] >fff00000c567a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc <3>[ 14.890936] ^ <3>[ 14.891213] fff00000c567a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.891492] fff00000c567a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.891762] ================================================================== <6>[ 14.893551] ok 17 kmalloc_oob_in_memset <3>[ 14.894973] # kmalloc_oob_memset_2: EXPECTATION FAILED at mm/kasan/kasan_test.c:496 <3>[ 14.894973] KASAN failure expected in "memset(ptr + size - 1, 0, memset_size)", but none occurred <3>[ 14.895848] ================================================================== <3>[ 14.896608] BUG: KFENCE: memory corruption in kmalloc_oob_memset_2+0x178/0x310 <3>[ 14.896608] <3>[ 14.896942] Corrupted memory at 0x000000008241a9d9 [ ! . . . . . . . . . . . . . . . ] (in kfence-#43): <4>[ 14.898521] kmalloc_oob_memset_2+0x178/0x310 <4>[ 14.898740] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.898945] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.899181] kthread+0x24c/0x2d0 <4>[ 14.899362] ret_from_fork+0x10/0x20 <3>[ 14.899551] <4>[ 14.899780] kfence-#43: 0x000000007e7d934e-0x000000002f502c4b, size=120, cache=kmalloc-128 <4>[ 14.899780] <4>[ 14.900228] allocated by task 155 on cpu 1 at 14.894686s: <4>[ 14.900557] kmalloc_trace_noprof+0x2bc/0x348 <4>[ 14.900790] kmalloc_oob_memset_2+0xb0/0x310 <4>[ 14.900989] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.901187] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.901422] kthread+0x24c/0x2d0 <4>[ 14.901595] ret_from_fork+0x10/0x20 <4>[ 14.901807] <4>[ 14.901990] freed by task 155 on cpu 1 at 14.895434s: <4>[ 14.902273] kmalloc_oob_memset_2+0x178/0x310 <4>[ 14.902491] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.902687] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.902922] kthread+0x24c/0x2d0 <4>[ 14.903094] ret_from_fork+0x10/0x20 <3>[ 14.903294] <3>[ 14.903424] CPU: 1 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.903805] Hardware name: linux,dummy-virt (DT) <3>[ 14.904012] ================================================================== <6>[ 14.905665] not ok 18 kmalloc_oob_memset_2 <3>[ 14.906844] ================================================================== <3>[ 14.907338] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x15c/0x310 <3>[ 14.907670] Write of size 4 at addr fff00000c567a775 by task kunit_try_catch/157 <3>[ 14.907978] <3>[ 14.908083] CPU: 1 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.908504] Hardware name: linux,dummy-virt (DT) <3>[ 14.908747] Call trace: <3>[ 14.908879] dump_backtrace+0x9c/0x128 <3>[ 14.909103] show_stack+0x20/0x38 <3>[ 14.909268] dump_stack_lvl+0x8c/0xd0 <3>[ 14.909479] print_report+0x118/0x5e0 <3>[ 14.909668] kasan_report+0xc8/0x118 <3>[ 14.909888] kasan_check_range+0x100/0x1a8 <3>[ 14.910095] __asan_memset+0x34/0x78 <3>[ 14.910327] kmalloc_oob_memset_4+0x15c/0x310 <3>[ 14.910552] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.910765] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.911007] kthread+0x24c/0x2d0 <3>[ 14.911191] ret_from_fork+0x10/0x20 <3>[ 14.911383] <3>[ 14.911487] Allocated by task 157: <4>[ 14.911709] kasan_save_stack+0x3c/0x68 <4>[ 14.911931] kasan_save_track+0x20/0x40 <4>[ 14.912131] kasan_save_alloc_info+0x40/0x58 <4>[ 14.912351] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.912549] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.912762] kmalloc_oob_memset_4+0xb0/0x310 <4>[ 14.912975] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.913186] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.913440] kthread+0x24c/0x2d0 <4>[ 14.913619] ret_from_fork+0x10/0x20 <3>[ 14.913837] <3>[ 14.913970] The buggy address belongs to the object at fff00000c567a700 <3>[ 14.913970] which belongs to the cache kmalloc-128 of size 128 <3>[ 14.914430] The buggy address is located 117 bytes inside of <3>[ 14.914430] allocated 120-byte region [fff00000c567a700, fff00000c567a778) <3>[ 14.914916] <3>[ 14.915014] The buggy address belongs to the physical page: <4>[ 14.915264] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10567a <4>[ 14.915578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.915849] page_type: 0xffffefff(slab) <4>[ 14.916051] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 14.916350] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.916646] page dumped because: kasan: bad access detected <3>[ 14.916895] <3>[ 14.916990] Memory state around the buggy address: <3>[ 14.917222] fff00000c567a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 14.917507] fff00000c567a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.917791] >fff00000c567a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc <3>[ 14.918143] ^ <3>[ 14.918417] fff00000c567a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.918718] fff00000c567a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.919002] ================================================================== <6>[ 14.921363] ok 19 kmalloc_oob_memset_4 <3>[ 14.922651] ================================================================== <3>[ 14.923430] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x15c/0x310 <3>[ 14.923965] Write of size 8 at addr fff00000c568a471 by task kunit_try_catch/159 <3>[ 14.924696] <3>[ 14.924977] CPU: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.925688] Hardware name: linux,dummy-virt (DT) <3>[ 14.926183] Call trace: <3>[ 14.926569] dump_backtrace+0x9c/0x128 <3>[ 14.927010] show_stack+0x20/0x38 <3>[ 14.927372] dump_stack_lvl+0x8c/0xd0 <3>[ 14.927770] print_report+0x118/0x5e0 <3>[ 14.928162] kasan_report+0xc8/0x118 <3>[ 14.928544] kasan_check_range+0x100/0x1a8 <3>[ 14.928955] __asan_memset+0x34/0x78 <3>[ 14.929371] kmalloc_oob_memset_8+0x15c/0x310 <3>[ 14.929839] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.930348] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.930882] kthread+0x24c/0x2d0 <3>[ 14.931169] ret_from_fork+0x10/0x20 <3>[ 14.931396] <3>[ 14.931517] Allocated by task 159: <4>[ 14.931770] kasan_save_stack+0x3c/0x68 <4>[ 14.932007] kasan_save_track+0x20/0x40 <4>[ 14.932244] kasan_save_alloc_info+0x40/0x58 <4>[ 14.932494] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.932726] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.932978] kmalloc_oob_memset_8+0xb0/0x310 <4>[ 14.933235] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.933476] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.933766] kthread+0x24c/0x2d0 <4>[ 14.934049] ret_from_fork+0x10/0x20 <3>[ 14.934302] <3>[ 14.934425] The buggy address belongs to the object at fff00000c568a400 <3>[ 14.934425] which belongs to the cache kmalloc-128 of size 128 <3>[ 14.934982] The buggy address is located 113 bytes inside of <3>[ 14.934982] allocated 120-byte region [fff00000c568a400, fff00000c568a478) <3>[ 14.935496] <3>[ 14.935607] The buggy address belongs to the physical page: <4>[ 14.935907] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10568a <4>[ 14.936265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.936575] page_type: 0xffffefff(slab) <4>[ 14.936814] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 14.937158] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.937484] page dumped because: kasan: bad access detected <3>[ 14.937750] <3>[ 14.937868] Memory state around the buggy address: <3>[ 14.938156] fff00000c568a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 14.938486] fff00000c568a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.938805] >fff00000c568a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc <3>[ 14.939116] ^ <3>[ 14.939427] fff00000c568a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.939744] fff00000c568a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.940062] ================================================================== <6>[ 14.942370] ok 20 kmalloc_oob_memset_8 <3>[ 14.943302] ================================================================== <3>[ 14.943706] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x15c/0x310 <3>[ 14.944075] Write of size 16 at addr fff00000c568a569 by task kunit_try_catch/161 <3>[ 14.944400] <3>[ 14.944504] CPU: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.945026] Hardware name: linux,dummy-virt (DT) <3>[ 14.945279] Call trace: <3>[ 14.945430] dump_backtrace+0x9c/0x128 <3>[ 14.945684] show_stack+0x20/0x38 <3>[ 14.945915] dump_stack_lvl+0x8c/0xd0 <3>[ 14.946102] print_report+0x118/0x5e0 <3>[ 14.946390] kasan_report+0xc8/0x118 <3>[ 14.946623] kasan_check_range+0x100/0x1a8 <3>[ 14.946867] __asan_memset+0x34/0x78 <3>[ 14.947097] kmalloc_oob_memset_16+0x15c/0x310 <3>[ 14.947346] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.947593] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.947870] kthread+0x24c/0x2d0 <3>[ 14.948092] ret_from_fork+0x10/0x20 <3>[ 14.948315] <3>[ 14.948433] Allocated by task 161: <4>[ 14.948676] kasan_save_stack+0x3c/0x68 <4>[ 14.948916] kasan_save_track+0x20/0x40 <4>[ 14.949164] kasan_save_alloc_info+0x40/0x58 <4>[ 14.949421] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.949653] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.949951] kmalloc_oob_memset_16+0xb0/0x310 <4>[ 14.950166] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.950469] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.950749] kthread+0x24c/0x2d0 <4>[ 14.950971] ret_from_fork+0x10/0x20 <3>[ 14.951193] <3>[ 14.951312] The buggy address belongs to the object at fff00000c568a500 <3>[ 14.951312] which belongs to the cache kmalloc-128 of size 128 <3>[ 14.951876] The buggy address is located 105 bytes inside of <3>[ 14.951876] allocated 120-byte region [fff00000c568a500, fff00000c568a578) <3>[ 14.952392] <3>[ 14.952503] The buggy address belongs to the physical page: <4>[ 14.952796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10568a <4>[ 14.953146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.953452] page_type: 0xffffefff(slab) <4>[ 14.953695] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 14.954106] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 14.954447] page dumped because: kasan: bad access detected <3>[ 14.954719] <3>[ 14.954828] Memory state around the buggy address: <3>[ 14.955104] fff00000c568a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 14.955424] fff00000c568a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.955748] >fff00000c568a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc <3>[ 14.956059] ^ <3>[ 14.956380] fff00000c568a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.956696] fff00000c568a600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.957010] ================================================================== <6>[ 14.959021] ok 21 kmalloc_oob_memset_16 <3>[ 14.960060] ================================================================== <3>[ 14.960575] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x15c/0x2f8 <3>[ 14.960898] Read of size 18446744073709551614 at addr fff00000c5682f04 by task kunit_try_catch/163 <3>[ 14.961304] <3>[ 14.961511] CPU: 0 PID: 163 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.962019] Hardware name: linux,dummy-virt (DT) <3>[ 14.962294] Call trace: <3>[ 14.962490] dump_backtrace+0x9c/0x128 <3>[ 14.962723] show_stack+0x20/0x38 <3>[ 14.962953] dump_stack_lvl+0x8c/0xd0 <3>[ 14.963173] print_report+0x118/0x5e0 <3>[ 14.963403] kasan_report+0xc8/0x118 <3>[ 14.963624] kasan_check_range+0x100/0x1a8 <3>[ 14.963859] __asan_memmove+0x3c/0x98 <3>[ 14.964081] kmalloc_memmove_negative_size+0x15c/0x2f8 <3>[ 14.964351] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.964586] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.964867] kthread+0x24c/0x2d0 <3>[ 14.965088] ret_from_fork+0x10/0x20 <3>[ 14.965317] <3>[ 14.965449] Allocated by task 163: <4>[ 14.965676] kasan_save_stack+0x3c/0x68 <4>[ 14.965940] kasan_save_track+0x20/0x40 <4>[ 14.966132] kasan_save_alloc_info+0x40/0x58 <4>[ 14.966434] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.966669] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.966915] kmalloc_memmove_negative_size+0xb8/0x2f8 <4>[ 14.967193] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.967434] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.967704] kthread+0x24c/0x2d0 <4>[ 14.967915] ret_from_fork+0x10/0x20 <3>[ 14.968138] <3>[ 14.968238] The buggy address belongs to the object at fff00000c5682f00 <3>[ 14.968238] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.968776] The buggy address is located 4 bytes inside of <3>[ 14.968776] 64-byte region [fff00000c5682f00, fff00000c5682f40) <3>[ 14.969251] <3>[ 14.969390] The buggy address belongs to the physical page: <4>[ 14.969664] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105682 <4>[ 14.970095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.970401] page_type: 0xffffefff(slab) <4>[ 14.970635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 14.970969] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 14.971290] page dumped because: kasan: bad access detected <3>[ 14.971562] <3>[ 14.971685] Memory state around the buggy address: <3>[ 14.971968] fff00000c5682e00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc <3>[ 14.972283] fff00000c5682e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.972602] >fff00000c5682f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc <3>[ 14.972910] ^ <3>[ 14.973116] fff00000c5682f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.973432] fff00000c5683000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 14.973744] ================================================================== <6>[ 14.976398] ok 22 kmalloc_memmove_negative_size <3>[ 14.977718] ================================================================== <3>[ 14.978821] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x15c/0x2f8 <3>[ 14.979430] Read of size 64 at addr fff00000c5687d84 by task kunit_try_catch/165 <3>[ 14.980020] <3>[ 14.980232] CPU: 1 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 14.981003] Hardware name: linux,dummy-virt (DT) <3>[ 14.981395] Call trace: <3>[ 14.981658] dump_backtrace+0x9c/0x128 <3>[ 14.982083] show_stack+0x20/0x38 <3>[ 14.982408] dump_stack_lvl+0x8c/0xd0 <3>[ 14.982733] print_report+0x118/0x5e0 <3>[ 14.983057] kasan_report+0xc8/0x118 <3>[ 14.983352] kasan_check_range+0x100/0x1a8 <3>[ 14.983670] __asan_memmove+0x3c/0x98 <3>[ 14.983957] kmalloc_memmove_invalid_size+0x15c/0x2f8 <3>[ 14.984328] kunit_try_run_case+0x14c/0x3d0 <3>[ 14.984647] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 14.985039] kthread+0x24c/0x2d0 <3>[ 14.985311] ret_from_fork+0x10/0x20 <3>[ 14.985604] <3>[ 14.985770] Allocated by task 165: <4>[ 14.986078] kasan_save_stack+0x3c/0x68 <4>[ 14.986426] kasan_save_track+0x20/0x40 <4>[ 14.986718] kasan_save_alloc_info+0x40/0x58 <4>[ 14.987050] __kasan_kmalloc+0xd4/0xd8 <4>[ 14.987344] kmalloc_trace_noprof+0x15c/0x348 <4>[ 14.987677] kmalloc_memmove_invalid_size+0xb8/0x2f8 <4>[ 14.988048] kunit_try_run_case+0x14c/0x3d0 <4>[ 14.988373] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 14.988762] kthread+0x24c/0x2d0 <4>[ 14.989035] ret_from_fork+0x10/0x20 <3>[ 14.989346] <3>[ 14.989523] The buggy address belongs to the object at fff00000c5687d80 <3>[ 14.989523] which belongs to the cache kmalloc-64 of size 64 <3>[ 14.990432] The buggy address is located 4 bytes inside of <3>[ 14.990432] allocated 64-byte region [fff00000c5687d80, fff00000c5687dc0) <3>[ 14.991168] <3>[ 14.991336] The buggy address belongs to the physical page: <4>[ 14.991705] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105687 <4>[ 14.992228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 14.992672] page_type: 0xffffefff(slab) <4>[ 14.992982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 14.993518] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 14.994092] page dumped because: kasan: bad access detected <3>[ 14.994512] <3>[ 14.994681] Memory state around the buggy address: <3>[ 14.995016] fff00000c5687c80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc <3>[ 14.995490] fff00000c5687d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 14.995958] >fff00000c5687d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc <3>[ 14.996419] ^ <3>[ 14.996813] fff00000c5687e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.997318] fff00000c5687e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 14.997870] ================================================================== <6>[ 15.000319] ok 23 kmalloc_memmove_invalid_size <3>[ 15.001455] ================================================================== <3>[ 15.002299] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x30c/0x340 <3>[ 15.002745] Read of size 1 at addr fff00000c6289c68 by task kunit_try_catch/167 <3>[ 15.003207] <3>[ 15.003374] CPU: 1 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.004001] Hardware name: linux,dummy-virt (DT) <3>[ 15.004326] Call trace: <3>[ 15.004535] dump_backtrace+0x9c/0x128 <3>[ 15.004858] show_stack+0x20/0x38 <3>[ 15.005145] dump_stack_lvl+0x8c/0xd0 <3>[ 15.005443] print_report+0x118/0x5e0 <3>[ 15.005751] kasan_report+0xc8/0x118 <3>[ 15.006123] __asan_report_load1_noabort+0x20/0x30 <3>[ 15.006327] kmalloc_uaf+0x30c/0x340 <3>[ 15.006533] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.006749] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.007005] kthread+0x24c/0x2d0 <3>[ 15.007182] ret_from_fork+0x10/0x20 <3>[ 15.007379] <3>[ 15.007477] Allocated by task 167: <4>[ 15.007663] kasan_save_stack+0x3c/0x68 <4>[ 15.007867] kasan_save_track+0x20/0x40 <4>[ 15.008070] kasan_save_alloc_info+0x40/0x58 <4>[ 15.008304] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.008529] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.008742] kmalloc_uaf+0xb8/0x340 <4>[ 15.008925] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.009130] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.009371] kthread+0x24c/0x2d0 <4>[ 15.009528] ret_from_fork+0x10/0x20 <3>[ 15.009711] <3>[ 15.009825] Freed by task 167: <4>[ 15.010012] kasan_save_stack+0x3c/0x68 <4>[ 15.010242] kasan_save_track+0x20/0x40 <4>[ 15.010432] kasan_save_free_info+0x4c/0x78 <4>[ 15.010654] __kasan_slab_free+0x118/0x188 <4>[ 15.010837] kfree+0xec/0x2f0 <4>[ 15.011004] kmalloc_uaf+0x120/0x340 <4>[ 15.011212] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.011418] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.011663] kthread+0x24c/0x2d0 <4>[ 15.011829] ret_from_fork+0x10/0x20 <3>[ 15.012031] <3>[ 15.012130] The buggy address belongs to the object at fff00000c6289c60 <3>[ 15.012130] which belongs to the cache kmalloc-16 of size 16 <3>[ 15.012559] The buggy address is located 8 bytes inside of <3>[ 15.012559] freed 16-byte region [fff00000c6289c60, fff00000c6289c70) <3>[ 15.012986] <3>[ 15.013105] The buggy address belongs to the physical page: <4>[ 15.013353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106289 <4>[ 15.013677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.014035] page_type: 0xffffefff(slab) <4>[ 15.014247] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 15.014568] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 15.014852] page dumped because: kasan: bad access detected <3>[ 15.015086] <3>[ 15.015191] Memory state around the buggy address: <3>[ 15.015411] fff00000c6289b00: 00 02 fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 15.015693] fff00000c6289b80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 05 fc fc <3>[ 15.015979] >fff00000c6289c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc <3>[ 15.016250] ^ <3>[ 15.016514] fff00000c6289c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.016799] fff00000c6289d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.017093] ================================================================== <6>[ 15.018692] ok 24 kmalloc_uaf <3>[ 15.019633] ================================================================== <3>[ 15.020020] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x17c/0x328 <3>[ 15.020313] Write of size 33 at addr fff00000c5687e80 by task kunit_try_catch/169 <3>[ 15.020604] <3>[ 15.020709] CPU: 1 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.021161] Hardware name: linux,dummy-virt (DT) <3>[ 15.021368] Call trace: <3>[ 15.021496] dump_backtrace+0x9c/0x128 <3>[ 15.021712] show_stack+0x20/0x38 <3>[ 15.021977] dump_stack_lvl+0x8c/0xd0 <3>[ 15.022231] print_report+0x118/0x5e0 <3>[ 15.022440] kasan_report+0xc8/0x118 <3>[ 15.022629] kasan_check_range+0x100/0x1a8 <3>[ 15.022853] __asan_memset+0x34/0x78 <3>[ 15.023024] kmalloc_uaf_memset+0x17c/0x328 <3>[ 15.023250] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.023469] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.023717] kthread+0x24c/0x2d0 <3>[ 15.023917] ret_from_fork+0x10/0x20 <3>[ 15.024128] <3>[ 15.024232] Allocated by task 169: <4>[ 15.024418] kasan_save_stack+0x3c/0x68 <4>[ 15.024635] kasan_save_track+0x20/0x40 <4>[ 15.024815] kasan_save_alloc_info+0x40/0x58 <4>[ 15.025037] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.025205] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.025436] kmalloc_uaf_memset+0xb8/0x328 <4>[ 15.025624] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.025853] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.026137] kthread+0x24c/0x2d0 <4>[ 15.026501] ret_from_fork+0x10/0x20 <3>[ 15.026688] <3>[ 15.026792] Freed by task 169: <4>[ 15.026957] kasan_save_stack+0x3c/0x68 <4>[ 15.027166] kasan_save_track+0x20/0x40 <4>[ 15.027336] kasan_save_free_info+0x4c/0x78 <4>[ 15.027558] __kasan_slab_free+0x118/0x188 <4>[ 15.027739] kfree+0xec/0x2f0 <4>[ 15.027914] kmalloc_uaf_memset+0x120/0x328 <4>[ 15.028115] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.028329] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.028581] kthread+0x24c/0x2d0 <4>[ 15.028763] ret_from_fork+0x10/0x20 <3>[ 15.028932] <3>[ 15.029057] The buggy address belongs to the object at fff00000c5687e80 <3>[ 15.029057] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.029507] The buggy address is located 0 bytes inside of <3>[ 15.029507] freed 64-byte region [fff00000c5687e80, fff00000c5687ec0) <3>[ 15.030063] <3>[ 15.030167] The buggy address belongs to the physical page: <4>[ 15.030423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105687 <4>[ 15.030741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.031009] page_type: 0xffffefff(slab) <4>[ 15.031211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 15.031546] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 15.031853] page dumped because: kasan: bad access detected <3>[ 15.032091] <3>[ 15.032194] Memory state around the buggy address: <3>[ 15.032424] fff00000c5687d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.032715] fff00000c5687e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.033006] >fff00000c5687e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.033301] ^ <3>[ 15.033451] fff00000c5687f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.033763] fff00000c5687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.034264] ================================================================== <6>[ 15.036270] ok 25 kmalloc_uaf_memset <3>[ 15.037651] ================================================================== <3>[ 15.038486] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x408/0x478 <3>[ 15.038943] Read of size 1 at addr fff00000c5650228 by task kunit_try_catch/171 <3>[ 15.039425] <3>[ 15.039599] CPU: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.040251] Hardware name: linux,dummy-virt (DT) <3>[ 15.040609] Call trace: <3>[ 15.040852] dump_backtrace+0x9c/0x128 <3>[ 15.041219] show_stack+0x20/0x38 <3>[ 15.041526] dump_stack_lvl+0x8c/0xd0 <3>[ 15.041873] print_report+0x118/0x5e0 <3>[ 15.042219] kasan_report+0xc8/0x118 <3>[ 15.042552] __asan_report_load1_noabort+0x20/0x30 <3>[ 15.042942] kmalloc_uaf2+0x408/0x478 <3>[ 15.043272] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.043603] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.043999] kthread+0x24c/0x2d0 <3>[ 15.044291] ret_from_fork+0x10/0x20 <3>[ 15.044615] <3>[ 15.044800] Allocated by task 171: <4>[ 15.045105] kasan_save_stack+0x3c/0x68 <4>[ 15.045448] kasan_save_track+0x20/0x40 <4>[ 15.045791] kasan_save_alloc_info+0x40/0x58 <4>[ 15.046198] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.046546] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.046911] kmalloc_uaf2+0xc4/0x478 <4>[ 15.047226] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.047530] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.047921] kthread+0x24c/0x2d0 <4>[ 15.048185] ret_from_fork+0x10/0x20 <3>[ 15.048497] <3>[ 15.048685] Freed by task 171: <4>[ 15.048975] kasan_save_stack+0x3c/0x68 <4>[ 15.049386] kasan_save_track+0x20/0x40 <4>[ 15.049830] kasan_save_free_info+0x4c/0x78 <4>[ 15.050280] __kasan_slab_free+0x118/0x188 <4>[ 15.050738] kfree+0xec/0x2f0 <4>[ 15.051054] kmalloc_uaf2+0x138/0x478 <4>[ 15.051439] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.051882] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.052415] kthread+0x24c/0x2d0 <4>[ 15.052802] ret_from_fork+0x10/0x20 <3>[ 15.053201] <3>[ 15.053432] The buggy address belongs to the object at fff00000c5650200 <3>[ 15.053432] which belongs to the cache kmalloc-64 of size 64 <3>[ 15.054739] The buggy address is located 40 bytes inside of <3>[ 15.054739] freed 64-byte region [fff00000c5650200, fff00000c5650240) <3>[ 15.055474] <3>[ 15.055573] The buggy address belongs to the physical page: <4>[ 15.055781] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105650 <4>[ 15.056074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.056321] page_type: 0xffffefff(slab) <4>[ 15.056514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 15.056901] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 15.057264] page dumped because: kasan: bad access detected <3>[ 15.057542] <3>[ 15.057668] Memory state around the buggy address: <3>[ 15.057912] fff00000c5650100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.058172] fff00000c5650180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.058471] >fff00000c5650200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 15.058728] ^ <3>[ 15.058909] fff00000c5650280: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc <3>[ 15.059168] fff00000c5650300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.059421] ================================================================== <6>[ 15.061144] ok 26 kmalloc_uaf2 <6>[ 15.063352] ok 27 kmalloc_uaf3 # SKIP Test requires CONFIG_KASAN_GENERIC=n <3>[ 15.064531] ================================================================== <3>[ 15.065087] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x174/0x320 <3>[ 15.065453] Read of size 1 at addr fff00000c55d39a0 by task kunit_try_catch/175 <3>[ 15.065832] <3>[ 15.066012] CPU: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.066497] Hardware name: linux,dummy-virt (DT) <3>[ 15.066753] Call trace: <3>[ 15.066923] dump_backtrace+0x9c/0x128 <3>[ 15.067150] show_stack+0x20/0x38 <3>[ 15.067368] dump_stack_lvl+0x8c/0xd0 <3>[ 15.067563] print_report+0x118/0x5e0 <3>[ 15.067803] kasan_report+0xc8/0x118 <3>[ 15.068037] __kasan_check_byte+0x54/0x70 <3>[ 15.068218] kfree_sensitive+0x30/0xb0 <3>[ 15.068443] kmalloc_double_kzfree+0x174/0x320 <3>[ 15.068640] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.068848] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.069104] kthread+0x24c/0x2d0 <3>[ 15.069275] ret_from_fork+0x10/0x20 <3>[ 15.069455] <3>[ 15.069560] Allocated by task 175: <4>[ 15.069765] kasan_save_stack+0x3c/0x68 <4>[ 15.070076] kasan_save_track+0x20/0x40 <4>[ 15.070317] kasan_save_alloc_info+0x40/0x58 <4>[ 15.070549] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.070727] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.070923] kmalloc_double_kzfree+0xb8/0x320 <4>[ 15.071109] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.071292] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.071518] kthread+0x24c/0x2d0 <4>[ 15.071681] ret_from_fork+0x10/0x20 <3>[ 15.071847] <3>[ 15.071946] Freed by task 175: <4>[ 15.072093] kasan_save_stack+0x3c/0x68 <4>[ 15.072272] kasan_save_track+0x20/0x40 <4>[ 15.072463] kasan_save_free_info+0x4c/0x78 <4>[ 15.072680] __kasan_slab_free+0x118/0x188 <4>[ 15.072936] kfree+0xec/0x2f0 <4>[ 15.073097] kfree_sensitive+0x80/0xb0 <4>[ 15.073310] kmalloc_double_kzfree+0x120/0x320 <4>[ 15.073524] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.073717] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.074021] kthread+0x24c/0x2d0 <4>[ 15.074265] ret_from_fork+0x10/0x20 <3>[ 15.074481] <3>[ 15.074602] The buggy address belongs to the object at fff00000c55d39a0 <3>[ 15.074602] which belongs to the cache kmalloc-16 of size 16 <3>[ 15.075032] The buggy address is located 0 bytes inside of <3>[ 15.075032] freed 16-byte region [fff00000c55d39a0, fff00000c55d39b0) <3>[ 15.075563] <3>[ 15.075661] The buggy address belongs to the physical page: <4>[ 15.075871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 15.076241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.076583] page_type: 0xffffefff(slab) <4>[ 15.076813] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 15.077193] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 15.077468] page dumped because: kasan: bad access detected <3>[ 15.077678] <3>[ 15.077772] Memory state around the buggy address: <3>[ 15.078039] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 15.078396] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 15.078789] >fff00000c55d3980: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc <3>[ 15.079109] ^ <3>[ 15.079336] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.079642] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.079923] ================================================================== <3>[ 15.080419] ================================================================== <3>[ 15.080775] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 <3>[ 15.081076] Free of addr fff00000c55d39a0 by task kunit_try_catch/175 <3>[ 15.081323] <3>[ 15.081417] CPU: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.081766] Hardware name: linux,dummy-virt (DT) <3>[ 15.082032] Call trace: <3>[ 15.082198] dump_backtrace+0x9c/0x128 <3>[ 15.082381] show_stack+0x20/0x38 <3>[ 15.082568] dump_stack_lvl+0x8c/0xd0 <3>[ 15.082805] print_report+0x118/0x5e0 <3>[ 15.083104] kasan_report_invalid_free+0xb0/0xd8 <3>[ 15.083368] __kasan_slab_free+0x14c/0x188 <3>[ 15.083666] kfree+0xec/0x2f0 <3>[ 15.083888] kfree_sensitive+0x3c/0xb0 <3>[ 15.084130] kmalloc_double_kzfree+0x174/0x320 <3>[ 15.084413] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.084658] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.084955] kthread+0x24c/0x2d0 <3>[ 15.085168] ret_from_fork+0x10/0x20 <3>[ 15.085386] <3>[ 15.085492] Allocated by task 175: <4>[ 15.085705] kasan_save_stack+0x3c/0x68 <4>[ 15.086005] kasan_save_track+0x20/0x40 <4>[ 15.086252] kasan_save_alloc_info+0x40/0x58 <4>[ 15.086533] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.086768] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.087009] kmalloc_double_kzfree+0xb8/0x320 <4>[ 15.087242] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.087495] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.087777] kthread+0x24c/0x2d0 <4>[ 15.087971] ret_from_fork+0x10/0x20 <3>[ 15.088173] <3>[ 15.088273] Freed by task 175: <4>[ 15.088416] kasan_save_stack+0x3c/0x68 <4>[ 15.088596] kasan_save_track+0x20/0x40 <4>[ 15.088768] kasan_save_free_info+0x4c/0x78 <4>[ 15.088948] __kasan_slab_free+0x118/0x188 <4>[ 15.089129] kfree+0xec/0x2f0 <4>[ 15.089276] kfree_sensitive+0x80/0xb0 <4>[ 15.089456] kmalloc_double_kzfree+0x120/0x320 <4>[ 15.089646] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.089830] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.090143] kthread+0x24c/0x2d0 <4>[ 15.090310] ret_from_fork+0x10/0x20 <3>[ 15.090521] <3>[ 15.090619] The buggy address belongs to the object at fff00000c55d39a0 <3>[ 15.090619] which belongs to the cache kmalloc-16 of size 16 <3>[ 15.091076] The buggy address is located 0 bytes inside of <3>[ 15.091076] 16-byte region [fff00000c55d39a0, fff00000c55d39b0) <3>[ 15.091461] <3>[ 15.091557] The buggy address belongs to the physical page: <4>[ 15.091776] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 15.092063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.092328] page_type: 0xffffefff(slab) <4>[ 15.092523] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 15.092833] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 15.093099] page dumped because: kasan: bad access detected <3>[ 15.093313] <3>[ 15.093409] Memory state around the buggy address: <3>[ 15.093660] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 15.094089] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 15.094456] >fff00000c55d3980: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc <3>[ 15.094772] ^ <3>[ 15.095009] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.095333] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.095616] ================================================================== <6>[ 15.098251] ok 28 kmalloc_double_kzfree <3>[ 15.099886] ================================================================== <3>[ 15.100869] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x638/0x728 <3>[ 15.101513] Read of size 1 at addr fff00000c5641273 by task kunit_try_catch/177 <3>[ 15.102290] <3>[ 15.102527] CPU: 1 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.103389] Hardware name: linux,dummy-virt (DT) <3>[ 15.103834] Call trace: <3>[ 15.104159] dump_backtrace+0x9c/0x128 <3>[ 15.104596] show_stack+0x20/0x38 <3>[ 15.105028] dump_stack_lvl+0x8c/0xd0 <3>[ 15.105467] print_report+0x118/0x5e0 <3>[ 15.105931] kasan_report+0xc8/0x118 <3>[ 15.106385] __asan_report_load1_noabort+0x20/0x30 <3>[ 15.106876] ksize_unpoisons_memory+0x638/0x728 <3>[ 15.107471] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.107999] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.108662] kthread+0x24c/0x2d0 <3>[ 15.109153] ret_from_fork+0x10/0x20 <3>[ 15.109648] <3>[ 15.109975] Allocated by task 177: <4>[ 15.110404] kasan_save_stack+0x3c/0x68 <4>[ 15.110825] kasan_save_track+0x20/0x40 <4>[ 15.111242] kasan_save_alloc_info+0x40/0x58 <4>[ 15.111656] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.112045] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.112462] ksize_unpoisons_memory+0xc0/0x728 <4>[ 15.112956] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.113420] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.113876] kthread+0x24c/0x2d0 <4>[ 15.114231] ret_from_fork+0x10/0x20 <3>[ 15.114618] <3>[ 15.114829] The buggy address belongs to the object at fff00000c5641200 <3>[ 15.114829] which belongs to the cache kmalloc-128 of size 128 <3>[ 15.115846] The buggy address is located 0 bytes to the right of <3>[ 15.115846] allocated 115-byte region [fff00000c5641200, fff00000c5641273) <3>[ 15.116743] <3>[ 15.116979] The buggy address belongs to the physical page: <4>[ 15.117534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105641 <4>[ 15.118321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.118951] page_type: 0xffffefff(slab) <4>[ 15.119394] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 15.120070] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 15.120704] page dumped because: kasan: bad access detected <3>[ 15.121197] <3>[ 15.121385] Memory state around the buggy address: <3>[ 15.121783] fff00000c5641100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc <3>[ 15.122457] fff00000c5641180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.123073] >fff00000c5641200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 15.123646] ^ <3>[ 15.124189] fff00000c5641280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.124740] fff00000c5641300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.125200] ================================================================== <3>[ 15.127092] ================================================================== <3>[ 15.127551] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x630/0x728 <3>[ 15.128003] Read of size 1 at addr fff00000c5641278 by task kunit_try_catch/177 <3>[ 15.128459] <3>[ 15.128644] CPU: 1 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.129307] Hardware name: linux,dummy-virt (DT) <3>[ 15.129623] Call trace: <3>[ 15.129830] dump_backtrace+0x9c/0x128 <3>[ 15.130185] show_stack+0x20/0x38 <3>[ 15.130492] dump_stack_lvl+0x8c/0xd0 <3>[ 15.130796] print_report+0x118/0x5e0 <3>[ 15.131104] kasan_report+0xc8/0x118 <3>[ 15.131409] __asan_report_load1_noabort+0x20/0x30 <3>[ 15.131771] ksize_unpoisons_memory+0x630/0x728 <3>[ 15.132134] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.132561] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.133126] kthread+0x24c/0x2d0 <3>[ 15.133529] ret_from_fork+0x10/0x20 <3>[ 15.134056] <3>[ 15.134352] Allocated by task 177: <4>[ 15.134572] kasan_save_stack+0x3c/0x68 <4>[ 15.134808] kasan_save_track+0x20/0x40 <4>[ 15.135038] kasan_save_alloc_info+0x40/0x58 <4>[ 15.135254] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.135440] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.135693] ksize_unpoisons_memory+0xc0/0x728 <4>[ 15.135906] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.136088] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.136307] kthread+0x24c/0x2d0 <4>[ 15.136491] ret_from_fork+0x10/0x20 <3>[ 15.136696] <3>[ 15.136821] The buggy address belongs to the object at fff00000c5641200 <3>[ 15.136821] which belongs to the cache kmalloc-128 of size 128 <3>[ 15.137313] The buggy address is located 5 bytes to the right of <3>[ 15.137313] allocated 115-byte region [fff00000c5641200, fff00000c5641273) <3>[ 15.137973] <3>[ 15.138128] The buggy address belongs to the physical page: <4>[ 15.138424] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105641 <4>[ 15.138758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.139012] page_type: 0xffffefff(slab) <4>[ 15.139207] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 15.139595] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 15.139971] page dumped because: kasan: bad access detected <3>[ 15.140246] <3>[ 15.140372] Memory state around the buggy address: <3>[ 15.140624] fff00000c5641100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 15.140993] fff00000c5641180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.141397] >fff00000c5641200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 15.141666] ^ <3>[ 15.141993] fff00000c5641280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.142319] fff00000c5641300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.142588] ================================================================== <3>[ 15.143027] ================================================================== <3>[ 15.143313] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x698/0x728 <3>[ 15.143585] Read of size 1 at addr fff00000c564127f by task kunit_try_catch/177 <3>[ 15.143852] <3>[ 15.143948] CPU: 1 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.144306] Hardware name: linux,dummy-virt (DT) <3>[ 15.144491] Call trace: <3>[ 15.144635] dump_backtrace+0x9c/0x128 <3>[ 15.144813] show_stack+0x20/0x38 <3>[ 15.144970] dump_stack_lvl+0x8c/0xd0 <3>[ 15.145140] print_report+0x118/0x5e0 <3>[ 15.145317] kasan_report+0xc8/0x118 <3>[ 15.145490] __asan_report_load1_noabort+0x20/0x30 <3>[ 15.145688] ksize_unpoisons_memory+0x698/0x728 <3>[ 15.145940] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.146209] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.146452] kthread+0x24c/0x2d0 <3>[ 15.146661] ret_from_fork+0x10/0x20 <3>[ 15.146889] <3>[ 15.147016] Allocated by task 177: <4>[ 15.147222] kasan_save_stack+0x3c/0x68 <4>[ 15.147475] kasan_save_track+0x20/0x40 <4>[ 15.147724] kasan_save_alloc_info+0x40/0x58 <4>[ 15.147951] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.148158] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.148404] ksize_unpoisons_memory+0xc0/0x728 <4>[ 15.148616] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.148805] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.149036] kthread+0x24c/0x2d0 <4>[ 15.149218] ret_from_fork+0x10/0x20 <3>[ 15.149396] <3>[ 15.149495] The buggy address belongs to the object at fff00000c5641200 <3>[ 15.149495] which belongs to the cache kmalloc-128 of size 128 <3>[ 15.150013] The buggy address is located 12 bytes to the right of <3>[ 15.150013] allocated 115-byte region [fff00000c5641200, fff00000c5641273) <3>[ 15.150522] <3>[ 15.150626] The buggy address belongs to the physical page: <4>[ 15.150843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105641 <4>[ 15.151127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.151371] page_type: 0xffffefff(slab) <4>[ 15.151552] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 15.151908] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 15.152283] page dumped because: kasan: bad access detected <3>[ 15.152570] <3>[ 15.152706] Memory state around the buggy address: <3>[ 15.152977] fff00000c5641100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 15.153358] fff00000c5641180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.153740] >fff00000c5641200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 15.154283] ^ <3>[ 15.154659] fff00000c5641280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.155007] fff00000c5641300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.155294] ================================================================== <6>[ 15.157247] ok 29 ksize_unpoisons_memory <3>[ 15.158891] ================================================================== <3>[ 15.159595] BUG: KASAN: slab-use-after-free in ksize_uaf+0x174/0x5c8 <3>[ 15.160001] Read of size 1 at addr fff00000c5616000 by task kunit_try_catch/179 <3>[ 15.160441] <3>[ 15.160606] CPU: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.161210] Hardware name: linux,dummy-virt (DT) <3>[ 15.161521] Call trace: <3>[ 15.161724] dump_backtrace+0x9c/0x128 <3>[ 15.162118] show_stack+0x20/0x38 <3>[ 15.162536] dump_stack_lvl+0x8c/0xd0 <3>[ 15.162939] print_report+0x118/0x5e0 <3>[ 15.163338] kasan_report+0xc8/0x118 <3>[ 15.163715] __kasan_check_byte+0x54/0x70 <3>[ 15.164126] ksize+0x30/0x88 <3>[ 15.164487] ksize_uaf+0x174/0x5c8 <3>[ 15.164856] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.165264] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.165769] kthread+0x24c/0x2d0 <3>[ 15.166158] ret_from_fork+0x10/0x20 <3>[ 15.166580] <3>[ 15.166838] Allocated by task 179: <4>[ 15.167183] kasan_save_stack+0x3c/0x68 <4>[ 15.167613] kasan_save_track+0x20/0x40 <4>[ 15.168074] kasan_save_alloc_info+0x40/0x58 <4>[ 15.168557] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.168993] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.169465] ksize_uaf+0xb8/0x5c8 <4>[ 15.169901] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.170409] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.170961] kthread+0x24c/0x2d0 <4>[ 15.171370] ret_from_fork+0x10/0x20 <3>[ 15.171808] <3>[ 15.172091] Freed by task 179: <4>[ 15.172479] kasan_save_stack+0x3c/0x68 <4>[ 15.172925] kasan_save_track+0x20/0x40 <4>[ 15.173374] kasan_save_free_info+0x4c/0x78 <4>[ 15.173839] __kasan_slab_free+0x118/0x188 <4>[ 15.174318] kfree+0xec/0x2f0 <4>[ 15.174709] ksize_uaf+0x120/0x5c8 <4>[ 15.175143] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.175608] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.176143] kthread+0x24c/0x2d0 <4>[ 15.176543] ret_from_fork+0x10/0x20 <3>[ 15.176975] <3>[ 15.177261] The buggy address belongs to the object at fff00000c5616000 <3>[ 15.177261] which belongs to the cache kmalloc-128 of size 128 <3>[ 15.178381] The buggy address is located 0 bytes inside of <3>[ 15.178381] freed 128-byte region [fff00000c5616000, fff00000c5616080) <3>[ 15.179280] <3>[ 15.179537] The buggy address belongs to the physical page: <4>[ 15.179987] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105616 <4>[ 15.180596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.181132] page_type: 0xffffefff(slab) <4>[ 15.181535] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 15.182240] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 15.182825] page dumped because: kasan: bad access detected <3>[ 15.183283] <3>[ 15.183535] Memory state around the buggy address: <3>[ 15.183951] fff00000c5615f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.184505] fff00000c5615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.185056] >fff00000c5616000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 15.185598] ^ <3>[ 15.185979] fff00000c5616080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.186534] fff00000c5616100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.187079] ================================================================== <3>[ 15.188146] ================================================================== <3>[ 15.188777] BUG: KASAN: slab-use-after-free in ksize_uaf+0x570/0x5c8 <3>[ 15.189278] Read of size 1 at addr fff00000c5616000 by task kunit_try_catch/179 <3>[ 15.189979] <3>[ 15.190173] CPU: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.190766] Hardware name: linux,dummy-virt (DT) <3>[ 15.191011] Call trace: <3>[ 15.191188] dump_backtrace+0x9c/0x128 <3>[ 15.191425] show_stack+0x20/0x38 <3>[ 15.191641] dump_stack_lvl+0x8c/0xd0 <3>[ 15.191872] print_report+0x118/0x5e0 <3>[ 15.192116] kasan_report+0xc8/0x118 <3>[ 15.192344] __asan_report_load1_noabort+0x20/0x30 <3>[ 15.192599] ksize_uaf+0x570/0x5c8 <3>[ 15.192821] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.193066] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.193348] kthread+0x24c/0x2d0 <3>[ 15.193567] ret_from_fork+0x10/0x20 <3>[ 15.193797] <3>[ 15.193978] Allocated by task 179: <4>[ 15.194148] kasan_save_stack+0x3c/0x68 <4>[ 15.194439] kasan_save_track+0x20/0x40 <4>[ 15.194669] kasan_save_alloc_info+0x40/0x58 <4>[ 15.194909] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.195131] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.195369] ksize_uaf+0xb8/0x5c8 <4>[ 15.195584] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.195819] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.196098] kthread+0x24c/0x2d0 <4>[ 15.196306] ret_from_fork+0x10/0x20 <3>[ 15.196524] <3>[ 15.196675] Freed by task 179: <4>[ 15.196825] kasan_save_stack+0x3c/0x68 <4>[ 15.197095] kasan_save_track+0x20/0x40 <4>[ 15.197325] kasan_save_free_info+0x4c/0x78 <4>[ 15.197563] __kasan_slab_free+0x118/0x188 <4>[ 15.197798] kfree+0xec/0x2f0 <4>[ 15.198049] ksize_uaf+0x120/0x5c8 <4>[ 15.198244] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.198505] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.198780] kthread+0x24c/0x2d0 <4>[ 15.198990] ret_from_fork+0x10/0x20 <3>[ 15.199212] <3>[ 15.199335] The buggy address belongs to the object at fff00000c5616000 <3>[ 15.199335] which belongs to the cache kmalloc-128 of size 128 <3>[ 15.199862] The buggy address is located 0 bytes inside of <3>[ 15.199862] freed 128-byte region [fff00000c5616000, fff00000c5616080) <3>[ 15.200350] <3>[ 15.200486] The buggy address belongs to the physical page: <4>[ 15.200764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105616 <4>[ 15.201105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.201405] page_type: 0xffffefff(slab) <4>[ 15.201635] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 15.202018] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 15.202376] page dumped because: kasan: bad access detected <3>[ 15.202661] <3>[ 15.202773] Memory state around the buggy address: <3>[ 15.203052] fff00000c5615f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.203371] fff00000c5615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.203702] >fff00000c5616000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 15.204018] ^ <3>[ 15.204217] fff00000c5616080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.204543] fff00000c5616100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.204861] ================================================================== <3>[ 15.205342] ================================================================== <3>[ 15.205656] BUG: KASAN: slab-use-after-free in ksize_uaf+0x534/0x5c8 <3>[ 15.206158] Read of size 1 at addr fff00000c5616078 by task kunit_try_catch/179 <3>[ 15.206591] <3>[ 15.206711] CPU: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.207171] Hardware name: linux,dummy-virt (DT) <3>[ 15.207441] Call trace: <3>[ 15.207638] dump_backtrace+0x9c/0x128 <3>[ 15.207885] show_stack+0x20/0x38 <3>[ 15.208115] dump_stack_lvl+0x8c/0xd0 <3>[ 15.208360] print_report+0x118/0x5e0 <3>[ 15.208617] kasan_report+0xc8/0x118 <3>[ 15.208856] __asan_report_load1_noabort+0x20/0x30 <3>[ 15.209124] ksize_uaf+0x534/0x5c8 <3>[ 15.209354] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.209607] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.209939] kthread+0x24c/0x2d0 <3>[ 15.210151] ret_from_fork+0x10/0x20 <3>[ 15.210451] <3>[ 15.210568] Allocated by task 179: <4>[ 15.210823] kasan_save_stack+0x3c/0x68 <4>[ 15.211066] kasan_save_track+0x20/0x40 <4>[ 15.211300] kasan_save_alloc_info+0x40/0x58 <4>[ 15.211545] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.211775] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.212022] ksize_uaf+0xb8/0x5c8 <4>[ 15.212243] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.212474] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.212768] kthread+0x24c/0x2d0 <4>[ 15.212983] ret_from_fork+0x10/0x20 <3>[ 15.213211] <3>[ 15.213313] Freed by task 179: <4>[ 15.213554] kasan_save_stack+0x3c/0x68 <4>[ 15.213799] kasan_save_track+0x20/0x40 <4>[ 15.214102] kasan_save_free_info+0x4c/0x78 <4>[ 15.214367] __kasan_slab_free+0x118/0x188 <4>[ 15.214627] kfree+0xec/0x2f0 <4>[ 15.214848] ksize_uaf+0x120/0x5c8 <4>[ 15.215088] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.215342] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.215637] kthread+0x24c/0x2d0 <4>[ 15.215867] ret_from_fork+0x10/0x20 <3>[ 15.216103] <3>[ 15.216237] The buggy address belongs to the object at fff00000c5616000 <3>[ 15.216237] which belongs to the cache kmalloc-128 of size 128 <3>[ 15.216821] The buggy address is located 120 bytes inside of <3>[ 15.216821] freed 128-byte region [fff00000c5616000, fff00000c5616080) <3>[ 15.217335] <3>[ 15.217451] The buggy address belongs to the physical page: <4>[ 15.217774] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105616 <4>[ 15.218308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.218658] page_type: 0xffffefff(slab) <4>[ 15.218902] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 15.219242] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 15.219569] page dumped because: kasan: bad access detected <3>[ 15.219836] <3>[ 15.219945] Memory state around the buggy address: <3>[ 15.220224] fff00000c5615f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.220545] fff00000c5615f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.220866] >fff00000c5616000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 15.221188] ^ <3>[ 15.221501] fff00000c5616080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.221819] fff00000c5616100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.222314] ================================================================== <6>[ 15.224841] ok 30 ksize_uaf <3>[ 15.246258] ================================================================== <3>[ 15.247428] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 <3>[ 15.247969] Read of size 4 at addr fff00000c56799c0 by task swapper/1/0 <3>[ 15.248490] <3>[ 15.248701] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.249392] Hardware name: linux,dummy-virt (DT) <3>[ 15.249767] Call trace: <3>[ 15.250080] dump_backtrace+0x9c/0x128 <3>[ 15.250488] show_stack+0x20/0x38 <3>[ 15.250838] dump_stack_lvl+0x8c/0xd0 <3>[ 15.251210] print_report+0x118/0x5e0 <3>[ 15.251582] kasan_report+0xc8/0x118 <3>[ 15.251956] __asan_report_load4_noabort+0x20/0x30 <3>[ 15.252450] rcu_uaf_reclaim+0x64/0x70 <3>[ 15.252893] rcu_core+0xa84/0x1ea0 <3>[ 15.253334] rcu_core_si+0x18/0x30 <3>[ 15.253738] handle_softirqs+0x370/0xb40 <3>[ 15.254346] __do_softirq+0x1c/0x28 <3>[ 15.254766] ____do_softirq+0x18/0x30 <3>[ 15.255308] call_on_irq_stack+0x24/0x58 <3>[ 15.255849] do_softirq_own_stack+0x24/0x38 <3>[ 15.256426] irq_exit_rcu+0x1c0/0x278 <3>[ 15.256921] el1_interrupt+0x38/0x58 <3>[ 15.257335] el1h_64_irq_handler+0x18/0x28 <3>[ 15.257783] el1h_64_irq+0x64/0x68 <3>[ 15.258250] arch_local_irq_enable+0x4/0x8 <3>[ 15.258697] do_idle+0x394/0x4f8 <3>[ 15.259040] cpu_startup_entry+0x68/0x80 <3>[ 15.259427] secondary_start_kernel+0x298/0x350 <3>[ 15.259855] __secondary_switched+0xb8/0xc0 <3>[ 15.260261] <3>[ 15.260470] Allocated by task 181: <4>[ 15.260807] kasan_save_stack+0x3c/0x68 <4>[ 15.261187] kasan_save_track+0x20/0x40 <4>[ 15.261559] kasan_save_alloc_info+0x40/0x58 <4>[ 15.262008] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.262391] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.262821] rcu_uaf+0xb8/0x2e8 <4>[ 15.263179] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.263619] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.264144] kthread+0x24c/0x2d0 <4>[ 15.264518] ret_from_fork+0x10/0x20 <3>[ 15.264905] <3>[ 15.265138] Freed by task 0: <4>[ 15.265464] kasan_save_stack+0x3c/0x68 <4>[ 15.265909] kasan_save_track+0x20/0x40 <4>[ 15.266363] kasan_save_free_info+0x4c/0x78 <4>[ 15.266820] __kasan_slab_free+0x118/0x188 <4>[ 15.267270] kfree+0xec/0x2f0 <4>[ 15.267619] rcu_uaf_reclaim+0x28/0x70 <4>[ 15.268035] rcu_core+0xa84/0x1ea0 <4>[ 15.268415] rcu_core_si+0x18/0x30 <4>[ 15.268795] handle_softirqs+0x370/0xb40 <4>[ 15.269214] __do_softirq+0x1c/0x28 <3>[ 15.269599] <3>[ 15.269850] Last potentially related work creation: <4>[ 15.270392] kasan_save_stack+0x3c/0x68 <4>[ 15.270846] __kasan_record_aux_stack+0xbc/0xe8 <4>[ 15.271461] kasan_record_aux_stack_noalloc+0x14/0x20 <4>[ 15.272065] __call_rcu_common.constprop.0+0x74/0xa38 <4>[ 15.272636] call_rcu+0x18/0x30 <4>[ 15.273107] rcu_uaf+0x150/0x2e8 <4>[ 15.273583] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.274349] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.275147] kthread+0x24c/0x2d0 <4>[ 15.275684] ret_from_fork+0x10/0x20 <3>[ 15.276308] <3>[ 15.276631] The buggy address belongs to the object at fff00000c56799c0 <3>[ 15.276631] which belongs to the cache kmalloc-32 of size 32 <3>[ 15.278261] The buggy address is located 0 bytes inside of <3>[ 15.278261] freed 32-byte region [fff00000c56799c0, fff00000c56799e0) <3>[ 15.279671] <3>[ 15.279986] The buggy address belongs to the physical page: <4>[ 15.280706] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105679 <4>[ 15.281686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.282747] page_type: 0xffffefff(slab) <4>[ 15.283288] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 15.284164] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 15.285087] page dumped because: kasan: bad access detected <3>[ 15.285739] <3>[ 15.286057] Memory state around the buggy address: <3>[ 15.286750] fff00000c5679880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 15.287493] fff00000c5679900: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc <3>[ 15.288181] >fff00000c5679980: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 15.288869] ^ <3>[ 15.289357] fff00000c5679a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.290087] fff00000c5679a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.290904] ================================================================== <6>[ 15.295946] ok 31 rcu_uaf <3>[ 15.301163] ================================================================== <3>[ 15.302188] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x490/0x4b8 <3>[ 15.302834] Read of size 8 at addr fff00000c5679a40 by task kunit_try_catch/183 <3>[ 15.303381] <3>[ 15.303571] CPU: 1 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.304429] Hardware name: linux,dummy-virt (DT) <3>[ 15.304779] Call trace: <3>[ 15.305003] dump_backtrace+0x9c/0x128 <3>[ 15.305342] show_stack+0x20/0x38 <3>[ 15.305610] dump_stack_lvl+0x8c/0xd0 <3>[ 15.305932] print_report+0x118/0x5e0 <3>[ 15.306384] kasan_report+0xc8/0x118 <3>[ 15.306789] __asan_report_load8_noabort+0x20/0x30 <3>[ 15.307197] workqueue_uaf+0x490/0x4b8 <3>[ 15.307575] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.307916] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.308316] kthread+0x24c/0x2d0 <3>[ 15.308590] ret_from_fork+0x10/0x20 <3>[ 15.308878] <3>[ 15.309038] Allocated by task 183: <4>[ 15.309310] kasan_save_stack+0x3c/0x68 <4>[ 15.309615] kasan_save_track+0x20/0x40 <4>[ 15.309970] kasan_save_alloc_info+0x40/0x58 <4>[ 15.310374] __kasan_kmalloc+0xd4/0xd8 <4>[ 15.310699] kmalloc_trace_noprof+0x15c/0x348 <4>[ 15.311030] workqueue_uaf+0x140/0x4b8 <4>[ 15.311325] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.311636] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.312032] kthread+0x24c/0x2d0 <4>[ 15.312309] ret_from_fork+0x10/0x20 <3>[ 15.312601] <3>[ 15.312767] Freed by task 72: <4>[ 15.313001] kasan_save_stack+0x3c/0x68 <4>[ 15.313302] kasan_save_track+0x20/0x40 <4>[ 15.313626] kasan_save_free_info+0x4c/0x78 <4>[ 15.313992] __kasan_slab_free+0x118/0x188 <4>[ 15.314404] kfree+0xec/0x2f0 <4>[ 15.314682] workqueue_uaf_work+0x18/0x30 <4>[ 15.314888] process_one_work+0x53c/0xfc8 <4>[ 15.315069] worker_thread+0x614/0xf40 <4>[ 15.315244] kthread+0x24c/0x2d0 <4>[ 15.315404] ret_from_fork+0x10/0x20 <3>[ 15.315580] <3>[ 15.315683] Last potentially related work creation: <4>[ 15.315885] kasan_save_stack+0x3c/0x68 <4>[ 15.316067] __kasan_record_aux_stack+0xbc/0xe8 <4>[ 15.316268] kasan_record_aux_stack_noalloc+0x14/0x20 <4>[ 15.316502] __queue_work+0x640/0x1030 <4>[ 15.316684] queue_work_on+0xbc/0xf8 <4>[ 15.316855] workqueue_uaf+0x218/0x4b8 <4>[ 15.317047] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.317231] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.317465] kthread+0x24c/0x2d0 <4>[ 15.317632] ret_from_fork+0x10/0x20 <3>[ 15.317828] <3>[ 15.318008] The buggy address belongs to the object at fff00000c5679a40 <3>[ 15.318008] which belongs to the cache kmalloc-32 of size 32 <3>[ 15.318544] The buggy address is located 0 bytes inside of <3>[ 15.318544] freed 32-byte region [fff00000c5679a40, fff00000c5679a60) <3>[ 15.318947] <3>[ 15.319044] The buggy address belongs to the physical page: <4>[ 15.319254] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105679 <4>[ 15.319547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.319796] page_type: 0xffffefff(slab) <4>[ 15.319972] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 15.320257] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 15.320594] page dumped because: kasan: bad access detected <3>[ 15.320813] <3>[ 15.320915] Memory state around the buggy address: <3>[ 15.321130] fff00000c5679900: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc <3>[ 15.321393] fff00000c5679980: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 15.321661] >fff00000c5679a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 15.321994] ^ <3>[ 15.322281] fff00000c5679a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.322586] fff00000c5679b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.322845] ================================================================== <6>[ 15.327004] ok 32 workqueue_uaf <6>[ 15.332279] ok 33 kfree_via_page <6>[ 15.336657] ok 34 kfree_via_phys <3>[ 15.339905] ================================================================== <3>[ 15.340326] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x32c/0x420 <3>[ 15.340587] Read of size 1 at addr fff00000c56280c8 by task kunit_try_catch/190 <3>[ 15.340859] <3>[ 15.340960] CPU: 1 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.341309] Hardware name: linux,dummy-virt (DT) <3>[ 15.341489] Call trace: <3>[ 15.341613] dump_backtrace+0x9c/0x128 <3>[ 15.341790] show_stack+0x20/0x38 <3>[ 15.342025] dump_stack_lvl+0x8c/0xd0 <3>[ 15.342298] print_report+0x118/0x5e0 <3>[ 15.342498] kasan_report+0xc8/0x118 <3>[ 15.342673] __asan_report_load1_noabort+0x20/0x30 <3>[ 15.342900] kmem_cache_oob+0x32c/0x420 <3>[ 15.343091] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.343295] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.343563] kthread+0x24c/0x2d0 <3>[ 15.343737] ret_from_fork+0x10/0x20 <3>[ 15.343982] <3>[ 15.344089] Allocated by task 190: <4>[ 15.344274] kasan_save_stack+0x3c/0x68 <4>[ 15.344468] kasan_save_track+0x20/0x40 <4>[ 15.344658] kasan_save_alloc_info+0x40/0x58 <4>[ 15.344853] __kasan_slab_alloc+0xa8/0xb0 <4>[ 15.345040] kmem_cache_alloc_noprof+0x108/0x310 <4>[ 15.345241] kmem_cache_oob+0x118/0x420 <4>[ 15.345417] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.345606] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.345840] kthread+0x24c/0x2d0 <4>[ 15.346082] ret_from_fork+0x10/0x20 <3>[ 15.346343] <3>[ 15.346450] The buggy address belongs to the object at fff00000c5628000 <3>[ 15.346450] which belongs to the cache test_cache of size 200 <3>[ 15.346900] The buggy address is located 0 bytes to the right of <3>[ 15.346900] allocated 200-byte region [fff00000c5628000, fff00000c56280c8) <3>[ 15.347325] <3>[ 15.347425] The buggy address belongs to the physical page: <4>[ 15.347638] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105628 <4>[ 15.347927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.348172] page_type: 0xffffefff(slab) <4>[ 15.348350] raw: 0bfffe0000000000 fff00000c562b000 dead000000000122 0000000000000000 <4>[ 15.348639] raw: 0000000000000000 00000000800f000f 00000001ffffefff 0000000000000000 <4>[ 15.348914] page dumped because: kasan: bad access detected <3>[ 15.349130] <3>[ 15.349228] Memory state around the buggy address: <3>[ 15.349440] fff00000c5627f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.349727] fff00000c5628000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.350125] >fff00000c5628080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc <3>[ 15.350495] ^ <3>[ 15.350743] fff00000c5628100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.351025] fff00000c5628180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.351285] ================================================================== <6>[ 15.364686] ok 35 kmem_cache_oob <3>[ 15.368379] ================================================================== <3>[ 15.369412] BUG: KASAN: double-free in kmem_cache_double_free+0x184/0x3b8 <3>[ 15.370271] Free of addr fff00000c563e000 by task kunit_try_catch/192 <3>[ 15.371103] <3>[ 15.371446] CPU: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.372354] Hardware name: linux,dummy-virt (DT) <3>[ 15.372876] Call trace: <3>[ 15.373278] dump_backtrace+0x9c/0x128 <3>[ 15.373804] show_stack+0x20/0x38 <3>[ 15.374344] dump_stack_lvl+0x8c/0xd0 <3>[ 15.374869] print_report+0x118/0x5e0 <3>[ 15.375388] kasan_report_invalid_free+0xb0/0xd8 <3>[ 15.375970] __kasan_slab_free+0x14c/0x188 <3>[ 15.376515] kmem_cache_free+0xf4/0x3a8 <3>[ 15.377038] kmem_cache_double_free+0x184/0x3b8 <3>[ 15.377631] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.378310] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.378931] kthread+0x24c/0x2d0 <3>[ 15.379323] ret_from_fork+0x10/0x20 <3>[ 15.379708] <3>[ 15.379942] Allocated by task 192: <4>[ 15.380222] kasan_save_stack+0x3c/0x68 <4>[ 15.380553] kasan_save_track+0x20/0x40 <4>[ 15.380875] kasan_save_alloc_info+0x40/0x58 <4>[ 15.381209] __kasan_slab_alloc+0xa8/0xb0 <4>[ 15.381531] kmem_cache_alloc_noprof+0x108/0x310 <4>[ 15.381912] kmem_cache_double_free+0x118/0x3b8 <4>[ 15.382361] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.382686] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.383096] kthread+0x24c/0x2d0 <4>[ 15.383387] ret_from_fork+0x10/0x20 <3>[ 15.383697] <3>[ 15.383889] Freed by task 192: <4>[ 15.384165] kasan_save_stack+0x3c/0x68 <4>[ 15.384500] kasan_save_track+0x20/0x40 <4>[ 15.384832] kasan_save_free_info+0x4c/0x78 <4>[ 15.385185] __kasan_slab_free+0x118/0x188 <4>[ 15.385539] kmem_cache_free+0xf4/0x3a8 <4>[ 15.385883] kmem_cache_double_free+0x12c/0x3b8 <4>[ 15.386279] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.386603] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.387029] kthread+0x24c/0x2d0 <4>[ 15.387321] ret_from_fork+0x10/0x20 <3>[ 15.387616] <3>[ 15.387822] The buggy address belongs to the object at fff00000c563e000 <3>[ 15.387822] which belongs to the cache test_cache of size 200 <3>[ 15.388624] The buggy address is located 0 bytes inside of <3>[ 15.388624] 200-byte region [fff00000c563e000, fff00000c563e0c8) <3>[ 15.389380] <3>[ 15.389568] The buggy address belongs to the physical page: <4>[ 15.390009] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10563e <4>[ 15.390942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.391504] page_type: 0xffffefff(slab) <4>[ 15.391899] raw: 0bfffe0000000000 fff00000c3e93500 dead000000000122 0000000000000000 <4>[ 15.392558] raw: 0000000000000000 00000000800f000f 00000001ffffefff 0000000000000000 <4>[ 15.393208] page dumped because: kasan: bad access detected <3>[ 15.393683] <3>[ 15.393918] Memory state around the buggy address: <3>[ 15.394385] fff00000c563df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.394870] fff00000c563df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.395361] >fff00000c563e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 15.395908] ^ <3>[ 15.396258] fff00000c563e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc <3>[ 15.396917] fff00000c563e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.397529] ================================================================== <6>[ 15.407411] ok 36 kmem_cache_double_free <3>[ 15.411312] ================================================================== <3>[ 15.412451] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x178/0x3b8 <3>[ 15.413224] Free of addr fff00000c6561001 by task kunit_try_catch/194 <3>[ 15.414187] <3>[ 15.414618] CPU: 1 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.415663] Hardware name: linux,dummy-virt (DT) <3>[ 15.416270] Call trace: <3>[ 15.416714] dump_backtrace+0x9c/0x128 <3>[ 15.417300] show_stack+0x20/0x38 <3>[ 15.417860] dump_stack_lvl+0x8c/0xd0 <3>[ 15.418450] print_report+0x118/0x5e0 <3>[ 15.419024] kasan_report_invalid_free+0xb0/0xd8 <3>[ 15.419670] __kasan_slab_free+0x174/0x188 <3>[ 15.420272] kmem_cache_free+0xf4/0x3a8 <3>[ 15.420853] kmem_cache_invalid_free+0x178/0x3b8 <3>[ 15.421488] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.422248] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.422933] kthread+0x24c/0x2d0 <3>[ 15.423297] ret_from_fork+0x10/0x20 <3>[ 15.423643] <3>[ 15.423825] Allocated by task 194: <4>[ 15.424087] kasan_save_stack+0x3c/0x68 <4>[ 15.424376] kasan_save_track+0x20/0x40 <4>[ 15.424678] kasan_save_alloc_info+0x40/0x58 <4>[ 15.425012] __kasan_slab_alloc+0xa8/0xb0 <4>[ 15.425329] kmem_cache_alloc_noprof+0x108/0x310 <4>[ 15.425681] kmem_cache_invalid_free+0x118/0x3b8 <4>[ 15.426114] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.426573] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.427059] kthread+0x24c/0x2d0 <4>[ 15.427404] ret_from_fork+0x10/0x20 <3>[ 15.427762] <3>[ 15.427991] The buggy address belongs to the object at fff00000c6561000 <3>[ 15.427991] which belongs to the cache test_cache of size 200 <3>[ 15.428901] The buggy address is located 1 bytes inside of <3>[ 15.428901] 200-byte region [fff00000c6561000, fff00000c65610c8) <3>[ 15.429761] <3>[ 15.430095] The buggy address belongs to the physical page: <4>[ 15.430578] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106561 <4>[ 15.431183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.431683] page_type: 0xffffefff(slab) <4>[ 15.432064] raw: 0bfffe0000000000 fff00000c562b140 dead000000000122 0000000000000000 <4>[ 15.432636] raw: 0000000000000000 00000000800f000f 00000001ffffefff 0000000000000000 <4>[ 15.433182] page dumped because: kasan: bad access detected <3>[ 15.433625] <3>[ 15.433840] Memory state around the buggy address: <3>[ 15.434347] fff00000c6560f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 15.434888] fff00000c6560f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 15.435436] >fff00000c6561000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.435968] ^ <3>[ 15.436321] fff00000c6561080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc <3>[ 15.436865] fff00000c6561100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.437433] ================================================================== <6>[ 15.445207] ok 37 kmem_cache_invalid_free <3>[ 15.451428] ================================================================== <3>[ 15.451849] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x170/0x310 <3>[ 15.452237] Read of size 1 at addr fff00000c562b280 by task kunit_try_catch/196 <3>[ 15.452559] <3>[ 15.452664] CPU: 1 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 15.453111] Hardware name: linux,dummy-virt (DT) <3>[ 15.453400] Call trace: <3>[ 15.453615] dump_backtrace+0x9c/0x128 <3>[ 15.453867] show_stack+0x20/0x38 <3>[ 15.454128] dump_stack_lvl+0x8c/0xd0 <3>[ 15.454436] print_report+0x118/0x5e0 <3>[ 15.454695] kasan_report+0xc8/0x118 <3>[ 15.454931] __kasan_check_byte+0x54/0x70 <3>[ 15.455172] kmem_cache_destroy+0x30/0x1a8 <3>[ 15.455417] kmem_cache_double_destroy+0x170/0x310 <3>[ 15.455684] kunit_try_run_case+0x14c/0x3d0 <3>[ 15.455929] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 15.456212] kthread+0x24c/0x2d0 <3>[ 15.456428] ret_from_fork+0x10/0x20 <3>[ 15.456670] <3>[ 15.456774] Allocated by task 196: <4>[ 15.457033] kasan_save_stack+0x3c/0x68 <4>[ 15.457270] kasan_save_track+0x20/0x40 <4>[ 15.457498] kasan_save_alloc_info+0x40/0x58 <4>[ 15.457738] __kasan_slab_alloc+0xa8/0xb0 <4>[ 15.458013] kmem_cache_alloc_noprof+0x108/0x310 <4>[ 15.458280] kmem_cache_create_usercopy+0x16c/0x260 <4>[ 15.458578] kmem_cache_create+0x24/0x38 <4>[ 15.458790] kmem_cache_double_destroy+0xb4/0x310 <4>[ 15.459059] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.459298] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.459581] kthread+0x24c/0x2d0 <4>[ 15.459797] ret_from_fork+0x10/0x20 <3>[ 15.460023] <3>[ 15.460145] Freed by task 196: <4>[ 15.460389] kasan_save_stack+0x3c/0x68 <4>[ 15.460568] kasan_save_track+0x20/0x40 <4>[ 15.460850] kasan_save_free_info+0x4c/0x78 <4>[ 15.461089] __kasan_slab_free+0x118/0x188 <4>[ 15.461332] kmem_cache_free+0xf4/0x3a8 <4>[ 15.461560] slab_kmem_cache_release+0x38/0x50 <4>[ 15.461811] kmem_cache_release+0x1c/0x30 <4>[ 15.462108] kobject_put+0x17c/0x448 <4>[ 15.462367] sysfs_slab_release+0x1c/0x30 <4>[ 15.462567] kmem_cache_destroy+0xec/0x1a8 <4>[ 15.462805] kmem_cache_double_destroy+0x11c/0x310 <4>[ 15.463108] kunit_try_run_case+0x14c/0x3d0 <4>[ 15.463326] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 15.463626] kthread+0x24c/0x2d0 <4>[ 15.463802] ret_from_fork+0x10/0x20 <3>[ 15.464061] <3>[ 15.464165] The buggy address belongs to the object at fff00000c562b280 <3>[ 15.464165] which belongs to the cache kmem_cache of size 208 <3>[ 15.464707] The buggy address is located 0 bytes inside of <3>[ 15.464707] freed 208-byte region [fff00000c562b280, fff00000c562b350) <3>[ 15.465241] <3>[ 15.465349] The buggy address belongs to the physical page: <4>[ 15.465662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10562b <4>[ 15.466082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 15.466427] page_type: 0xffffefff(slab) <4>[ 15.466673] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 <4>[ 15.467018] raw: 0000000000000000 00000000800c000c 00000001ffffefff 0000000000000000 <4>[ 15.467346] page dumped because: kasan: bad access detected <3>[ 15.467613] <3>[ 15.467714] Memory state around the buggy address: <3>[ 15.468005] fff00000c562b180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 15.468324] fff00000c562b200: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.468638] >fff00000c562b280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 15.468948] ^ <3>[ 15.469139] fff00000c562b300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc <3>[ 15.469481] fff00000c562b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 15.469797] ================================================================== <6>[ 15.472057] ok 38 kmem_cache_double_destroy <6>[ 16.023857] ok 39 kmem_cache_accounted <6>[ 16.034781] ok 40 kmem_cache_bulk <3>[ 16.037317] ================================================================== <3>[ 16.038274] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 <3>[ 16.039008] Read of size 1 at addr fff00000c5616c73 by task kunit_try_catch/203 <3>[ 16.039697] <3>[ 16.039964] CPU: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.040823] Hardware name: linux,dummy-virt (DT) <3>[ 16.041289] Call trace: <3>[ 16.041615] dump_backtrace+0x9c/0x128 <3>[ 16.042111] show_stack+0x20/0x38 <3>[ 16.042514] dump_stack_lvl+0x8c/0xd0 <3>[ 16.042911] print_report+0x118/0x5e0 <3>[ 16.043299] kasan_report+0xc8/0x118 <3>[ 16.043679] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.044123] mempool_oob_right_helper+0x2b8/0x2f8 <3>[ 16.044591] mempool_kmalloc_oob_right+0xbc/0x118 <3>[ 16.045066] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.045521] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.046111] kthread+0x24c/0x2d0 <3>[ 16.046512] ret_from_fork+0x10/0x20 <3>[ 16.046924] <3>[ 16.047154] Allocated by task 203: <4>[ 16.047503] kasan_save_stack+0x3c/0x68 <4>[ 16.047917] kasan_save_track+0x20/0x40 <4>[ 16.048315] kasan_save_alloc_info+0x40/0x58 <4>[ 16.048742] __kasan_mempool_unpoison_object+0x12c/0x190 <4>[ 16.049233] remove_element+0x130/0x1f8 <4>[ 16.049645] mempool_alloc_preallocated+0x58/0xc0 <4>[ 16.050245] mempool_oob_right_helper+0x98/0x2f8 <4>[ 16.050698] mempool_kmalloc_oob_right+0xbc/0x118 <4>[ 16.051151] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.051568] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.052063] kthread+0x24c/0x2d0 <4>[ 16.052422] ret_from_fork+0x10/0x20 <3>[ 16.052801] <3>[ 16.053027] The buggy address belongs to the object at fff00000c5616c00 <3>[ 16.053027] which belongs to the cache kmalloc-128 of size 128 <3>[ 16.054014] The buggy address is located 0 bytes to the right of <3>[ 16.054014] allocated 115-byte region [fff00000c5616c00, fff00000c5616c73) <3>[ 16.054979] <3>[ 16.055223] The buggy address belongs to the physical page: <4>[ 16.055689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105616 <4>[ 16.056340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.056915] page_type: 0xffffefff(slab) <4>[ 16.057321] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 16.057996] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 16.058699] page dumped because: kasan: bad access detected <3>[ 16.059170] <3>[ 16.059399] Memory state around the buggy address: <3>[ 16.059820] fff00000c5616b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 16.060430] fff00000c5616b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.061017] >fff00000c5616c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 16.061586] ^ <3>[ 16.062281] fff00000c5616c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.062891] fff00000c5616d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc <3>[ 16.063469] ================================================================== <6>[ 16.068973] ok 41 mempool_kmalloc_oob_right <3>[ 16.072653] ================================================================== <3>[ 16.073640] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 <3>[ 16.074459] Read of size 1 at addr fff00000c6806001 by task kunit_try_catch/205 <3>[ 16.075281] <3>[ 16.075611] CPU: 1 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.076535] Hardware name: linux,dummy-virt (DT) <3>[ 16.077069] Call trace: <3>[ 16.077442] dump_backtrace+0x9c/0x128 <3>[ 16.077986] show_stack+0x20/0x38 <3>[ 16.078479] dump_stack_lvl+0x8c/0xd0 <3>[ 16.078972] print_report+0x118/0x5e0 <3>[ 16.079507] kasan_report+0xc8/0x118 <3>[ 16.080006] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.080559] mempool_oob_right_helper+0x2b8/0x2f8 <3>[ 16.081096] mempool_kmalloc_large_oob_right+0xbc/0x118 <3>[ 16.081663] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.082309] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.082917] kthread+0x24c/0x2d0 <3>[ 16.083369] ret_from_fork+0x10/0x20 <3>[ 16.083840] <3>[ 16.084163] The buggy address belongs to the physical page: <4>[ 16.084723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106804 <4>[ 16.085498] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 16.086340] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.087069] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.087797] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.088512] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.089222] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.089984] head: 0bfffe0000000002 ffffc1ffc31a0101 ffffffffffffffff 0000000000000000 <4>[ 16.090767] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 16.091466] page dumped because: kasan: bad access detected <3>[ 16.092019] <3>[ 16.092325] Memory state around the buggy address: <3>[ 16.092842] fff00000c6805f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.093524] fff00000c6805f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.094322] >fff00000c6806000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 16.094995] ^ <3>[ 16.095425] fff00000c6806080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 16.096116] fff00000c6806100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe <3>[ 16.096804] ================================================================== <6>[ 16.100928] ok 42 mempool_kmalloc_large_oob_right <3>[ 16.105324] ================================================================== <3>[ 16.106563] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2b8/0x2f8 <3>[ 16.107361] Read of size 1 at addr fff00000c65c72bb by task kunit_try_catch/207 <3>[ 16.108235] <3>[ 16.108498] CPU: 1 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.109334] Hardware name: linux,dummy-virt (DT) <3>[ 16.109789] Call trace: <3>[ 16.110131] dump_backtrace+0x9c/0x128 <3>[ 16.110647] show_stack+0x20/0x38 <3>[ 16.111080] dump_stack_lvl+0x8c/0xd0 <3>[ 16.111524] print_report+0x118/0x5e0 <3>[ 16.111981] kasan_report+0xc8/0x118 <3>[ 16.112416] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.112920] mempool_oob_right_helper+0x2b8/0x2f8 <3>[ 16.113437] mempool_slab_oob_right+0xb8/0x110 <3>[ 16.114007] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.114577] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.115170] kthread+0x24c/0x2d0 <3>[ 16.115591] ret_from_fork+0x10/0x20 <3>[ 16.116048] <3>[ 16.116307] Allocated by task 207: <4>[ 16.116701] kasan_save_stack+0x3c/0x68 <4>[ 16.117171] kasan_save_track+0x20/0x40 <4>[ 16.117606] kasan_save_alloc_info+0x40/0x58 <4>[ 16.118187] __kasan_mempool_unpoison_object+0xcc/0x190 <4>[ 16.118775] remove_element+0x16c/0x1f8 <4>[ 16.119233] mempool_alloc_preallocated+0x58/0xc0 <4>[ 16.119719] mempool_oob_right_helper+0x98/0x2f8 <4>[ 16.120212] mempool_slab_oob_right+0xb8/0x110 <4>[ 16.120700] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.121148] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.121745] kthread+0x24c/0x2d0 <4>[ 16.122267] ret_from_fork+0x10/0x20 <3>[ 16.122688] <3>[ 16.122936] The buggy address belongs to the object at fff00000c65c7240 <3>[ 16.122936] which belongs to the cache test_cache of size 123 <3>[ 16.124008] The buggy address is located 0 bytes to the right of <3>[ 16.124008] allocated 123-byte region [fff00000c65c7240, fff00000c65c72bb) <3>[ 16.125115] <3>[ 16.125380] The buggy address belongs to the physical page: <4>[ 16.125929] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c7 <4>[ 16.126684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.127300] page_type: 0xffffefff(slab) <4>[ 16.127758] raw: 0bfffe0000000000 fff00000c562b500 dead000000000122 0000000000000000 <4>[ 16.128383] raw: 0000000000000000 0000000080150015 00000001ffffefff 0000000000000000 <4>[ 16.128885] page dumped because: kasan: bad access detected <3>[ 16.129264] <3>[ 16.129422] Memory state around the buggy address: <3>[ 16.129782] fff00000c65c7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 16.130375] fff00000c65c7200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 <3>[ 16.130642] >fff00000c65c7280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc <3>[ 16.130901] ^ <3>[ 16.131097] fff00000c65c7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.131357] fff00000c65c7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.131609] ================================================================== <6>[ 16.139274] ok 43 mempool_slab_oob_right <3>[ 16.141065] ================================================================== <3>[ 16.142302] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348 <3>[ 16.143114] Read of size 1 at addr fff00000c65c7200 by task kunit_try_catch/209 <3>[ 16.143888] <3>[ 16.144198] CPU: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.145238] Hardware name: linux,dummy-virt (DT) <3>[ 16.145803] Call trace: <3>[ 16.146216] dump_backtrace+0x9c/0x128 <3>[ 16.146762] show_stack+0x20/0x38 <3>[ 16.147181] dump_stack_lvl+0x8c/0xd0 <3>[ 16.147671] print_report+0x118/0x5e0 <3>[ 16.148183] kasan_report+0xc8/0x118 <3>[ 16.148731] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.149262] mempool_uaf_helper+0x320/0x348 <3>[ 16.149763] mempool_kmalloc_uaf+0xbc/0x118 <3>[ 16.150317] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.150835] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.151439] kthread+0x24c/0x2d0 <3>[ 16.151879] ret_from_fork+0x10/0x20 <3>[ 16.152342] <3>[ 16.152610] Allocated by task 209: <4>[ 16.153041] kasan_save_stack+0x3c/0x68 <4>[ 16.153558] kasan_save_track+0x20/0x40 <4>[ 16.154161] kasan_save_alloc_info+0x40/0x58 <4>[ 16.154745] __kasan_mempool_unpoison_object+0x12c/0x190 <4>[ 16.155346] remove_element+0x130/0x1f8 <4>[ 16.155824] mempool_alloc_preallocated+0x58/0xc0 <4>[ 16.156370] mempool_uaf_helper+0xa4/0x348 <4>[ 16.156892] mempool_kmalloc_uaf+0xbc/0x118 <4>[ 16.157391] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.157938] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.158627] kthread+0x24c/0x2d0 <4>[ 16.159074] ret_from_fork+0x10/0x20 <3>[ 16.159566] <3>[ 16.159849] Freed by task 209: <4>[ 16.160266] kasan_save_stack+0x3c/0x68 <4>[ 16.160803] kasan_save_track+0x20/0x40 <4>[ 16.161328] kasan_save_free_info+0x4c/0x78 <4>[ 16.161868] __kasan_mempool_poison_object+0x14c/0x230 <4>[ 16.162480] mempool_free+0x28c/0x328 <4>[ 16.162937] mempool_uaf_helper+0x108/0x348 <4>[ 16.163421] mempool_kmalloc_uaf+0xbc/0x118 <4>[ 16.163902] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.164425] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.165032] kthread+0x24c/0x2d0 <4>[ 16.165474] ret_from_fork+0x10/0x20 <3>[ 16.165973] <3>[ 16.166273] The buggy address belongs to the object at fff00000c65c7200 <3>[ 16.166273] which belongs to the cache kmalloc-128 of size 128 <3>[ 16.167361] The buggy address is located 0 bytes inside of <3>[ 16.167361] freed 128-byte region [fff00000c65c7200, fff00000c65c7280) <3>[ 16.168479] <3>[ 16.168718] The buggy address belongs to the physical page: <4>[ 16.169332] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c7 <4>[ 16.170301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.170991] page_type: 0xffffefff(slab) <4>[ 16.171536] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 16.172430] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 16.173171] page dumped because: kasan: bad access detected <3>[ 16.173770] <3>[ 16.174072] Memory state around the buggy address: <3>[ 16.174578] fff00000c65c7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 16.175202] fff00000c65c7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.175818] >fff00000c65c7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 16.176403] ^ <3>[ 16.176766] fff00000c65c7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.177320] fff00000c65c7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.177933] ================================================================== <6>[ 16.181034] ok 44 mempool_kmalloc_uaf <3>[ 16.182985] ================================================================== <3>[ 16.183638] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348 <3>[ 16.184043] Read of size 1 at addr fff00000c6808000 by task kunit_try_catch/211 <3>[ 16.184471] <3>[ 16.184632] CPU: 1 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.185226] Hardware name: linux,dummy-virt (DT) <3>[ 16.185538] Call trace: <3>[ 16.185730] dump_backtrace+0x9c/0x128 <3>[ 16.186229] show_stack+0x20/0x38 <3>[ 16.186623] dump_stack_lvl+0x8c/0xd0 <3>[ 16.187005] print_report+0x118/0x5e0 <3>[ 16.187371] kasan_report+0xc8/0x118 <3>[ 16.187726] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.188151] mempool_uaf_helper+0x320/0x348 <3>[ 16.188542] mempool_kmalloc_large_uaf+0xbc/0x118 <3>[ 16.188969] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.189366] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.189858] kthread+0x24c/0x2d0 <3>[ 16.190233] ret_from_fork+0x10/0x20 <3>[ 16.190597] <3>[ 16.190811] The buggy address belongs to the physical page: <4>[ 16.191273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106808 <4>[ 16.191908] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 16.192510] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.193111] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.193730] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.194493] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.195178] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.195855] head: 0bfffe0000000002 ffffc1ffc31a0201 ffffffffffffffff 0000000000000000 <4>[ 16.196528] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 16.197182] page dumped because: kasan: bad access detected <3>[ 16.197684] <3>[ 16.197969] Memory state around the buggy address: <3>[ 16.198448] fff00000c6807f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.199084] fff00000c6807f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.199715] >fff00000c6808000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.200341] ^ <3>[ 16.200692] fff00000c6808080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.201339] fff00000c6808100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.202047] ================================================================== <6>[ 16.205808] ok 45 mempool_kmalloc_large_uaf <3>[ 16.211461] ================================================================== <3>[ 16.212494] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x320/0x348 <3>[ 16.213129] Read of size 1 at addr fff00000c65dd240 by task kunit_try_catch/213 <3>[ 16.213930] <3>[ 16.214285] CPU: 1 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.215024] Hardware name: linux,dummy-virt (DT) <3>[ 16.215447] Call trace: <3>[ 16.215681] dump_backtrace+0x9c/0x128 <3>[ 16.216096] show_stack+0x20/0x38 <3>[ 16.216469] dump_stack_lvl+0x8c/0xd0 <3>[ 16.216851] print_report+0x118/0x5e0 <3>[ 16.217231] kasan_report+0xc8/0x118 <3>[ 16.217623] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.218221] mempool_uaf_helper+0x320/0x348 <3>[ 16.218685] mempool_slab_uaf+0xb8/0x110 <3>[ 16.219074] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.219508] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.219993] kthread+0x24c/0x2d0 <3>[ 16.220333] ret_from_fork+0x10/0x20 <3>[ 16.220706] <3>[ 16.220924] Allocated by task 213: <4>[ 16.221305] kasan_save_stack+0x3c/0x68 <4>[ 16.221652] kasan_save_track+0x20/0x40 <4>[ 16.222094] kasan_save_alloc_info+0x40/0x58 <4>[ 16.222504] __kasan_mempool_unpoison_object+0xcc/0x190 <4>[ 16.222874] remove_element+0x16c/0x1f8 <4>[ 16.223186] mempool_alloc_preallocated+0x58/0xc0 <4>[ 16.223520] mempool_uaf_helper+0xa4/0x348 <4>[ 16.223825] mempool_slab_uaf+0xb8/0x110 <4>[ 16.224110] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.224417] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.224792] kthread+0x24c/0x2d0 <4>[ 16.225056] ret_from_fork+0x10/0x20 <3>[ 16.225330] <3>[ 16.225498] Freed by task 213: <4>[ 16.225767] kasan_save_stack+0x3c/0x68 <4>[ 16.226197] kasan_save_track+0x20/0x40 <4>[ 16.226564] kasan_save_free_info+0x4c/0x78 <4>[ 16.226875] __kasan_mempool_poison_object+0x14c/0x230 <4>[ 16.227230] mempool_free+0x28c/0x328 <4>[ 16.227513] mempool_uaf_helper+0x108/0x348 <4>[ 16.227817] mempool_slab_uaf+0xb8/0x110 <4>[ 16.228107] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.228414] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.228776] kthread+0x24c/0x2d0 <4>[ 16.229056] ret_from_fork+0x10/0x20 <3>[ 16.229343] <3>[ 16.229526] The buggy address belongs to the object at fff00000c65dd240 <3>[ 16.229526] which belongs to the cache test_cache of size 123 <3>[ 16.230664] The buggy address is located 0 bytes inside of <3>[ 16.230664] freed 123-byte region [fff00000c65dd240, fff00000c65dd2bb) <3>[ 16.231431] <3>[ 16.231609] The buggy address belongs to the physical page: <4>[ 16.231992] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065dd <4>[ 16.232485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.232965] page_type: 0xffffefff(slab) <4>[ 16.233310] raw: 0bfffe0000000000 fff00000c562b640 dead000000000122 0000000000000000 <4>[ 16.233813] raw: 0000000000000000 0000000080150015 00000001ffffefff 0000000000000000 <4>[ 16.234500] page dumped because: kasan: bad access detected <3>[ 16.234739] <3>[ 16.234844] Memory state around the buggy address: <3>[ 16.235054] fff00000c65dd100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.235328] fff00000c65dd180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 16.235595] >fff00000c65dd200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb <3>[ 16.235858] ^ <3>[ 16.236079] fff00000c65dd280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.236357] fff00000c65dd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.236618] ================================================================== <6>[ 16.245475] ok 46 mempool_slab_uaf <3>[ 16.247680] ================================================================== <3>[ 16.248539] BUG: KASAN: use-after-free in mempool_uaf_helper+0x320/0x348 <3>[ 16.249090] Read of size 1 at addr fff00000c67dc000 by task kunit_try_catch/215 <3>[ 16.249662] <3>[ 16.249909] CPU: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.250847] Hardware name: linux,dummy-virt (DT) <3>[ 16.251241] Call trace: <3>[ 16.251504] dump_backtrace+0x9c/0x128 <3>[ 16.251871] show_stack+0x20/0x38 <3>[ 16.252217] dump_stack_lvl+0x8c/0xd0 <3>[ 16.252593] print_report+0x118/0x5e0 <3>[ 16.252982] kasan_report+0xc8/0x118 <3>[ 16.253355] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.253800] mempool_uaf_helper+0x320/0x348 <3>[ 16.254291] mempool_page_alloc_uaf+0xb8/0x118 <3>[ 16.254713] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.255108] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.255597] kthread+0x24c/0x2d0 <3>[ 16.255951] ret_from_fork+0x10/0x20 <3>[ 16.256322] <3>[ 16.256539] The buggy address belongs to the physical page: <4>[ 16.257000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067dc <4>[ 16.257633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.258275] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.258995] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.259586] page dumped because: kasan: bad access detected <3>[ 16.260098] <3>[ 16.260328] Memory state around the buggy address: <3>[ 16.260818] fff00000c67dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.261477] fff00000c67dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.262294] >fff00000c67dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.262897] ^ <3>[ 16.263205] fff00000c67dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.263783] fff00000c67dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.264332] ================================================================== <6>[ 16.267143] ok 47 mempool_page_alloc_uaf <3>[ 16.268881] ================================================================== <3>[ 16.269764] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 <3>[ 16.270495] Free of addr fff00000c65c7a00 by task kunit_try_catch/217 <3>[ 16.271035] <3>[ 16.271300] CPU: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.272090] Hardware name: linux,dummy-virt (DT) <3>[ 16.272486] Call trace: <3>[ 16.272789] dump_backtrace+0x9c/0x128 <3>[ 16.273192] show_stack+0x20/0x38 <3>[ 16.273543] dump_stack_lvl+0x8c/0xd0 <3>[ 16.274002] print_report+0x118/0x5e0 <3>[ 16.274424] kasan_report_invalid_free+0xb0/0xd8 <3>[ 16.274863] __kasan_mempool_poison_object+0x178/0x230 <3>[ 16.275323] mempool_free+0x28c/0x328 <3>[ 16.275691] mempool_double_free_helper+0x15c/0x2f8 <3>[ 16.276149] mempool_kmalloc_double_free+0xb8/0x110 <3>[ 16.276638] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.277056] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.277551] kthread+0x24c/0x2d0 <3>[ 16.277949] ret_from_fork+0x10/0x20 <3>[ 16.278416] <3>[ 16.278644] Allocated by task 217: <4>[ 16.278972] kasan_save_stack+0x3c/0x68 <4>[ 16.279359] kasan_save_track+0x20/0x40 <4>[ 16.279732] kasan_save_alloc_info+0x40/0x58 <4>[ 16.280121] __kasan_mempool_unpoison_object+0x12c/0x190 <4>[ 16.280582] remove_element+0x130/0x1f8 <4>[ 16.280955] mempool_alloc_preallocated+0x58/0xc0 <4>[ 16.281401] mempool_double_free_helper+0x94/0x2f8 <4>[ 16.281883] mempool_kmalloc_double_free+0xb8/0x110 <4>[ 16.282372] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.282738] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.283131] kthread+0x24c/0x2d0 <4>[ 16.283395] ret_from_fork+0x10/0x20 <3>[ 16.283705] <3>[ 16.283883] Freed by task 217: <4>[ 16.284185] kasan_save_stack+0x3c/0x68 <4>[ 16.284518] kasan_save_track+0x20/0x40 <4>[ 16.284857] kasan_save_free_info+0x4c/0x78 <4>[ 16.285196] __kasan_mempool_poison_object+0x14c/0x230 <4>[ 16.285600] mempool_free+0x28c/0x328 <4>[ 16.285988] mempool_double_free_helper+0x104/0x2f8 <4>[ 16.286449] mempool_kmalloc_double_free+0xb8/0x110 <4>[ 16.286835] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.287146] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.287528] kthread+0x24c/0x2d0 <4>[ 16.287787] ret_from_fork+0x10/0x20 <3>[ 16.288056] <3>[ 16.288216] The buggy address belongs to the object at fff00000c65c7a00 <3>[ 16.288216] which belongs to the cache kmalloc-128 of size 128 <3>[ 16.289014] The buggy address is located 0 bytes inside of <3>[ 16.289014] 128-byte region [fff00000c65c7a00, fff00000c65c7a80) <3>[ 16.289780] <3>[ 16.290016] The buggy address belongs to the physical page: <4>[ 16.290455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c7 <4>[ 16.291005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.291420] page_type: 0xffffefff(slab) <4>[ 16.291703] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 16.292188] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 16.292687] page dumped because: kasan: bad access detected <3>[ 16.293041] <3>[ 16.293215] Memory state around the buggy address: <3>[ 16.293567] fff00000c65c7900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 16.294164] fff00000c65c7980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.294727] >fff00000c65c7a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 16.295249] ^ <3>[ 16.295510] fff00000c65c7a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.295977] fff00000c65c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.296433] ================================================================== <6>[ 16.302699] ok 48 mempool_kmalloc_double_free <3>[ 16.305248] ================================================================== <3>[ 16.307099] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 <3>[ 16.308177] Free of addr fff00000c6808000 by task kunit_try_catch/219 <3>[ 16.309063] <3>[ 16.309432] CPU: 1 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.310786] Hardware name: linux,dummy-virt (DT) <3>[ 16.311437] Call trace: <3>[ 16.311878] dump_backtrace+0x9c/0x128 <3>[ 16.312506] show_stack+0x20/0x38 <3>[ 16.313065] dump_stack_lvl+0x8c/0xd0 <3>[ 16.313677] print_report+0x118/0x5e0 <3>[ 16.314388] kasan_report_invalid_free+0xb0/0xd8 <3>[ 16.315084] __kasan_mempool_poison_object+0x228/0x230 <3>[ 16.315823] mempool_free+0x28c/0x328 <3>[ 16.316437] mempool_double_free_helper+0x15c/0x2f8 <3>[ 16.317148] mempool_kmalloc_large_double_free+0xb8/0x110 <3>[ 16.317952] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.318634] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.319418] kthread+0x24c/0x2d0 <3>[ 16.319983] ret_from_fork+0x10/0x20 <3>[ 16.320592] <3>[ 16.320945] The buggy address belongs to the physical page: <4>[ 16.321676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106808 <4>[ 16.322722] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 16.323542] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.324368] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.325268] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.326174] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.326992] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.327723] head: 0bfffe0000000002 ffffc1ffc31a0201 ffffffffffffffff 0000000000000000 <4>[ 16.328447] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 16.329164] page dumped because: kasan: bad access detected <3>[ 16.329712] <3>[ 16.330051] Memory state around the buggy address: <3>[ 16.330580] fff00000c6807f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.331265] fff00000c6807f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.331938] >fff00000c6808000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.332608] ^ <3>[ 16.333012] fff00000c6808080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.333699] fff00000c6808100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.334461] ================================================================== <6>[ 16.339285] ok 49 mempool_kmalloc_large_double_free <3>[ 16.342495] ================================================================== <3>[ 16.343561] BUG: KASAN: double-free in mempool_double_free_helper+0x15c/0x2f8 <3>[ 16.344243] Free of addr fff00000c67dc000 by task kunit_try_catch/221 <3>[ 16.344928] <3>[ 16.345210] CPU: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.346246] Hardware name: linux,dummy-virt (DT) <3>[ 16.346778] Call trace: <3>[ 16.347132] dump_backtrace+0x9c/0x128 <3>[ 16.347604] show_stack+0x20/0x38 <3>[ 16.348031] dump_stack_lvl+0x8c/0xd0 <3>[ 16.348515] print_report+0x118/0x5e0 <3>[ 16.348946] kasan_report_invalid_free+0xb0/0xd8 <3>[ 16.349412] __kasan_mempool_poison_pages+0xe0/0xe8 <3>[ 16.349923] mempool_free+0x24c/0x328 <3>[ 16.350397] mempool_double_free_helper+0x15c/0x2f8 <3>[ 16.350890] mempool_page_alloc_double_free+0xb4/0x110 <3>[ 16.351389] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.351830] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.352351] kthread+0x24c/0x2d0 <3>[ 16.352734] ret_from_fork+0x10/0x20 <3>[ 16.353139] <3>[ 16.353374] The buggy address belongs to the physical page: <4>[ 16.353906] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1067dc <4>[ 16.354664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.355331] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.355987] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.356635] page dumped because: kasan: bad access detected <3>[ 16.357150] <3>[ 16.357399] Memory state around the buggy address: <3>[ 16.357858] fff00000c67dbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.358579] fff00000c67dbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.359175] >fff00000c67dc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.359778] ^ <3>[ 16.360131] fff00000c67dc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.360750] fff00000c67dc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.361616] ================================================================== <6>[ 16.365798] ok 50 mempool_page_alloc_double_free <3>[ 16.368340] ================================================================== <3>[ 16.369451] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0 <3>[ 16.370353] Free of addr fff00000c65d0101 by task kunit_try_catch/223 <3>[ 16.371011] <3>[ 16.371289] CPU: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.372337] Hardware name: linux,dummy-virt (DT) <3>[ 16.372859] Call trace: <3>[ 16.373192] dump_backtrace+0x9c/0x128 <3>[ 16.373682] show_stack+0x20/0x38 <3>[ 16.374184] dump_stack_lvl+0x8c/0xd0 <3>[ 16.374667] print_report+0x118/0x5e0 <3>[ 16.375129] kasan_report_invalid_free+0xb0/0xd8 <3>[ 16.375659] __kasan_mempool_poison_object+0x1dc/0x230 <3>[ 16.376233] mempool_free+0x28c/0x328 <3>[ 16.376626] mempool_kmalloc_invalid_free_helper+0x124/0x2b0 <3>[ 16.377027] mempool_kmalloc_invalid_free+0xb8/0x110 <3>[ 16.377383] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.377694] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.378479] kthread+0x24c/0x2d0 <3>[ 16.379025] ret_from_fork+0x10/0x20 <3>[ 16.379572] <3>[ 16.379786] Allocated by task 223: <4>[ 16.380072] kasan_save_stack+0x3c/0x68 <4>[ 16.380417] kasan_save_track+0x20/0x40 <4>[ 16.380709] kasan_save_alloc_info+0x40/0x58 <4>[ 16.381002] __kasan_mempool_unpoison_object+0x12c/0x190 <4>[ 16.381293] remove_element+0x130/0x1f8 <4>[ 16.381533] mempool_alloc_preallocated+0x58/0xc0 <4>[ 16.381769] mempool_kmalloc_invalid_free_helper+0x94/0x2b0 <4>[ 16.382333] mempool_kmalloc_invalid_free+0xb8/0x110 <4>[ 16.382821] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.383075] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.383396] kthread+0x24c/0x2d0 <4>[ 16.383606] ret_from_fork+0x10/0x20 <3>[ 16.383852] <3>[ 16.384037] The buggy address belongs to the object at fff00000c65d0100 <3>[ 16.384037] which belongs to the cache kmalloc-128 of size 128 <3>[ 16.384710] The buggy address is located 1 bytes inside of <3>[ 16.384710] 128-byte region [fff00000c65d0100, fff00000c65d0180) <3>[ 16.385329] <3>[ 16.385484] The buggy address belongs to the physical page: <4>[ 16.385845] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0 <4>[ 16.386324] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.386702] page_type: 0xffffefff(slab) <4>[ 16.386936] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 <4>[ 16.387370] raw: 0000000000000000 0000000080100010 00000001ffffefff 0000000000000000 <4>[ 16.387774] page dumped because: kasan: bad access detected <3>[ 16.388075] <3>[ 16.388219] Memory state around the buggy address: <3>[ 16.388531] fff00000c65d0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb <3>[ 16.388910] fff00000c65d0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.389298] >fff00000c65d0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.389668] ^ <3>[ 16.389900] fff00000c65d0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.390338] fff00000c65d0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.390686] ================================================================== <6>[ 16.393020] ok 51 mempool_kmalloc_invalid_free <3>[ 16.394169] ================================================================== <3>[ 16.394635] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x124/0x2b0 <3>[ 16.394949] Free of addr fff00000c6808001 by task kunit_try_catch/225 <3>[ 16.395201] <3>[ 16.395331] CPU: 1 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.395707] Hardware name: linux,dummy-virt (DT) <3>[ 16.395915] Call trace: <3>[ 16.396063] dump_backtrace+0x9c/0x128 <3>[ 16.396263] show_stack+0x20/0x38 <3>[ 16.396452] dump_stack_lvl+0x8c/0xd0 <3>[ 16.396636] print_report+0x118/0x5e0 <3>[ 16.396826] kasan_report_invalid_free+0xb0/0xd8 <3>[ 16.397037] __kasan_mempool_poison_object+0x1c4/0x230 <3>[ 16.397278] mempool_free+0x28c/0x328 <3>[ 16.397475] mempool_kmalloc_invalid_free_helper+0x124/0x2b0 <3>[ 16.397734] mempool_kmalloc_large_invalid_free+0xb8/0x110 <3>[ 16.398076] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.398289] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.398554] kthread+0x24c/0x2d0 <3>[ 16.398723] ret_from_fork+0x10/0x20 <3>[ 16.398885] <3>[ 16.398979] The buggy address belongs to the physical page: <4>[ 16.399208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106808 <4>[ 16.399535] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 <4>[ 16.399838] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.400151] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.400457] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.400774] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.401084] head: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.401409] head: 0bfffe0000000002 ffffc1ffc31a0201 ffffffffffffffff 0000000000000000 <4>[ 16.401732] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 <4>[ 16.402169] page dumped because: kasan: bad access detected <3>[ 16.402411] <3>[ 16.402513] Memory state around the buggy address: <3>[ 16.402712] fff00000c6807f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.402946] fff00000c6807f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff <3>[ 16.403196] >fff00000c6808000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.403537] ^ <3>[ 16.403709] fff00000c6808080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.403994] fff00000c6808100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.404277] ================================================================== <6>[ 16.406358] ok 52 mempool_kmalloc_large_invalid_free <3>[ 16.407362] ================================================================== <3>[ 16.408011] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x220/0x258 <3>[ 16.408398] Read of size 1 at addr ffff9f535145fd2d by task kunit_try_catch/227 <3>[ 16.408723] <3>[ 16.408837] CPU: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.409256] Hardware name: linux,dummy-virt (DT) <3>[ 16.409463] Call trace: <3>[ 16.409590] dump_backtrace+0x9c/0x128 <3>[ 16.409788] show_stack+0x20/0x38 <3>[ 16.410035] dump_stack_lvl+0x8c/0xd0 <3>[ 16.410264] print_report+0x2fc/0x5e0 <3>[ 16.410466] kasan_report+0xc8/0x118 <3>[ 16.410653] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.410878] kasan_global_oob_right+0x220/0x258 <3>[ 16.411104] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.411298] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.411637] kthread+0x24c/0x2d0 <3>[ 16.411889] ret_from_fork+0x10/0x20 <3>[ 16.412163] <3>[ 16.412356] The buggy address belongs to the variable: <3>[ 16.412665] global_array+0xd/0x40 <3>[ 16.412930] <3>[ 16.413152] The buggy address belongs to the virtual mapping at <3>[ 16.413152] [ffff9f534f890000, ffff9f5351511000) created by: <3>[ 16.413152] paging_init+0x668/0x7c8 <3>[ 16.413806] <3>[ 16.414090] The buggy address belongs to the physical page: <4>[ 16.414444] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4985f <4>[ 16.414885] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) <4>[ 16.415350] raw: 03fffe0000002000 ffffc1ffc02617c8 ffffc1ffc02617c8 0000000000000000 <4>[ 16.415828] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.416292] page dumped because: kasan: bad access detected <3>[ 16.416588] <3>[ 16.416688] Memory state around the buggy address: <3>[ 16.416886] ffff9f535145fc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.417157] ffff9f535145fc80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.417421] >ffff9f535145fd00: 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 <3>[ 16.417682] ^ <3>[ 16.417899] ffff9f535145fd80: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 <3>[ 16.418181] ffff9f535145fe00: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 <3>[ 16.418506] ================================================================== <6>[ 16.420793] ok 53 kasan_global_oob_right <6>[ 16.422789] ok 54 kasan_global_oob_left # SKIP Test requires CONFIG_CC_IS_CLANG=y <3>[ 16.423963] ================================================================== <3>[ 16.424680] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 <3>[ 16.425038] Read of size 1 at addr ffff800080ad7cba by task kunit_try_catch/231 <3>[ 16.425405] <3>[ 16.425601] CPU: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.426090] Hardware name: linux,dummy-virt (DT) <3>[ 16.426359] Call trace: <3>[ 16.426522] dump_backtrace+0x9c/0x128 <3>[ 16.426824] show_stack+0x20/0x38 <3>[ 16.427025] dump_stack_lvl+0x8c/0xd0 <3>[ 16.427264] print_report+0x2fc/0x5e0 <3>[ 16.427567] kasan_report+0xc8/0x118 <3>[ 16.427795] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.428080] kasan_stack_oob+0x238/0x270 <3>[ 16.428304] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.428548] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.428873] kthread+0x24c/0x2d0 <3>[ 16.429086] ret_from_fork+0x10/0x20 <3>[ 16.429318] <3>[ 16.429543] The buggy address belongs to stack of task kunit_try_catch/231 <3>[ 16.429950] and is located at offset 138 in frame: <3>[ 16.430277] kasan_stack_oob+0x0/0x270 <3>[ 16.430619] <3>[ 16.430742] This frame has 4 objects: <3>[ 16.431125] [48, 49) '__assertion' <3>[ 16.431179] [64, 72) 'array' <3>[ 16.431438] [96, 112) '__assertion' <3>[ 16.431642] [128, 138) 'stack_array' <3>[ 16.431968] <3>[ 16.432213] The buggy address belongs to the virtual mapping at <3>[ 16.432213] [ffff800080ad0000, ffff800080ad9000) created by: <3>[ 16.432213] kernel_clone+0x140/0x7b8 <3>[ 16.432749] <3>[ 16.432849] The buggy address belongs to the physical page: <4>[ 16.433060] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f0 <4>[ 16.433354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.433617] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.433925] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.434274] page dumped because: kasan: bad access detected <3>[ 16.434491] <3>[ 16.434588] Memory state around the buggy address: <3>[ 16.434775] ffff800080ad7b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.435042] ffff800080ad7c00: 00 00 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 <3>[ 16.435307] >ffff800080ad7c80: f2 f2 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 <3>[ 16.435558] ^ <3>[ 16.435754] ffff800080ad7d00: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 <3>[ 16.436017] ffff800080ad7d80: f2 f2 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 <3>[ 16.436273] ================================================================== <6>[ 16.438193] ok 55 kasan_stack_oob <3>[ 16.439165] ================================================================== <3>[ 16.439570] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2c0/0x318 <3>[ 16.439843] Read of size 1 at addr ffff800080ab7bdf by task kunit_try_catch/233 <3>[ 16.440100] <3>[ 16.440205] CPU: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.440573] Hardware name: linux,dummy-virt (DT) <3>[ 16.440755] Call trace: <3>[ 16.440876] dump_backtrace+0x9c/0x128 <3>[ 16.441049] show_stack+0x20/0x38 <3>[ 16.441209] dump_stack_lvl+0x8c/0xd0 <3>[ 16.441379] print_report+0x2fc/0x5e0 <3>[ 16.441556] kasan_report+0xc8/0x118 <3>[ 16.441726] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.442001] kasan_alloca_oob_left+0x2c0/0x318 <3>[ 16.442212] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.442425] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.442646] kthread+0x24c/0x2d0 <3>[ 16.442806] ret_from_fork+0x10/0x20 <3>[ 16.442967] <3>[ 16.443063] The buggy address belongs to stack of task kunit_try_catch/233 <3>[ 16.443335] <3>[ 16.443435] The buggy address belongs to the virtual mapping at <3>[ 16.443435] [ffff800080ab0000, ffff800080ab9000) created by: <3>[ 16.443435] kernel_clone+0x140/0x7b8 <3>[ 16.443956] <3>[ 16.444049] The buggy address belongs to the physical page: <4>[ 16.444296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065ad <4>[ 16.444659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.444922] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.445198] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.445474] page dumped because: kasan: bad access detected <3>[ 16.445686] <3>[ 16.445778] Memory state around the buggy address: <3>[ 16.446088] ffff800080ab7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.446365] ffff800080ab7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.446655] >ffff800080ab7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb <3>[ 16.446908] ^ <3>[ 16.447132] ffff800080ab7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 <3>[ 16.447384] ffff800080ab7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 <3>[ 16.447636] ================================================================== <6>[ 16.449414] ok 56 kasan_alloca_oob_left <3>[ 16.450365] ================================================================== <3>[ 16.450766] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2e4/0x348 <3>[ 16.451031] Read of size 1 at addr ffff800080ad7bea by task kunit_try_catch/235 <3>[ 16.451280] <3>[ 16.451372] CPU: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.451717] Hardware name: linux,dummy-virt (DT) <3>[ 16.451892] Call trace: <3>[ 16.452012] dump_backtrace+0x9c/0x128 <3>[ 16.452176] show_stack+0x20/0x38 <3>[ 16.452327] dump_stack_lvl+0x8c/0xd0 <3>[ 16.452491] print_report+0x2fc/0x5e0 <3>[ 16.452649] kasan_report+0xc8/0x118 <3>[ 16.452806] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.452992] kasan_alloca_oob_right+0x2e4/0x348 <3>[ 16.453204] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.453386] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.453622] kthread+0x24c/0x2d0 <3>[ 16.453789] ret_from_fork+0x10/0x20 <3>[ 16.454015] <3>[ 16.454121] The buggy address belongs to stack of task kunit_try_catch/235 <3>[ 16.454445] <3>[ 16.454564] The buggy address belongs to the virtual mapping at <3>[ 16.454564] [ffff800080ad0000, ffff800080ad9000) created by: <3>[ 16.454564] kernel_clone+0x140/0x7b8 <3>[ 16.455108] <3>[ 16.455221] The buggy address belongs to the physical page: <4>[ 16.455453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065f0 <4>[ 16.455773] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.456066] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 <4>[ 16.456363] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 16.456653] page dumped because: kasan: bad access detected <3>[ 16.456965] <3>[ 16.457062] Memory state around the buggy address: <3>[ 16.457254] ffff800080ad7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.457521] ffff800080ad7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 16.457788] >ffff800080ad7b80: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb <3>[ 16.458226] ^ <3>[ 16.458495] ffff800080ad7c00: cb cb cb cb 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 <3>[ 16.458804] ffff800080ad7c80: 04 f2 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 <3>[ 16.459068] ================================================================== <6>[ 16.460740] ok 57 kasan_alloca_oob_right <3>[ 16.461632] ================================================================== <3>[ 16.462162] BUG: KASAN: slab-out-of-bounds in memchr+0x78/0x88 <3>[ 16.462433] Read of size 1 at addr fff00000c65a4ad8 by task kunit_try_catch/237 <3>[ 16.462721] <3>[ 16.462822] CPU: 1 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.463279] Hardware name: linux,dummy-virt (DT) <3>[ 16.463468] Call trace: <3>[ 16.463593] dump_backtrace+0x9c/0x128 <3>[ 16.463766] show_stack+0x20/0x38 <3>[ 16.463923] dump_stack_lvl+0x8c/0xd0 <3>[ 16.464087] print_report+0x118/0x5e0 <3>[ 16.464254] kasan_report+0xc8/0x118 <3>[ 16.464414] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.464613] memchr+0x78/0x88 <3>[ 16.464758] kasan_memchr+0x150/0x2f0 <3>[ 16.464933] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.465118] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.465409] kthread+0x24c/0x2d0 <3>[ 16.465617] ret_from_fork+0x10/0x20 <3>[ 16.465842] <3>[ 16.466021] Allocated by task 237: <4>[ 16.466257] kasan_save_stack+0x3c/0x68 <4>[ 16.466499] kasan_save_track+0x20/0x40 <4>[ 16.466727] kasan_save_alloc_info+0x40/0x58 <4>[ 16.466987] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.467204] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.467448] kasan_memchr+0xb0/0x2f0 <4>[ 16.467669] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.467926] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.468196] kthread+0x24c/0x2d0 <4>[ 16.468389] ret_from_fork+0x10/0x20 <3>[ 16.468598] <3>[ 16.468722] The buggy address belongs to the object at fff00000c65a4ac0 <3>[ 16.468722] which belongs to the cache kmalloc-32 of size 32 <3>[ 16.469288] The buggy address is located 0 bytes to the right of <3>[ 16.469288] allocated 24-byte region [fff00000c65a4ac0, fff00000c65a4ad8) <3>[ 16.469917] <3>[ 16.470065] The buggy address belongs to the physical page: <4>[ 16.470368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 <4>[ 16.470775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.471024] page_type: 0xffffefff(slab) <4>[ 16.471253] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 16.471569] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 16.471942] page dumped because: kasan: bad access detected <3>[ 16.472221] <3>[ 16.472351] Memory state around the buggy address: <3>[ 16.472623] fff00000c65a4980: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 16.473011] fff00000c65a4a00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 16.473337] >fff00000c65a4a80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 16.473593] ^ <3>[ 16.473825] fff00000c65a4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.474165] fff00000c65a4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.474447] ================================================================== <6>[ 16.476064] ok 58 kasan_memchr <3>[ 16.477006] ================================================================== <3>[ 16.477520] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 <3>[ 16.477864] Read of size 1 at addr fff00000c5655e18 by task kunit_try_catch/239 <3>[ 16.478314] <3>[ 16.478457] CPU: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.479056] Hardware name: linux,dummy-virt (DT) <3>[ 16.479307] Call trace: <3>[ 16.479470] dump_backtrace+0x9c/0x128 <3>[ 16.479778] show_stack+0x20/0x38 <3>[ 16.479983] dump_stack_lvl+0x8c/0xd0 <3>[ 16.480215] print_report+0x118/0x5e0 <3>[ 16.480454] kasan_report+0xc8/0x118 <3>[ 16.480757] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.481039] memcmp+0x198/0x1d8 <3>[ 16.481231] kasan_memcmp+0x170/0x310 <3>[ 16.481470] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.481812] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.482221] kthread+0x24c/0x2d0 <3>[ 16.482449] ret_from_fork+0x10/0x20 <3>[ 16.482679] <3>[ 16.482874] Allocated by task 239: <4>[ 16.483094] kasan_save_stack+0x3c/0x68 <4>[ 16.483332] kasan_save_track+0x20/0x40 <4>[ 16.483650] kasan_save_alloc_info+0x40/0x58 <4>[ 16.483914] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.484178] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.484459] kasan_memcmp+0xbc/0x310 <4>[ 16.484681] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.484942] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.485275] kthread+0x24c/0x2d0 <4>[ 16.485473] ret_from_fork+0x10/0x20 <3>[ 16.485770] <3>[ 16.485958] The buggy address belongs to the object at fff00000c5655e00 <3>[ 16.485958] which belongs to the cache kmalloc-32 of size 32 <3>[ 16.486619] The buggy address is located 0 bytes to the right of <3>[ 16.486619] allocated 24-byte region [fff00000c5655e00, fff00000c5655e18) <3>[ 16.487228] <3>[ 16.487421] The buggy address belongs to the physical page: <4>[ 16.487715] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105655 <4>[ 16.488148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.488527] page_type: 0xffffefff(slab) <4>[ 16.488761] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 16.489192] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 16.489598] page dumped because: kasan: bad access detected <3>[ 16.489899] <3>[ 16.490005] Memory state around the buggy address: <3>[ 16.490362] fff00000c5655d00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 16.490727] fff00000c5655d80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc <3>[ 16.491097] >fff00000c5655e00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.491462] ^ <3>[ 16.491697] fff00000c5655e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.492087] fff00000c5655f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.492464] ================================================================== <6>[ 16.494598] ok 59 kasan_memcmp <3>[ 16.495659] ================================================================== <3>[ 16.496064] BUG: KASAN: slab-use-after-free in strchr+0xcc/0xd8 <3>[ 16.496441] Read of size 1 at addr fff00000c65a4bd0 by task kunit_try_catch/241 <3>[ 16.496808] <3>[ 16.497007] CPU: 1 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.497452] Hardware name: linux,dummy-virt (DT) <3>[ 16.497686] Call trace: <3>[ 16.497886] dump_backtrace+0x9c/0x128 <3>[ 16.498143] show_stack+0x20/0x38 <3>[ 16.498344] dump_stack_lvl+0x8c/0xd0 <3>[ 16.498600] print_report+0x118/0x5e0 <3>[ 16.498834] kasan_report+0xc8/0x118 <3>[ 16.499072] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.499343] strchr+0xcc/0xd8 <3>[ 16.499556] kasan_strings+0x18c/0x938 <3>[ 16.499797] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.500056] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.500334] kthread+0x24c/0x2d0 <3>[ 16.500547] ret_from_fork+0x10/0x20 <3>[ 16.500790] <3>[ 16.500938] Allocated by task 241: <4>[ 16.501172] kasan_save_stack+0x3c/0x68 <4>[ 16.501423] kasan_save_track+0x20/0x40 <4>[ 16.501769] kasan_save_alloc_info+0x40/0x58 <4>[ 16.502119] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.502378] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.502672] kasan_strings+0xb0/0x938 <4>[ 16.502900] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.503145] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.503423] kthread+0x24c/0x2d0 <4>[ 16.503633] ret_from_fork+0x10/0x20 <3>[ 16.503856] <3>[ 16.503983] Freed by task 241: <4>[ 16.504207] kasan_save_stack+0x3c/0x68 <4>[ 16.504439] kasan_save_track+0x20/0x40 <4>[ 16.504666] kasan_save_free_info+0x4c/0x78 <4>[ 16.504904] __kasan_slab_free+0x118/0x188 <4>[ 16.505141] kfree+0xec/0x2f0 <4>[ 16.505344] kasan_strings+0x128/0x938 <4>[ 16.505569] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.505806] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.506154] kthread+0x24c/0x2d0 <4>[ 16.506415] ret_from_fork+0x10/0x20 <3>[ 16.506647] <3>[ 16.506802] The buggy address belongs to the object at fff00000c65a4bc0 <3>[ 16.506802] which belongs to the cache kmalloc-32 of size 32 <3>[ 16.507365] The buggy address is located 16 bytes inside of <3>[ 16.507365] freed 32-byte region [fff00000c65a4bc0, fff00000c65a4be0) <3>[ 16.507913] <3>[ 16.508069] The buggy address belongs to the physical page: <4>[ 16.508356] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 <4>[ 16.508713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.509031] page_type: 0xffffefff(slab) <4>[ 16.509267] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 16.509623] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 16.510028] page dumped because: kasan: bad access detected <3>[ 16.510338] <3>[ 16.510470] Memory state around the buggy address: <3>[ 16.510759] fff00000c65a4a80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.511093] fff00000c65a4b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 16.511423] >fff00000c65a4b80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.511748] ^ <3>[ 16.512037] fff00000c65a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.512366] fff00000c65a4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.512676] ================================================================== <3>[ 16.513462] ================================================================== <3>[ 16.513841] BUG: KASAN: slab-use-after-free in strrchr+0x6c/0x78 <3>[ 16.514176] Read of size 1 at addr fff00000c65a4bd0 by task kunit_try_catch/241 <3>[ 16.514568] <3>[ 16.514746] CPU: 1 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.515181] Hardware name: linux,dummy-virt (DT) <3>[ 16.515424] Call trace: <3>[ 16.515611] dump_backtrace+0x9c/0x128 <3>[ 16.515844] show_stack+0x20/0x38 <3>[ 16.516022] dump_stack_lvl+0x8c/0xd0 <3>[ 16.516287] print_report+0x118/0x5e0 <3>[ 16.516522] kasan_report+0xc8/0x118 <3>[ 16.516748] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.517007] strrchr+0x6c/0x78 <3>[ 16.517217] kasan_strings+0x1f0/0x938 <3>[ 16.517446] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.517689] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.518017] kthread+0x24c/0x2d0 <3>[ 16.518240] ret_from_fork+0x10/0x20 <3>[ 16.518473] <3>[ 16.518626] Allocated by task 241: <4>[ 16.518833] kasan_save_stack+0x3c/0x68 <4>[ 16.519079] kasan_save_track+0x20/0x40 <4>[ 16.519318] kasan_save_alloc_info+0x40/0x58 <4>[ 16.519569] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.519803] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.520049] kasan_strings+0xb0/0x938 <4>[ 16.520274] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.520517] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.520802] kthread+0x24c/0x2d0 <4>[ 16.521019] ret_from_fork+0x10/0x20 <3>[ 16.521270] <3>[ 16.521420] Freed by task 241: <4>[ 16.521618] kasan_save_stack+0x3c/0x68 <4>[ 16.521904] kasan_save_track+0x20/0x40 <4>[ 16.522114] kasan_save_free_info+0x4c/0x78 <4>[ 16.522403] __kasan_slab_free+0x118/0x188 <4>[ 16.522647] kfree+0xec/0x2f0 <4>[ 16.522869] kasan_strings+0x128/0x938 <4>[ 16.523097] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.523340] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.523620] kthread+0x24c/0x2d0 <4>[ 16.523831] ret_from_fork+0x10/0x20 <3>[ 16.524054] <3>[ 16.524189] The buggy address belongs to the object at fff00000c65a4bc0 <3>[ 16.524189] which belongs to the cache kmalloc-32 of size 32 <3>[ 16.524742] The buggy address is located 16 bytes inside of <3>[ 16.524742] freed 32-byte region [fff00000c65a4bc0, fff00000c65a4be0) <3>[ 16.525257] <3>[ 16.525413] The buggy address belongs to the physical page: <4>[ 16.525683] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 <4>[ 16.526085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.526416] page_type: 0xffffefff(slab) <4>[ 16.526659] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 16.527010] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 16.527350] page dumped because: kasan: bad access detected <3>[ 16.527615] <3>[ 16.527761] Memory state around the buggy address: <3>[ 16.528011] fff00000c65a4a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.528332] fff00000c65a4b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 16.528649] >fff00000c65a4b80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.528961] ^ <3>[ 16.529237] fff00000c65a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.529560] fff00000c65a4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.529887] ================================================================== <3>[ 16.530400] ================================================================== <3>[ 16.530785] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 <3>[ 16.531106] Read of size 1 at addr fff00000c65a4bd0 by task kunit_try_catch/241 <3>[ 16.531469] <3>[ 16.531667] CPU: 1 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.532074] Hardware name: linux,dummy-virt (DT) <3>[ 16.532306] Call trace: <3>[ 16.532483] dump_backtrace+0x9c/0x128 <3>[ 16.532714] show_stack+0x20/0x38 <3>[ 16.532933] dump_stack_lvl+0x8c/0xd0 <3>[ 16.533160] print_report+0x118/0x5e0 <3>[ 16.533391] kasan_report+0xc8/0x118 <3>[ 16.533620] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.533924] strcmp+0xc0/0xc8 <3>[ 16.534100] kasan_strings+0x254/0x938 <3>[ 16.534405] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.534656] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.534938] kthread+0x24c/0x2d0 <3>[ 16.535150] ret_from_fork+0x10/0x20 <3>[ 16.535367] <3>[ 16.535511] Allocated by task 241: <4>[ 16.535706] kasan_save_stack+0x3c/0x68 <4>[ 16.535961] kasan_save_track+0x20/0x40 <4>[ 16.536183] kasan_save_alloc_info+0x40/0x58 <4>[ 16.536449] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.536680] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.536930] kasan_strings+0xb0/0x938 <4>[ 16.537154] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.537395] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.537661] kthread+0x24c/0x2d0 <4>[ 16.537917] ret_from_fork+0x10/0x20 <3>[ 16.538140] <3>[ 16.538293] Freed by task 241: <4>[ 16.538474] kasan_save_stack+0x3c/0x68 <4>[ 16.538714] kasan_save_track+0x20/0x40 <4>[ 16.538939] kasan_save_free_info+0x4c/0x78 <4>[ 16.539171] __kasan_slab_free+0x118/0x188 <4>[ 16.539403] kfree+0xec/0x2f0 <4>[ 16.539606] kasan_strings+0x128/0x938 <4>[ 16.539827] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.540060] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.540326] kthread+0x24c/0x2d0 <4>[ 16.540536] ret_from_fork+0x10/0x20 <3>[ 16.540746] <3>[ 16.540871] The buggy address belongs to the object at fff00000c65a4bc0 <3>[ 16.540871] which belongs to the cache kmalloc-32 of size 32 <3>[ 16.541398] The buggy address is located 16 bytes inside of <3>[ 16.541398] freed 32-byte region [fff00000c65a4bc0, fff00000c65a4be0) <3>[ 16.541920] <3>[ 16.542060] The buggy address belongs to the physical page: <4>[ 16.542361] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 <4>[ 16.542691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.542981] page_type: 0xffffefff(slab) <4>[ 16.543204] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 16.543538] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 16.543858] page dumped because: kasan: bad access detected <3>[ 16.544115] <3>[ 16.544263] Memory state around the buggy address: <3>[ 16.544502] fff00000c65a4a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.544816] fff00000c65a4b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 16.545123] >fff00000c65a4b80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.545434] ^ <3>[ 16.545708] fff00000c65a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.546110] fff00000c65a4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.546429] ================================================================== <3>[ 16.546961] ================================================================== <3>[ 16.547359] BUG: KASAN: slab-use-after-free in kasan_strings+0x894/0x938 <3>[ 16.547657] Read of size 1 at addr fff00000c65a4bd0 by task kunit_try_catch/241 <3>[ 16.548006] <3>[ 16.548183] CPU: 1 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.548564] Hardware name: linux,dummy-virt (DT) <3>[ 16.548790] Call trace: <3>[ 16.548960] dump_backtrace+0x9c/0x128 <3>[ 16.549193] show_stack+0x20/0x38 <3>[ 16.549406] dump_stack_lvl+0x8c/0xd0 <3>[ 16.549636] print_report+0x118/0x5e0 <3>[ 16.549891] kasan_report+0xc8/0x118 <3>[ 16.550094] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.550407] kasan_strings+0x894/0x938 <3>[ 16.550638] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.550888] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.551166] kthread+0x24c/0x2d0 <3>[ 16.551382] ret_from_fork+0x10/0x20 <3>[ 16.551604] <3>[ 16.551758] Allocated by task 241: <4>[ 16.551961] kasan_save_stack+0x3c/0x68 <4>[ 16.552208] kasan_save_track+0x20/0x40 <4>[ 16.552435] kasan_save_alloc_info+0x40/0x58 <4>[ 16.552678] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.552902] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.553152] kasan_strings+0xb0/0x938 <4>[ 16.553372] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.553607] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.553932] kthread+0x24c/0x2d0 <4>[ 16.554214] ret_from_fork+0x10/0x20 <3>[ 16.554439] <3>[ 16.554541] Freed by task 241: <4>[ 16.554738] kasan_save_stack+0x3c/0x68 <4>[ 16.555002] kasan_save_track+0x20/0x40 <4>[ 16.555230] kasan_save_free_info+0x4c/0x78 <4>[ 16.555469] __kasan_slab_free+0x118/0x188 <4>[ 16.555705] kfree+0xec/0x2f0 <4>[ 16.555920] kasan_strings+0x128/0x938 <4>[ 16.556144] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.556373] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.556636] kthread+0x24c/0x2d0 <4>[ 16.556840] ret_from_fork+0x10/0x20 <3>[ 16.557052] <3>[ 16.557180] The buggy address belongs to the object at fff00000c65a4bc0 <3>[ 16.557180] which belongs to the cache kmalloc-32 of size 32 <3>[ 16.557716] The buggy address is located 16 bytes inside of <3>[ 16.557716] freed 32-byte region [fff00000c65a4bc0, fff00000c65a4be0) <3>[ 16.558410] <3>[ 16.558588] The buggy address belongs to the physical page: <4>[ 16.558842] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 <4>[ 16.559188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.559489] page_type: 0xffffefff(slab) <4>[ 16.559728] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 16.560069] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 16.560406] page dumped because: kasan: bad access detected <3>[ 16.560670] <3>[ 16.560819] Memory state around the buggy address: <3>[ 16.561077] fff00000c65a4a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.561409] fff00000c65a4b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 16.561740] >fff00000c65a4b80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.562225] ^ <3>[ 16.562511] fff00000c65a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.562836] fff00000c65a4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.563152] ================================================================== <3>[ 16.563701] ================================================================== <3>[ 16.564109] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 <3>[ 16.564392] Read of size 1 at addr fff00000c65a4bd0 by task kunit_try_catch/241 <3>[ 16.564745] <3>[ 16.564934] CPU: 1 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.565362] Hardware name: linux,dummy-virt (DT) <3>[ 16.565605] Call trace: <3>[ 16.565777] dump_backtrace+0x9c/0x128 <3>[ 16.566063] show_stack+0x20/0x38 <3>[ 16.566294] dump_stack_lvl+0x8c/0xd0 <3>[ 16.566526] print_report+0x118/0x5e0 <3>[ 16.566757] kasan_report+0xc8/0x118 <3>[ 16.566982] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.567247] strlen+0xa8/0xb0 <3>[ 16.567453] kasan_strings+0x334/0x938 <3>[ 16.567688] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.567936] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.568222] kthread+0x24c/0x2d0 <3>[ 16.568450] ret_from_fork+0x10/0x20 <3>[ 16.568682] <3>[ 16.568833] Allocated by task 241: <4>[ 16.569039] kasan_save_stack+0x3c/0x68 <4>[ 16.569302] kasan_save_track+0x20/0x40 <4>[ 16.569539] kasan_save_alloc_info+0x40/0x58 <4>[ 16.569827] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.570107] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.570367] kasan_strings+0xb0/0x938 <4>[ 16.570595] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.570844] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.571126] kthread+0x24c/0x2d0 <4>[ 16.571341] ret_from_fork+0x10/0x20 <3>[ 16.571566] <3>[ 16.571711] Freed by task 241: <4>[ 16.571928] kasan_save_stack+0x3c/0x68 <4>[ 16.572163] kasan_save_track+0x20/0x40 <4>[ 16.572394] kasan_save_free_info+0x4c/0x78 <4>[ 16.572634] __kasan_slab_free+0x118/0x188 <4>[ 16.572877] kfree+0xec/0x2f0 <4>[ 16.573084] kasan_strings+0x128/0x938 <4>[ 16.573313] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.573553] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.573833] kthread+0x24c/0x2d0 <4>[ 16.574133] ret_from_fork+0x10/0x20 <3>[ 16.574348] <3>[ 16.574522] The buggy address belongs to the object at fff00000c65a4bc0 <3>[ 16.574522] which belongs to the cache kmalloc-32 of size 32 <3>[ 16.575032] The buggy address is located 16 bytes inside of <3>[ 16.575032] freed 32-byte region [fff00000c65a4bc0, fff00000c65a4be0) <3>[ 16.575553] <3>[ 16.575705] The buggy address belongs to the physical page: <4>[ 16.575967] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 <4>[ 16.576318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.576626] page_type: 0xffffefff(slab) <4>[ 16.576862] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 16.577203] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 16.577531] page dumped because: kasan: bad access detected <3>[ 16.577792] <3>[ 16.577966] Memory state around the buggy address: <3>[ 16.578255] fff00000c65a4a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.578578] fff00000c65a4b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 16.578912] >fff00000c65a4b80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.579231] ^ <3>[ 16.579512] fff00000c65a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.579846] fff00000c65a4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.580162] ================================================================== <3>[ 16.580645] ================================================================== <3>[ 16.581024] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 <3>[ 16.581348] Read of size 1 at addr fff00000c65a4bd0 by task kunit_try_catch/241 <3>[ 16.581705] <3>[ 16.581918] CPU: 1 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.582385] Hardware name: linux,dummy-virt (DT) <3>[ 16.582630] Call trace: <3>[ 16.582811] dump_backtrace+0x9c/0x128 <3>[ 16.583056] show_stack+0x20/0x38 <3>[ 16.583279] dump_stack_lvl+0x8c/0xd0 <3>[ 16.583523] print_report+0x118/0x5e0 <3>[ 16.583764] kasan_report+0xc8/0x118 <3>[ 16.584000] __asan_report_load1_noabort+0x20/0x30 <3>[ 16.584265] strnlen+0x80/0x88 <3>[ 16.584481] kasan_strings+0x398/0x938 <3>[ 16.584716] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.584965] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.585256] kthread+0x24c/0x2d0 <3>[ 16.585476] ret_from_fork+0x10/0x20 <3>[ 16.585708] <3>[ 16.585870] Allocated by task 241: <4>[ 16.586132] kasan_save_stack+0x3c/0x68 <4>[ 16.586373] kasan_save_track+0x20/0x40 <4>[ 16.586609] kasan_save_alloc_info+0x40/0x58 <4>[ 16.586855] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.587086] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.587347] kasan_strings+0xb0/0x938 <4>[ 16.587580] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.587823] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.588100] kthread+0x24c/0x2d0 <4>[ 16.588312] ret_from_fork+0x10/0x20 <3>[ 16.588535] <3>[ 16.588679] Freed by task 241: <4>[ 16.588894] kasan_save_stack+0x3c/0x68 <4>[ 16.589126] kasan_save_track+0x20/0x40 <4>[ 16.589361] kasan_save_free_info+0x4c/0x78 <4>[ 16.589599] __kasan_slab_free+0x118/0x188 <4>[ 16.589835] kfree+0xec/0x2f0 <4>[ 16.590090] kasan_strings+0x128/0x938 <4>[ 16.590277] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.590556] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.590832] kthread+0x24c/0x2d0 <4>[ 16.591042] ret_from_fork+0x10/0x20 <3>[ 16.591265] <3>[ 16.591413] The buggy address belongs to the object at fff00000c65a4bc0 <3>[ 16.591413] which belongs to the cache kmalloc-32 of size 32 <3>[ 16.591941] The buggy address is located 16 bytes inside of <3>[ 16.591941] freed 32-byte region [fff00000c65a4bc0, fff00000c65a4be0) <3>[ 16.592450] <3>[ 16.592607] The buggy address belongs to the physical page: <4>[ 16.592881] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065a4 <4>[ 16.593230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.593543] page_type: 0xffffefff(slab) <4>[ 16.593775] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 <4>[ 16.594199] raw: 0000000000000000 0000000080400040 00000001ffffefff 0000000000000000 <4>[ 16.594558] page dumped because: kasan: bad access detected <3>[ 16.594829] <3>[ 16.594982] Memory state around the buggy address: <3>[ 16.595234] fff00000c65a4a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.595556] fff00000c65a4b00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc <3>[ 16.595877] >fff00000c65a4b80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc <3>[ 16.596192] ^ <3>[ 16.596475] fff00000c65a4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.596797] fff00000c65a4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.597112] ================================================================== <6>[ 16.599643] ok 60 kasan_strings <3>[ 16.601090] ================================================================== <3>[ 16.602061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x104/0xbf8 <3>[ 16.602859] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.603548] <3>[ 16.603798] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.604616] Hardware name: linux,dummy-virt (DT) <3>[ 16.605088] Call trace: <3>[ 16.605401] dump_backtrace+0x9c/0x128 <3>[ 16.605812] show_stack+0x20/0x38 <3>[ 16.606251] dump_stack_lvl+0x8c/0xd0 <3>[ 16.606659] print_report+0x118/0x5e0 <3>[ 16.607063] kasan_report+0xc8/0x118 <3>[ 16.607461] kasan_check_range+0x100/0x1a8 <3>[ 16.607925] __kasan_check_write+0x20/0x30 <3>[ 16.608388] kasan_bitops_modify.constprop.0+0x104/0xbf8 <3>[ 16.608927] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.609414] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.609928] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.610566] kthread+0x24c/0x2d0 <3>[ 16.611000] ret_from_fork+0x10/0x20 <3>[ 16.611512] <3>[ 16.611881] Allocated by task 243: <4>[ 16.612405] kasan_save_stack+0x3c/0x68 <4>[ 16.613019] kasan_save_track+0x20/0x40 <4>[ 16.613617] kasan_save_alloc_info+0x40/0x58 <4>[ 16.614386] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.614978] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.615600] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.616179] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.616841] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.617607] kthread+0x24c/0x2d0 <4>[ 16.618312] ret_from_fork+0x10/0x20 <3>[ 16.618978] <3>[ 16.619378] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.619378] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.620935] The buggy address is located 8 bytes inside of <3>[ 16.620935] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.622189] <3>[ 16.622455] The buggy address belongs to the physical page: <4>[ 16.622944] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.623602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.624157] page_type: 0xffffefff(slab) <4>[ 16.624551] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.625170] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.625781] page dumped because: kasan: bad access detected <3>[ 16.626353] <3>[ 16.626562] Memory state around the buggy address: <3>[ 16.626980] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.627574] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.628146] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.628714] ^ <3>[ 16.629462] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.630090] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.630791] ================================================================== <3>[ 16.632166] ================================================================== <3>[ 16.632750] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbf8 <3>[ 16.633375] Read of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.634048] <3>[ 16.634313] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.635356] Hardware name: linux,dummy-virt (DT) <3>[ 16.635769] Call trace: <3>[ 16.636052] dump_backtrace+0x9c/0x128 <3>[ 16.636459] show_stack+0x20/0x38 <3>[ 16.636826] dump_stack_lvl+0x8c/0xd0 <3>[ 16.637223] print_report+0x118/0x5e0 <3>[ 16.637604] kasan_report+0xc8/0x118 <3>[ 16.638060] __asan_report_load8_noabort+0x20/0x30 <3>[ 16.638535] kasan_bitops_modify.constprop.0+0xa80/0xbf8 <3>[ 16.639019] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.639444] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.639845] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.640329] kthread+0x24c/0x2d0 <3>[ 16.640684] ret_from_fork+0x10/0x20 <3>[ 16.641082] <3>[ 16.641331] Allocated by task 243: <4>[ 16.641691] kasan_save_stack+0x3c/0x68 <4>[ 16.642167] kasan_save_track+0x20/0x40 <4>[ 16.642541] kasan_save_alloc_info+0x40/0x58 <4>[ 16.642888] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.643200] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.643544] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.643883] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.644216] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.644615] kthread+0x24c/0x2d0 <4>[ 16.644896] ret_from_fork+0x10/0x20 <3>[ 16.645197] <3>[ 16.645384] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.645384] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.646223] The buggy address is located 8 bytes inside of <3>[ 16.646223] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.646977] <3>[ 16.647167] The buggy address belongs to the physical page: <4>[ 16.647559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.648087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.648532] page_type: 0xffffefff(slab) <4>[ 16.648851] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.649374] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.649970] page dumped because: kasan: bad access detected <3>[ 16.650466] <3>[ 16.650698] Memory state around the buggy address: <3>[ 16.651097] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.651604] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.652080] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.652596] ^ <3>[ 16.653096] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.653639] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.654255] ================================================================== <3>[ 16.655442] ================================================================== <3>[ 16.655945] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1e4/0xbf8 <3>[ 16.656516] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.657061] <3>[ 16.657279] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.657975] Hardware name: linux,dummy-virt (DT) <3>[ 16.658372] Call trace: <3>[ 16.658608] dump_backtrace+0x9c/0x128 <3>[ 16.658973] show_stack+0x20/0x38 <3>[ 16.659268] dump_stack_lvl+0x8c/0xd0 <3>[ 16.659594] print_report+0x118/0x5e0 <3>[ 16.659948] kasan_report+0xc8/0x118 <3>[ 16.660284] kasan_check_range+0x100/0x1a8 <3>[ 16.660647] __kasan_check_write+0x20/0x30 <3>[ 16.660972] kasan_bitops_modify.constprop.0+0x1e4/0xbf8 <3>[ 16.661361] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.661706] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.662169] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.662653] kthread+0x24c/0x2d0 <3>[ 16.662966] ret_from_fork+0x10/0x20 <3>[ 16.663299] <3>[ 16.663492] Allocated by task 243: <4>[ 16.663796] kasan_save_stack+0x3c/0x68 <4>[ 16.664154] kasan_save_track+0x20/0x40 <4>[ 16.664483] kasan_save_alloc_info+0x40/0x58 <4>[ 16.664849] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.665169] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.665520] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.665896] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.666317] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.666590] kthread+0x24c/0x2d0 <4>[ 16.666761] ret_from_fork+0x10/0x20 <3>[ 16.666944] <3>[ 16.667051] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.667051] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.667511] The buggy address is located 8 bytes inside of <3>[ 16.667511] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.667944] <3>[ 16.668051] The buggy address belongs to the physical page: <4>[ 16.668284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.668583] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.668870] page_type: 0xffffefff(slab) <4>[ 16.669068] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.669368] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.669652] page dumped because: kasan: bad access detected <3>[ 16.669918] <3>[ 16.670080] Memory state around the buggy address: <3>[ 16.670354] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.670635] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.670913] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.671174] ^ <3>[ 16.671435] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.671715] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.671989] ================================================================== <3>[ 16.672431] ================================================================== <3>[ 16.672709] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xabc/0xbf8 <3>[ 16.673026] Read of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.673305] <3>[ 16.673413] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.673784] Hardware name: linux,dummy-virt (DT) <3>[ 16.674035] Call trace: <3>[ 16.674220] dump_backtrace+0x9c/0x128 <3>[ 16.674431] show_stack+0x20/0x38 <3>[ 16.674607] dump_stack_lvl+0x8c/0xd0 <3>[ 16.674806] print_report+0x118/0x5e0 <3>[ 16.675017] kasan_report+0xc8/0x118 <3>[ 16.675223] __asan_report_load8_noabort+0x20/0x30 <3>[ 16.675462] kasan_bitops_modify.constprop.0+0xabc/0xbf8 <3>[ 16.675694] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.675899] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.676098] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.676336] kthread+0x24c/0x2d0 <3>[ 16.676517] ret_from_fork+0x10/0x20 <3>[ 16.676705] <3>[ 16.676812] Allocated by task 243: <4>[ 16.676984] kasan_save_stack+0x3c/0x68 <4>[ 16.677175] kasan_save_track+0x20/0x40 <4>[ 16.677355] kasan_save_alloc_info+0x40/0x58 <4>[ 16.677562] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.677751] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.678006] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.678242] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.678448] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.678687] kthread+0x24c/0x2d0 <4>[ 16.678853] ret_from_fork+0x10/0x20 <3>[ 16.679033] <3>[ 16.679140] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.679140] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.679571] The buggy address is located 8 bytes inside of <3>[ 16.679571] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.680026] <3>[ 16.680139] The buggy address belongs to the physical page: <4>[ 16.680390] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.680683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.680946] page_type: 0xffffefff(slab) <4>[ 16.681142] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.681454] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.681752] page dumped because: kasan: bad access detected <3>[ 16.682091] <3>[ 16.682248] Memory state around the buggy address: <3>[ 16.682480] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.682766] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.683050] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.683342] ^ <3>[ 16.683627] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.683914] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.684207] ================================================================== <3>[ 16.684938] ================================================================== <3>[ 16.685264] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2c4/0xbf8 <3>[ 16.685570] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.685913] <3>[ 16.686055] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.686564] Hardware name: linux,dummy-virt (DT) <3>[ 16.686768] Call trace: <3>[ 16.686893] dump_backtrace+0x9c/0x128 <3>[ 16.687078] show_stack+0x20/0x38 <3>[ 16.687256] dump_stack_lvl+0x8c/0xd0 <3>[ 16.687436] print_report+0x118/0x5e0 <3>[ 16.687630] kasan_report+0xc8/0x118 <3>[ 16.687805] kasan_check_range+0x100/0x1a8 <3>[ 16.687996] __kasan_check_write+0x20/0x30 <3>[ 16.688203] kasan_bitops_modify.constprop.0+0x2c4/0xbf8 <3>[ 16.688437] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.688639] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.688831] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.689053] kthread+0x24c/0x2d0 <3>[ 16.689218] ret_from_fork+0x10/0x20 <3>[ 16.689391] <3>[ 16.689497] Allocated by task 243: <4>[ 16.689677] kasan_save_stack+0x3c/0x68 <4>[ 16.689938] kasan_save_track+0x20/0x40 <4>[ 16.690208] kasan_save_alloc_info+0x40/0x58 <4>[ 16.690414] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.690605] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.690806] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.691009] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.691203] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.691447] kthread+0x24c/0x2d0 <4>[ 16.691613] ret_from_fork+0x10/0x20 <3>[ 16.691801] <3>[ 16.691902] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.691902] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.692323] The buggy address is located 8 bytes inside of <3>[ 16.692323] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.692750] <3>[ 16.692860] The buggy address belongs to the physical page: <4>[ 16.693085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.693389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.693651] page_type: 0xffffefff(slab) <4>[ 16.693844] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.694241] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.694540] page dumped because: kasan: bad access detected <3>[ 16.694771] <3>[ 16.694886] Memory state around the buggy address: <3>[ 16.695114] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.695412] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.695706] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.696004] ^ <3>[ 16.696273] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.696566] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.696844] ================================================================== <3>[ 16.697291] ================================================================== <3>[ 16.697572] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x334/0xbf8 <3>[ 16.697951] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.698360] <3>[ 16.698468] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.698835] Hardware name: linux,dummy-virt (DT) <3>[ 16.699023] Call trace: <3>[ 16.699149] dump_backtrace+0x9c/0x128 <3>[ 16.699323] show_stack+0x20/0x38 <3>[ 16.699483] dump_stack_lvl+0x8c/0xd0 <3>[ 16.699657] print_report+0x118/0x5e0 <3>[ 16.699846] kasan_report+0xc8/0x118 <3>[ 16.700017] kasan_check_range+0x100/0x1a8 <3>[ 16.700216] __kasan_check_write+0x20/0x30 <3>[ 16.700400] kasan_bitops_modify.constprop.0+0x334/0xbf8 <3>[ 16.700616] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.700805] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.700994] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.701220] kthread+0x24c/0x2d0 <3>[ 16.701377] ret_from_fork+0x10/0x20 <3>[ 16.701544] <3>[ 16.701639] Allocated by task 243: <4>[ 16.701803] kasan_save_stack+0x3c/0x68 <4>[ 16.702062] kasan_save_track+0x20/0x40 <4>[ 16.702318] kasan_save_alloc_info+0x40/0x58 <4>[ 16.702539] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.702738] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.702951] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.703167] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.703366] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.703612] kthread+0x24c/0x2d0 <4>[ 16.703778] ret_from_fork+0x10/0x20 <3>[ 16.703967] <3>[ 16.704070] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.704070] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.704501] The buggy address is located 8 bytes inside of <3>[ 16.704501] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.704932] <3>[ 16.705044] The buggy address belongs to the physical page: <4>[ 16.705282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.705582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.705857] page_type: 0xffffefff(slab) <4>[ 16.706109] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.706517] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.706790] page dumped because: kasan: bad access detected <3>[ 16.707022] <3>[ 16.707123] Memory state around the buggy address: <3>[ 16.707331] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.707631] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.707912] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.708189] ^ <3>[ 16.708452] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.708743] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.709021] ================================================================== <3>[ 16.709514] ================================================================== <3>[ 16.709795] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xb28/0xbf8 <3>[ 16.710278] Read of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.710648] <3>[ 16.710757] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.711147] Hardware name: linux,dummy-virt (DT) <3>[ 16.711345] Call trace: <3>[ 16.711482] dump_backtrace+0x9c/0x128 <3>[ 16.711704] show_stack+0x20/0x38 <3>[ 16.711880] dump_stack_lvl+0x8c/0xd0 <3>[ 16.712082] print_report+0x118/0x5e0 <3>[ 16.712286] kasan_report+0xc8/0x118 <3>[ 16.712485] __asan_report_load8_noabort+0x20/0x30 <3>[ 16.712708] kasan_bitops_modify.constprop.0+0xb28/0xbf8 <3>[ 16.712947] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.713159] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.713370] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.713625] kthread+0x24c/0x2d0 <3>[ 16.713827] ret_from_fork+0x10/0x20 <3>[ 16.714092] <3>[ 16.714227] Allocated by task 243: <4>[ 16.714396] kasan_save_stack+0x3c/0x68 <4>[ 16.714587] kasan_save_track+0x20/0x40 <4>[ 16.714778] kasan_save_alloc_info+0x40/0x58 <4>[ 16.714978] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.715170] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.715387] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.715607] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.715808] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.716057] kthread+0x24c/0x2d0 <4>[ 16.716219] ret_from_fork+0x10/0x20 <3>[ 16.716407] <3>[ 16.716519] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.716519] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.716966] The buggy address is located 8 bytes inside of <3>[ 16.716966] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.717423] <3>[ 16.717532] The buggy address belongs to the physical page: <4>[ 16.717764] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.718251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.718560] page_type: 0xffffefff(slab) <4>[ 16.718745] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.719063] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.719348] page dumped because: kasan: bad access detected <3>[ 16.719578] <3>[ 16.719679] Memory state around the buggy address: <3>[ 16.719891] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.720178] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.720463] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.720734] ^ <3>[ 16.720991] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.721274] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.721550] ================================================================== <3>[ 16.721953] ================================================================== <3>[ 16.722284] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x358/0xbf8 <3>[ 16.722601] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.722883] <3>[ 16.722993] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.723367] Hardware name: linux,dummy-virt (DT) <3>[ 16.723563] Call trace: <3>[ 16.723696] dump_backtrace+0x9c/0x128 <3>[ 16.723886] show_stack+0x20/0x38 <3>[ 16.724055] dump_stack_lvl+0x8c/0xd0 <3>[ 16.724237] print_report+0x118/0x5e0 <3>[ 16.724417] kasan_report+0xc8/0x118 <3>[ 16.724610] kasan_check_range+0x100/0x1a8 <3>[ 16.724802] __kasan_check_write+0x20/0x30 <3>[ 16.725019] kasan_bitops_modify.constprop.0+0x358/0xbf8 <3>[ 16.725253] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.725451] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.725643] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.725925] kthread+0x24c/0x2d0 <3>[ 16.726144] ret_from_fork+0x10/0x20 <3>[ 16.726345] <3>[ 16.726452] Allocated by task 243: <4>[ 16.726622] kasan_save_stack+0x3c/0x68 <4>[ 16.726825] kasan_save_track+0x20/0x40 <4>[ 16.727017] kasan_save_alloc_info+0x40/0x58 <4>[ 16.727226] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.727412] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.727618] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.727819] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.728018] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.728256] kthread+0x24c/0x2d0 <4>[ 16.728426] ret_from_fork+0x10/0x20 <3>[ 16.728607] <3>[ 16.728717] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.728717] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.729157] The buggy address is located 8 bytes inside of <3>[ 16.729157] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.729590] <3>[ 16.729697] The buggy address belongs to the physical page: <4>[ 16.729965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.730342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.730609] page_type: 0xffffefff(slab) <4>[ 16.730803] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.731109] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.731396] page dumped because: kasan: bad access detected <3>[ 16.731620] <3>[ 16.731723] Memory state around the buggy address: <3>[ 16.731921] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.732201] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.732481] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.732759] ^ <3>[ 16.733015] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.733290] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.733560] ================================================================== <3>[ 16.733959] ================================================================== <3>[ 16.734294] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3c8/0xbf8 <3>[ 16.734607] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.734980] <3>[ 16.735085] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.735481] Hardware name: linux,dummy-virt (DT) <3>[ 16.735686] Call trace: <3>[ 16.735828] dump_backtrace+0x9c/0x128 <3>[ 16.736025] show_stack+0x20/0x38 <3>[ 16.736218] dump_stack_lvl+0x8c/0xd0 <3>[ 16.736421] print_report+0x118/0x5e0 <3>[ 16.736615] kasan_report+0xc8/0x118 <3>[ 16.736800] kasan_check_range+0x100/0x1a8 <3>[ 16.737007] __kasan_check_write+0x20/0x30 <3>[ 16.737224] kasan_bitops_modify.constprop.0+0x3c8/0xbf8 <3>[ 16.737461] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.737670] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.737907] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.738230] kthread+0x24c/0x2d0 <3>[ 16.738405] ret_from_fork+0x10/0x20 <3>[ 16.738592] <3>[ 16.738700] Allocated by task 243: <4>[ 16.738864] kasan_save_stack+0x3c/0x68 <4>[ 16.739055] kasan_save_track+0x20/0x40 <4>[ 16.739242] kasan_save_alloc_info+0x40/0x58 <4>[ 16.739449] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.739636] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.739841] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.740048] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.740250] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.740488] kthread+0x24c/0x2d0 <4>[ 16.740664] ret_from_fork+0x10/0x20 <3>[ 16.740838] <3>[ 16.740948] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.740948] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.741384] The buggy address is located 8 bytes inside of <3>[ 16.741384] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.741818] <3>[ 16.741947] The buggy address belongs to the physical page: <4>[ 16.742219] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.742545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.742846] page_type: 0xffffefff(slab) <4>[ 16.743027] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.743324] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.743605] page dumped because: kasan: bad access detected <3>[ 16.743824] <3>[ 16.743926] Memory state around the buggy address: <3>[ 16.744133] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.744413] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.744697] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.744987] ^ <3>[ 16.745248] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.745549] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.745834] ================================================================== <3>[ 16.746353] ================================================================== <3>[ 16.746677] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa5c/0xbf8 <3>[ 16.746996] Read of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.747276] <3>[ 16.747393] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.747761] Hardware name: linux,dummy-virt (DT) <3>[ 16.747952] Call trace: <3>[ 16.748087] dump_backtrace+0x9c/0x128 <3>[ 16.748279] show_stack+0x20/0x38 <3>[ 16.748477] dump_stack_lvl+0x8c/0xd0 <3>[ 16.748668] print_report+0x118/0x5e0 <3>[ 16.748855] kasan_report+0xc8/0x118 <3>[ 16.749051] __asan_report_load8_noabort+0x20/0x30 <3>[ 16.749278] kasan_bitops_modify.constprop.0+0xa5c/0xbf8 <3>[ 16.749525] kasan_bitops_generic+0x114/0x1d0 <3>[ 16.749748] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.750035] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.750325] kthread+0x24c/0x2d0 <3>[ 16.750513] ret_from_fork+0x10/0x20 <3>[ 16.750735] <3>[ 16.750841] Allocated by task 243: <4>[ 16.751009] kasan_save_stack+0x3c/0x68 <4>[ 16.751202] kasan_save_track+0x20/0x40 <4>[ 16.751397] kasan_save_alloc_info+0x40/0x58 <4>[ 16.751601] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.751792] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.751997] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.752202] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.752395] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.752623] kthread+0x24c/0x2d0 <4>[ 16.752786] ret_from_fork+0x10/0x20 <3>[ 16.752957] <3>[ 16.753065] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.753065] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.753517] The buggy address is located 8 bytes inside of <3>[ 16.753517] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.754062] <3>[ 16.754231] The buggy address belongs to the physical page: <4>[ 16.754490] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.754804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.755093] page_type: 0xffffefff(slab) <4>[ 16.755301] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.755613] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.755912] page dumped because: kasan: bad access detected <3>[ 16.756136] <3>[ 16.756243] Memory state around the buggy address: <3>[ 16.756458] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.756732] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.757025] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.757296] ^ <3>[ 16.757556] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.757830] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.758234] ================================================================== <3>[ 16.758700] ================================================================== <3>[ 16.759002] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 <3>[ 16.759316] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.759593] <3>[ 16.759709] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.760072] Hardware name: linux,dummy-virt (DT) <3>[ 16.760259] Call trace: <3>[ 16.760392] dump_backtrace+0x9c/0x128 <3>[ 16.760578] show_stack+0x20/0x38 <3>[ 16.760746] dump_stack_lvl+0x8c/0xd0 <3>[ 16.760938] print_report+0x118/0x5e0 <3>[ 16.761124] kasan_report+0xc8/0x118 <3>[ 16.761304] kasan_check_range+0x100/0x1a8 <3>[ 16.761501] __kasan_check_write+0x20/0x30 <3>[ 16.761697] kasan_bitops_test_and_modify.constprop.0+0x104/0xc08 <3>[ 16.761997] kasan_bitops_generic+0x120/0x1d0 <3>[ 16.762241] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.762440] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.762688] kthread+0x24c/0x2d0 <3>[ 16.762879] ret_from_fork+0x10/0x20 <3>[ 16.763083] <3>[ 16.763202] Allocated by task 243: <4>[ 16.763376] kasan_save_stack+0x3c/0x68 <4>[ 16.763576] kasan_save_track+0x20/0x40 <4>[ 16.763770] kasan_save_alloc_info+0x40/0x58 <4>[ 16.763973] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.764171] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.764387] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.764603] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.764815] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.765062] kthread+0x24c/0x2d0 <4>[ 16.765247] ret_from_fork+0x10/0x20 <3>[ 16.765453] <3>[ 16.765570] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.765570] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.766161] The buggy address is located 8 bytes inside of <3>[ 16.766161] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.766641] <3>[ 16.766766] The buggy address belongs to the physical page: <4>[ 16.766998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.767297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.767578] page_type: 0xffffefff(slab) <4>[ 16.767775] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.768085] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.768401] page dumped because: kasan: bad access detected <3>[ 16.768639] <3>[ 16.768754] Memory state around the buggy address: <3>[ 16.768957] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.769244] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.769548] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.770018] ^ <3>[ 16.770372] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.770646] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.770926] ================================================================== <3>[ 16.771324] ================================================================== <3>[ 16.771627] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa44/0xc08 <3>[ 16.771983] Read of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.772274] <3>[ 16.772386] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.772767] Hardware name: linux,dummy-virt (DT) <3>[ 16.772970] Call trace: <3>[ 16.773105] dump_backtrace+0x9c/0x128 <3>[ 16.773302] show_stack+0x20/0x38 <3>[ 16.773474] dump_stack_lvl+0x8c/0xd0 <3>[ 16.773671] print_report+0x118/0x5e0 <3>[ 16.773916] kasan_report+0xc8/0x118 <3>[ 16.774186] __asan_report_load8_noabort+0x20/0x30 <3>[ 16.774401] kasan_bitops_test_and_modify.constprop.0+0xa44/0xc08 <3>[ 16.774661] kasan_bitops_generic+0x120/0x1d0 <3>[ 16.774844] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.775037] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.775254] kthread+0x24c/0x2d0 <3>[ 16.775451] ret_from_fork+0x10/0x20 <3>[ 16.775663] <3>[ 16.775773] Allocated by task 243: <4>[ 16.775936] kasan_save_stack+0x3c/0x68 <4>[ 16.776160] kasan_save_track+0x20/0x40 <4>[ 16.776372] kasan_save_alloc_info+0x40/0x58 <4>[ 16.776598] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.776806] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.777045] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.777261] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.777471] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.777727] kthread+0x24c/0x2d0 <4>[ 16.777958] ret_from_fork+0x10/0x20 <3>[ 16.778230] <3>[ 16.778377] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.778377] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.778877] The buggy address is located 8 bytes inside of <3>[ 16.778877] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.779306] <3>[ 16.779407] The buggy address belongs to the physical page: <4>[ 16.779624] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.779952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.780258] page_type: 0xffffefff(slab) <4>[ 16.780464] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.780779] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.781061] page dumped because: kasan: bad access detected <3>[ 16.781311] <3>[ 16.781433] Memory state around the buggy address: <3>[ 16.781650] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.782044] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.782403] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.782709] ^ <3>[ 16.782985] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.783273] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.783566] ================================================================== <3>[ 16.784019] ================================================================== <3>[ 16.784302] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 <3>[ 16.784630] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.784985] <3>[ 16.785105] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.785490] Hardware name: linux,dummy-virt (DT) <3>[ 16.785689] Call trace: <3>[ 16.785868] dump_backtrace+0x9c/0x128 <3>[ 16.786129] show_stack+0x20/0x38 <3>[ 16.786371] dump_stack_lvl+0x8c/0xd0 <3>[ 16.786604] print_report+0x118/0x5e0 <3>[ 16.786813] kasan_report+0xc8/0x118 <3>[ 16.787021] kasan_check_range+0x100/0x1a8 <3>[ 16.787242] __kasan_check_write+0x20/0x30 <3>[ 16.787496] kasan_bitops_test_and_modify.constprop.0+0x1e4/0xc08 <3>[ 16.787770] kasan_bitops_generic+0x120/0x1d0 <3>[ 16.788002] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.788245] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.788509] kthread+0x24c/0x2d0 <3>[ 16.788689] ret_from_fork+0x10/0x20 <3>[ 16.788891] <3>[ 16.789031] Allocated by task 243: <4>[ 16.789215] kasan_save_stack+0x3c/0x68 <4>[ 16.789467] kasan_save_track+0x20/0x40 <4>[ 16.789692] kasan_save_alloc_info+0x40/0x58 <4>[ 16.789966] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.790197] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.790459] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.790677] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.790892] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.791131] kthread+0x24c/0x2d0 <4>[ 16.791302] ret_from_fork+0x10/0x20 <3>[ 16.791492] <3>[ 16.791612] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.791612] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.792060] The buggy address is located 8 bytes inside of <3>[ 16.792060] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.792505] <3>[ 16.792637] The buggy address belongs to the physical page: <4>[ 16.792884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.793221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.793521] page_type: 0xffffefff(slab) <4>[ 16.793733] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.794136] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.794469] page dumped because: kasan: bad access detected <3>[ 16.794719] <3>[ 16.794825] Memory state around the buggy address: <3>[ 16.795099] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.795502] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.795901] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.796282] ^ <3>[ 16.796650] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.796969] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.797231] ================================================================== <3>[ 16.797613] ================================================================== <3>[ 16.798112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa8c/0xc08 <3>[ 16.798667] Read of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.799119] <3>[ 16.799313] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.799787] Hardware name: linux,dummy-virt (DT) <3>[ 16.799980] Call trace: <3>[ 16.800106] dump_backtrace+0x9c/0x128 <3>[ 16.800290] show_stack+0x20/0x38 <3>[ 16.800450] dump_stack_lvl+0x8c/0xd0 <3>[ 16.800625] print_report+0x118/0x5e0 <3>[ 16.800797] kasan_report+0xc8/0x118 <3>[ 16.800967] __asan_report_load8_noabort+0x20/0x30 <3>[ 16.801174] kasan_bitops_test_and_modify.constprop.0+0xa8c/0xc08 <3>[ 16.801413] kasan_bitops_generic+0x120/0x1d0 <3>[ 16.801654] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.801980] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.802224] kthread+0x24c/0x2d0 <3>[ 16.802386] ret_from_fork+0x10/0x20 <3>[ 16.802559] <3>[ 16.802656] Allocated by task 243: <4>[ 16.802811] kasan_save_stack+0x3c/0x68 <4>[ 16.802988] kasan_save_track+0x20/0x40 <4>[ 16.803165] kasan_save_alloc_info+0x40/0x58 <4>[ 16.803373] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.803550] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.803742] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.803920] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.804104] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.804320] kthread+0x24c/0x2d0 <4>[ 16.804482] ret_from_fork+0x10/0x20 <3>[ 16.804650] <3>[ 16.804743] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.804743] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.805145] The buggy address is located 8 bytes inside of <3>[ 16.805145] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.805553] <3>[ 16.805650] The buggy address belongs to the physical page: <4>[ 16.805865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.806197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.806468] page_type: 0xffffefff(slab) <4>[ 16.806651] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.806927] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.807189] page dumped because: kasan: bad access detected <3>[ 16.807394] <3>[ 16.807489] Memory state around the buggy address: <3>[ 16.807693] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.807959] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.808233] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.808499] ^ <3>[ 16.808762] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.809062] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.809350] ================================================================== <3>[ 16.809741] ================================================================== <3>[ 16.810134] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 <3>[ 16.810474] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.810758] <3>[ 16.810864] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.811310] Hardware name: linux,dummy-virt (DT) <3>[ 16.811492] Call trace: <3>[ 16.811617] dump_backtrace+0x9c/0x128 <3>[ 16.811793] show_stack+0x20/0x38 <3>[ 16.811957] dump_stack_lvl+0x8c/0xd0 <3>[ 16.812125] print_report+0x118/0x5e0 <3>[ 16.812294] kasan_report+0xc8/0x118 <3>[ 16.812469] kasan_check_range+0x100/0x1a8 <3>[ 16.812659] __kasan_check_write+0x20/0x30 <3>[ 16.812856] kasan_bitops_test_and_modify.constprop.0+0x26c/0xc08 <3>[ 16.813115] kasan_bitops_generic+0x120/0x1d0 <3>[ 16.813311] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.813506] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.813727] kthread+0x24c/0x2d0 <3>[ 16.813932] ret_from_fork+0x10/0x20 <3>[ 16.814125] <3>[ 16.814246] Allocated by task 243: <4>[ 16.814416] kasan_save_stack+0x3c/0x68 <4>[ 16.814590] kasan_save_track+0x20/0x40 <4>[ 16.814763] kasan_save_alloc_info+0x40/0x58 <4>[ 16.814948] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.815115] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.815309] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.815498] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.815678] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.815892] kthread+0x24c/0x2d0 <4>[ 16.816052] ret_from_fork+0x10/0x20 <3>[ 16.816215] <3>[ 16.816312] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.816312] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.816723] The buggy address is located 8 bytes inside of <3>[ 16.816723] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.817169] <3>[ 16.817275] The buggy address belongs to the physical page: <4>[ 16.817493] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.817772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.818094] page_type: 0xffffefff(slab) <4>[ 16.818322] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.818614] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.818887] page dumped because: kasan: bad access detected <3>[ 16.819091] <3>[ 16.819200] Memory state around the buggy address: <3>[ 16.819394] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.819668] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.819937] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.820188] ^ <3>[ 16.820451] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.820787] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.821108] ================================================================== <3>[ 16.821549] ================================================================== <3>[ 16.821820] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xb10/0xc08 <3>[ 16.822226] Read of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.822526] <3>[ 16.822645] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.823001] Hardware name: linux,dummy-virt (DT) <3>[ 16.823191] Call trace: <3>[ 16.823314] dump_backtrace+0x9c/0x128 <3>[ 16.823494] show_stack+0x20/0x38 <3>[ 16.823652] dump_stack_lvl+0x8c/0xd0 <3>[ 16.823831] print_report+0x118/0x5e0 <3>[ 16.824003] kasan_report+0xc8/0x118 <3>[ 16.824179] __asan_report_load8_noabort+0x20/0x30 <3>[ 16.824385] kasan_bitops_test_and_modify.constprop.0+0xb10/0xc08 <3>[ 16.824642] kasan_bitops_generic+0x120/0x1d0 <3>[ 16.824829] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.825039] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.825270] kthread+0x24c/0x2d0 <3>[ 16.825435] ret_from_fork+0x10/0x20 <3>[ 16.825622] <3>[ 16.825717] Allocated by task 243: <4>[ 16.825881] kasan_save_stack+0x3c/0x68 <4>[ 16.826088] kasan_save_track+0x20/0x40 <4>[ 16.826284] kasan_save_alloc_info+0x40/0x58 <4>[ 16.826491] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.826666] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.826862] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.827063] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.827257] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.827498] kthread+0x24c/0x2d0 <4>[ 16.827662] ret_from_fork+0x10/0x20 <3>[ 16.827825] <3>[ 16.827924] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.827924] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.828344] The buggy address is located 8 bytes inside of <3>[ 16.828344] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.828750] <3>[ 16.828848] The buggy address belongs to the physical page: <4>[ 16.829054] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.829337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.829584] page_type: 0xffffefff(slab) <4>[ 16.829761] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.830076] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.830349] page dumped because: kasan: bad access detected <3>[ 16.830554] <3>[ 16.830650] Memory state around the buggy address: <3>[ 16.830834] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.831095] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.831353] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.831610] ^ <3>[ 16.831854] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.832109] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.832366] ================================================================== <3>[ 16.832890] ================================================================== <3>[ 16.833165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 <3>[ 16.833492] Write of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.833753] <3>[ 16.833870] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.834243] Hardware name: linux,dummy-virt (DT) <3>[ 16.834432] Call trace: <3>[ 16.834568] dump_backtrace+0x9c/0x128 <3>[ 16.834745] show_stack+0x20/0x38 <3>[ 16.834906] dump_stack_lvl+0x8c/0xd0 <3>[ 16.835084] print_report+0x118/0x5e0 <3>[ 16.835271] kasan_report+0xc8/0x118 <3>[ 16.835445] kasan_check_range+0x100/0x1a8 <3>[ 16.835631] __kasan_check_write+0x20/0x30 <3>[ 16.835812] kasan_bitops_test_and_modify.constprop.0+0x34c/0xc08 <3>[ 16.836051] kasan_bitops_generic+0x120/0x1d0 <3>[ 16.836240] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.836436] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.836662] kthread+0x24c/0x2d0 <3>[ 16.836823] ret_from_fork+0x10/0x20 <3>[ 16.836998] <3>[ 16.837104] Allocated by task 243: <4>[ 16.837255] kasan_save_stack+0x3c/0x68 <4>[ 16.837431] kasan_save_track+0x20/0x40 <4>[ 16.837603] kasan_save_alloc_info+0x40/0x58 <4>[ 16.837784] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.837954] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.838134] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.838333] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.838517] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.838736] kthread+0x24c/0x2d0 <4>[ 16.838885] ret_from_fork+0x10/0x20 <3>[ 16.839045] <3>[ 16.839141] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.839141] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.839536] The buggy address is located 8 bytes inside of <3>[ 16.839536] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.839934] <3>[ 16.840034] The buggy address belongs to the physical page: <4>[ 16.840235] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.840509] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.840752] page_type: 0xffffefff(slab) <4>[ 16.840920] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.841196] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.841464] page dumped because: kasan: bad access detected <3>[ 16.841670] <3>[ 16.841766] Memory state around the buggy address: <3>[ 16.841950] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.842214] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.842488] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.842737] ^ <3>[ 16.842981] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.843235] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.843494] ================================================================== <3>[ 16.844025] ================================================================== <3>[ 16.844328] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa80/0xc08 <3>[ 16.844634] Read of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.844900] <3>[ 16.844996] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.845353] Hardware name: linux,dummy-virt (DT) <3>[ 16.845536] Call trace: <3>[ 16.845660] dump_backtrace+0x9c/0x128 <3>[ 16.845828] show_stack+0x20/0x38 <3>[ 16.846011] dump_stack_lvl+0x8c/0xd0 <3>[ 16.846189] print_report+0x118/0x5e0 <3>[ 16.846383] kasan_report+0xc8/0x118 <3>[ 16.846552] __asan_report_load8_noabort+0x20/0x30 <3>[ 16.846751] kasan_bitops_test_and_modify.constprop.0+0xa80/0xc08 <3>[ 16.846988] kasan_bitops_generic+0x120/0x1d0 <3>[ 16.847195] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.847384] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.847623] kthread+0x24c/0x2d0 <3>[ 16.847789] ret_from_fork+0x10/0x20 <3>[ 16.847962] <3>[ 16.848058] Allocated by task 243: <4>[ 16.848208] kasan_save_stack+0x3c/0x68 <4>[ 16.848394] kasan_save_track+0x20/0x40 <4>[ 16.848573] kasan_save_alloc_info+0x40/0x58 <4>[ 16.848768] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.848942] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.849130] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.849331] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.849513] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.849750] kthread+0x24c/0x2d0 <4>[ 16.849909] ret_from_fork+0x10/0x20 <3>[ 16.850076] <3>[ 16.850173] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.850173] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.850650] The buggy address is located 8 bytes inside of <3>[ 16.850650] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.851166] <3>[ 16.851283] The buggy address belongs to the physical page: <4>[ 16.851530] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.851927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.852247] page_type: 0xffffefff(slab) <4>[ 16.852473] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.852863] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.853208] page dumped because: kasan: bad access detected <3>[ 16.853493] <3>[ 16.853618] Memory state around the buggy address: <3>[ 16.853889] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.854294] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.854660] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.855033] ^ <3>[ 16.855378] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.855735] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.856161] ================================================================== <3>[ 16.856977] ================================================================== <3>[ 16.857471] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xac8/0xc08 <3>[ 16.857991] Read of size 8 at addr fff00000c55d39e8 by task kunit_try_catch/243 <3>[ 16.858426] <3>[ 16.858575] CPU: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.859096] Hardware name: linux,dummy-virt (DT) <3>[ 16.859397] Call trace: <3>[ 16.859618] dump_backtrace+0x9c/0x128 <3>[ 16.859918] show_stack+0x20/0x38 <3>[ 16.860200] dump_stack_lvl+0x8c/0xd0 <3>[ 16.860502] print_report+0x118/0x5e0 <3>[ 16.860805] kasan_report+0xc8/0x118 <3>[ 16.861103] __asan_report_load8_noabort+0x20/0x30 <3>[ 16.861451] kasan_bitops_test_and_modify.constprop.0+0xac8/0xc08 <3>[ 16.861856] kasan_bitops_generic+0x120/0x1d0 <3>[ 16.862182] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.862515] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.862871] kthread+0x24c/0x2d0 <3>[ 16.863144] ret_from_fork+0x10/0x20 <3>[ 16.863445] <3>[ 16.863624] Allocated by task 243: <4>[ 16.863889] kasan_save_stack+0x3c/0x68 <4>[ 16.864191] kasan_save_track+0x20/0x40 <4>[ 16.864500] kasan_save_alloc_info+0x40/0x58 <4>[ 16.864825] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.865129] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.865452] kasan_bitops_generic+0xa0/0x1d0 <4>[ 16.865778] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.866095] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.866481] kthread+0x24c/0x2d0 <4>[ 16.866758] ret_from_fork+0x10/0x20 <3>[ 16.867053] <3>[ 16.867230] The buggy address belongs to the object at fff00000c55d39e0 <3>[ 16.867230] which belongs to the cache kmalloc-16 of size 16 <3>[ 16.867905] The buggy address is located 8 bytes inside of <3>[ 16.867905] allocated 9-byte region [fff00000c55d39e0, fff00000c55d39e9) <3>[ 16.868563] <3>[ 16.868743] The buggy address belongs to the physical page: <4>[ 16.869090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1055d3 <4>[ 16.869566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.869975] page_type: 0xffffefff(slab) <4>[ 16.870285] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 <4>[ 16.870750] raw: 0000000000000000 0000000080800080 00000001ffffefff 0000000000000000 <4>[ 16.871189] page dumped because: kasan: bad access detected <3>[ 16.871536] <3>[ 16.871709] Memory state around the buggy address: <3>[ 16.872036] fff00000c55d3880: 00 00 fc fc 00 00 fc fc 00 02 fc fc 00 02 fc fc <3>[ 16.872471] fff00000c55d3900: fa fb fc fc fa fb fc fc 00 05 fc fc fa fb fc fc <3>[ 16.872888] >fff00000c55d3980: fa fb fc fc fa fb fc fc 00 04 fc fc 00 01 fc fc <3>[ 16.873310] ^ <3>[ 16.873709] fff00000c55d3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.874149] fff00000c55d3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.874587] ================================================================== <6>[ 16.877131] ok 61 kasan_bitops_generic <6>[ 16.880377] ok 62 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n <3>[ 16.882246] ================================================================== <3>[ 16.882907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4228/0x49e0 <3>[ 16.883214] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.883512] <3>[ 16.883620] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.883989] Hardware name: linux,dummy-virt (DT) <3>[ 16.884163] Call trace: <3>[ 16.884287] dump_backtrace+0x9c/0x128 <3>[ 16.884474] show_stack+0x20/0x38 <3>[ 16.884653] dump_stack_lvl+0x8c/0xd0 <3>[ 16.884841] print_report+0x118/0x5e0 <3>[ 16.885037] kasan_report+0xc8/0x118 <3>[ 16.885220] __asan_report_load4_noabort+0x20/0x30 <3>[ 16.885476] kasan_atomics_helper+0x4228/0x49e0 <3>[ 16.885775] kasan_atomics+0x1a0/0x2e8 <3>[ 16.886079] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.886289] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.886526] kthread+0x24c/0x2d0 <3>[ 16.886714] ret_from_fork+0x10/0x20 <3>[ 16.886893] <3>[ 16.886992] Allocated by task 247: <4>[ 16.887165] kasan_save_stack+0x3c/0x68 <4>[ 16.887361] kasan_save_track+0x20/0x40 <4>[ 16.887541] kasan_save_alloc_info+0x40/0x58 <4>[ 16.887738] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.887927] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.888113] kasan_atomics+0xb8/0x2e8 <4>[ 16.888293] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.888491] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.888747] kthread+0x24c/0x2d0 <4>[ 16.888895] ret_from_fork+0x10/0x20 <3>[ 16.889058] <3>[ 16.889157] The buggy address belongs to the object at fff00000c65d1600 <3>[ 16.889157] which belongs to the cache kmalloc-64 of size 64 <3>[ 16.889611] The buggy address is located 0 bytes to the right of <3>[ 16.889611] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 16.890116] <3>[ 16.890229] The buggy address belongs to the physical page: <4>[ 16.890441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 16.890728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.890974] page_type: 0xffffefff(slab) <4>[ 16.891161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 16.891443] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 16.891712] page dumped because: kasan: bad access detected <3>[ 16.891940] <3>[ 16.892041] Memory state around the buggy address: <3>[ 16.892233] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.892504] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.892760] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 16.893009] ^ <3>[ 16.893206] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.893563] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.893970] ================================================================== <3>[ 16.894501] ================================================================== <3>[ 16.894774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49e0 <3>[ 16.895050] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.895326] <3>[ 16.895431] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.895809] Hardware name: linux,dummy-virt (DT) <3>[ 16.896019] Call trace: <3>[ 16.896161] dump_backtrace+0x9c/0x128 <3>[ 16.896366] show_stack+0x20/0x38 <3>[ 16.896532] dump_stack_lvl+0x8c/0xd0 <3>[ 16.896730] print_report+0x118/0x5e0 <3>[ 16.896920] kasan_report+0xc8/0x118 <3>[ 16.897110] __asan_report_store4_noabort+0x20/0x30 <3>[ 16.897335] kasan_atomics_helper+0x40fc/0x49e0 <3>[ 16.897568] kasan_atomics+0x1a0/0x2e8 <3>[ 16.897771] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.898075] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.898360] kthread+0x24c/0x2d0 <3>[ 16.898547] ret_from_fork+0x10/0x20 <3>[ 16.898732] <3>[ 16.898842] Allocated by task 247: <4>[ 16.899006] kasan_save_stack+0x3c/0x68 <4>[ 16.899228] kasan_save_track+0x20/0x40 <4>[ 16.899430] kasan_save_alloc_info+0x40/0x58 <4>[ 16.899675] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.899880] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.900124] kasan_atomics+0xb8/0x2e8 <4>[ 16.900341] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.900573] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.900847] kthread+0x24c/0x2d0 <4>[ 16.901039] ret_from_fork+0x10/0x20 <3>[ 16.901248] <3>[ 16.901374] The buggy address belongs to the object at fff00000c65d1600 <3>[ 16.901374] which belongs to the cache kmalloc-64 of size 64 <3>[ 16.901852] The buggy address is located 0 bytes to the right of <3>[ 16.901852] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 16.902374] <3>[ 16.902481] The buggy address belongs to the physical page: <4>[ 16.902698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 16.903013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.903280] page_type: 0xffffefff(slab) <4>[ 16.903510] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 16.903845] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 16.904166] page dumped because: kasan: bad access detected <3>[ 16.904429] <3>[ 16.904557] Memory state around the buggy address: <3>[ 16.904796] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.905111] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.905424] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 16.905738] ^ <3>[ 16.906065] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.906385] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.906691] ================================================================== <3>[ 16.907212] ================================================================== <3>[ 16.907527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49e0 <3>[ 16.907822] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.908087] <3>[ 16.908192] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.908612] Hardware name: linux,dummy-virt (DT) <3>[ 16.908837] Call trace: <3>[ 16.908991] dump_backtrace+0x9c/0x128 <3>[ 16.909191] show_stack+0x20/0x38 <3>[ 16.909389] dump_stack_lvl+0x8c/0xd0 <3>[ 16.909600] print_report+0x118/0x5e0 <3>[ 16.909807] kasan_report+0xc8/0x118 <3>[ 16.910058] kasan_check_range+0x100/0x1a8 <3>[ 16.910314] __kasan_check_read+0x20/0x30 <3>[ 16.910535] kasan_atomics_helper+0x1f8/0x49e0 <3>[ 16.910770] kasan_atomics+0x1a0/0x2e8 <3>[ 16.910982] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.911204] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.911441] kthread+0x24c/0x2d0 <3>[ 16.911607] ret_from_fork+0x10/0x20 <3>[ 16.911786] <3>[ 16.911904] Allocated by task 247: <4>[ 16.912071] kasan_save_stack+0x3c/0x68 <4>[ 16.912276] kasan_save_track+0x20/0x40 <4>[ 16.912462] kasan_save_alloc_info+0x40/0x58 <4>[ 16.912660] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.912870] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.913089] kasan_atomics+0xb8/0x2e8 <4>[ 16.913273] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.913489] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.913765] kthread+0x24c/0x2d0 <4>[ 16.913994] ret_from_fork+0x10/0x20 <3>[ 16.914212] <3>[ 16.914322] The buggy address belongs to the object at fff00000c65d1600 <3>[ 16.914322] which belongs to the cache kmalloc-64 of size 64 <3>[ 16.914810] The buggy address is located 0 bytes to the right of <3>[ 16.914810] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 16.915334] <3>[ 16.915451] The buggy address belongs to the physical page: <4>[ 16.915684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 16.916028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.916312] page_type: 0xffffefff(slab) <4>[ 16.916521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 16.916876] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 16.917227] page dumped because: kasan: bad access detected <3>[ 16.917446] <3>[ 16.917552] Memory state around the buggy address: <3>[ 16.917800] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.918212] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.918508] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 16.918771] ^ <3>[ 16.918999] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.919326] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.919595] ================================================================== <3>[ 16.920234] ================================================================== <3>[ 16.920511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49e0 <3>[ 16.920823] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.921195] <3>[ 16.921299] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.921665] Hardware name: linux,dummy-virt (DT) <3>[ 16.921881] Call trace: <3>[ 16.922028] dump_backtrace+0x9c/0x128 <3>[ 16.922227] show_stack+0x20/0x38 <3>[ 16.922394] dump_stack_lvl+0x8c/0xd0 <3>[ 16.922646] print_report+0x118/0x5e0 <3>[ 16.922897] kasan_report+0xc8/0x118 <3>[ 16.923132] kasan_check_range+0x100/0x1a8 <3>[ 16.923341] __kasan_check_write+0x20/0x30 <3>[ 16.923538] kasan_atomics_helper+0x25c/0x49e0 <3>[ 16.923819] kasan_atomics+0x1a0/0x2e8 <3>[ 16.924036] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.924252] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.924536] kthread+0x24c/0x2d0 <3>[ 16.924718] ret_from_fork+0x10/0x20 <3>[ 16.924926] <3>[ 16.925042] Allocated by task 247: <4>[ 16.925220] kasan_save_stack+0x3c/0x68 <4>[ 16.925449] kasan_save_track+0x20/0x40 <4>[ 16.925651] kasan_save_alloc_info+0x40/0x58 <4>[ 16.925962] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.926176] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.926383] kasan_atomics+0xb8/0x2e8 <4>[ 16.926565] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.926775] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.927007] kthread+0x24c/0x2d0 <4>[ 16.927174] ret_from_fork+0x10/0x20 <3>[ 16.927350] <3>[ 16.927460] The buggy address belongs to the object at fff00000c65d1600 <3>[ 16.927460] which belongs to the cache kmalloc-64 of size 64 <3>[ 16.927888] The buggy address is located 0 bytes to the right of <3>[ 16.927888] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 16.928373] <3>[ 16.928477] The buggy address belongs to the physical page: <4>[ 16.928712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 16.929041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.929301] page_type: 0xffffefff(slab) <4>[ 16.929479] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 16.929767] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 16.930116] page dumped because: kasan: bad access detected <3>[ 16.930351] <3>[ 16.930453] Memory state around the buggy address: <3>[ 16.930639] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.930921] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.931191] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 16.931441] ^ <3>[ 16.931637] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.931916] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.932182] ================================================================== <3>[ 16.932621] ================================================================== <3>[ 16.932973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49e0 <3>[ 16.933240] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.933501] <3>[ 16.933603] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.934013] Hardware name: linux,dummy-virt (DT) <3>[ 16.934239] Call trace: <3>[ 16.934371] dump_backtrace+0x9c/0x128 <3>[ 16.934551] show_stack+0x20/0x38 <3>[ 16.934719] dump_stack_lvl+0x8c/0xd0 <3>[ 16.934903] print_report+0x118/0x5e0 <3>[ 16.935079] kasan_report+0xc8/0x118 <3>[ 16.935252] kasan_check_range+0x100/0x1a8 <3>[ 16.935444] __kasan_check_read+0x20/0x30 <3>[ 16.935623] kasan_atomics_helper+0x2c4/0x49e0 <3>[ 16.935821] kasan_atomics+0x1a0/0x2e8 <3>[ 16.935993] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.936184] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.936414] kthread+0x24c/0x2d0 <3>[ 16.936604] ret_from_fork+0x10/0x20 <3>[ 16.936781] <3>[ 16.936880] Allocated by task 247: <4>[ 16.937035] kasan_save_stack+0x3c/0x68 <4>[ 16.937228] kasan_save_track+0x20/0x40 <4>[ 16.937417] kasan_save_alloc_info+0x40/0x58 <4>[ 16.937611] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.937785] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.938039] kasan_atomics+0xb8/0x2e8 <4>[ 16.938217] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.938424] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.938653] kthread+0x24c/0x2d0 <4>[ 16.938813] ret_from_fork+0x10/0x20 <3>[ 16.938987] <3>[ 16.939088] The buggy address belongs to the object at fff00000c65d1600 <3>[ 16.939088] which belongs to the cache kmalloc-64 of size 64 <3>[ 16.939501] The buggy address is located 0 bytes to the right of <3>[ 16.939501] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 16.939924] <3>[ 16.940024] The buggy address belongs to the physical page: <4>[ 16.940251] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 16.940554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.940814] page_type: 0xffffefff(slab) <4>[ 16.941018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 16.941320] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 16.941591] page dumped because: kasan: bad access detected <3>[ 16.941804] <3>[ 16.941925] Memory state around the buggy address: <3>[ 16.942127] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.942425] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.942708] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 16.942971] ^ <3>[ 16.943180] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.943478] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.943836] ================================================================== <3>[ 16.944471] ================================================================== <3>[ 16.944744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x427c/0x49e0 <3>[ 16.945048] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.945330] <3>[ 16.945441] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.945807] Hardware name: linux,dummy-virt (DT) <3>[ 16.946106] Call trace: <3>[ 16.946245] dump_backtrace+0x9c/0x128 <3>[ 16.946454] show_stack+0x20/0x38 <3>[ 16.946624] dump_stack_lvl+0x8c/0xd0 <3>[ 16.946795] print_report+0x118/0x5e0 <3>[ 16.947006] kasan_report+0xc8/0x118 <3>[ 16.947185] __asan_report_load4_noabort+0x20/0x30 <3>[ 16.947389] kasan_atomics_helper+0x427c/0x49e0 <3>[ 16.947584] kasan_atomics+0x1a0/0x2e8 <3>[ 16.947767] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.947956] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.948179] kthread+0x24c/0x2d0 <3>[ 16.948339] ret_from_fork+0x10/0x20 <3>[ 16.948508] <3>[ 16.948607] Allocated by task 247: <4>[ 16.948758] kasan_save_stack+0x3c/0x68 <4>[ 16.948934] kasan_save_track+0x20/0x40 <4>[ 16.949113] kasan_save_alloc_info+0x40/0x58 <4>[ 16.949301] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.949477] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.949677] kasan_atomics+0xb8/0x2e8 <4>[ 16.949886] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.950132] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.950433] kthread+0x24c/0x2d0 <4>[ 16.950655] ret_from_fork+0x10/0x20 <3>[ 16.950888] <3>[ 16.951035] The buggy address belongs to the object at fff00000c65d1600 <3>[ 16.951035] which belongs to the cache kmalloc-64 of size 64 <3>[ 16.951582] The buggy address is located 0 bytes to the right of <3>[ 16.951582] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 16.952176] <3>[ 16.952323] The buggy address belongs to the physical page: <4>[ 16.952617] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 16.953020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.953358] page_type: 0xffffefff(slab) <4>[ 16.953605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 16.954083] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 16.954481] page dumped because: kasan: bad access detected <3>[ 16.954764] <3>[ 16.954908] Memory state around the buggy address: <3>[ 16.955169] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.955518] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.955864] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 16.956186] ^ <3>[ 16.956438] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.956778] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.957114] ================================================================== <3>[ 16.957581] ================================================================== <3>[ 16.957856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49e0 <3>[ 16.958174] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.958488] <3>[ 16.958617] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.959042] Hardware name: linux,dummy-virt (DT) <3>[ 16.959254] Call trace: <3>[ 16.959400] dump_backtrace+0x9c/0x128 <3>[ 16.959608] show_stack+0x20/0x38 <3>[ 16.959785] dump_stack_lvl+0x8c/0xd0 <3>[ 16.959976] print_report+0x118/0x5e0 <3>[ 16.960192] kasan_report+0xc8/0x118 <3>[ 16.960388] kasan_check_range+0x100/0x1a8 <3>[ 16.960605] __kasan_check_write+0x20/0x30 <3>[ 16.960819] kasan_atomics_helper+0x344/0x49e0 <3>[ 16.961033] kasan_atomics+0x1a0/0x2e8 <3>[ 16.961243] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.961449] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.961704] kthread+0x24c/0x2d0 <3>[ 16.961958] ret_from_fork+0x10/0x20 <3>[ 16.962169] <3>[ 16.962281] Allocated by task 247: <4>[ 16.962436] kasan_save_stack+0x3c/0x68 <4>[ 16.962631] kasan_save_track+0x20/0x40 <4>[ 16.962818] kasan_save_alloc_info+0x40/0x58 <4>[ 16.963027] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.963203] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.963409] kasan_atomics+0xb8/0x2e8 <4>[ 16.963580] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.963805] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.964062] kthread+0x24c/0x2d0 <4>[ 16.964246] ret_from_fork+0x10/0x20 <3>[ 16.964424] <3>[ 16.964533] The buggy address belongs to the object at fff00000c65d1600 <3>[ 16.964533] which belongs to the cache kmalloc-64 of size 64 <3>[ 16.965017] The buggy address is located 0 bytes to the right of <3>[ 16.965017] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 16.965541] <3>[ 16.965656] The buggy address belongs to the physical page: <4>[ 16.965940] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 16.966313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.966579] page_type: 0xffffefff(slab) <4>[ 16.966764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 16.967055] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 16.967354] page dumped because: kasan: bad access detected <3>[ 16.967615] <3>[ 16.967720] Memory state around the buggy address: <3>[ 16.967955] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.968263] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.968557] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 16.968874] ^ <3>[ 16.969111] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.969401] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.969706] ================================================================== <3>[ 16.970278] ================================================================== <3>[ 16.970574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4114/0x49e0 <3>[ 16.970899] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.971165] <3>[ 16.971269] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.971681] Hardware name: linux,dummy-virt (DT) <3>[ 16.971900] Call trace: <3>[ 16.972051] dump_backtrace+0x9c/0x128 <3>[ 16.972263] show_stack+0x20/0x38 <3>[ 16.972451] dump_stack_lvl+0x8c/0xd0 <3>[ 16.972637] print_report+0x118/0x5e0 <3>[ 16.972849] kasan_report+0xc8/0x118 <3>[ 16.973048] __asan_report_store4_noabort+0x20/0x30 <3>[ 16.973299] kasan_atomics_helper+0x4114/0x49e0 <3>[ 16.973525] kasan_atomics+0x1a0/0x2e8 <3>[ 16.973746] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.974046] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.974350] kthread+0x24c/0x2d0 <3>[ 16.974542] ret_from_fork+0x10/0x20 <3>[ 16.974767] <3>[ 16.974898] Allocated by task 247: <4>[ 16.975088] kasan_save_stack+0x3c/0x68 <4>[ 16.975308] kasan_save_track+0x20/0x40 <4>[ 16.975527] kasan_save_alloc_info+0x40/0x58 <4>[ 16.975764] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.975964] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.976207] kasan_atomics+0xb8/0x2e8 <4>[ 16.976406] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.976646] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.976905] kthread+0x24c/0x2d0 <4>[ 16.977101] ret_from_fork+0x10/0x20 <3>[ 16.977296] <3>[ 16.977403] The buggy address belongs to the object at fff00000c65d1600 <3>[ 16.977403] which belongs to the cache kmalloc-64 of size 64 <3>[ 16.977823] The buggy address is located 0 bytes to the right of <3>[ 16.977823] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 16.978396] <3>[ 16.978526] The buggy address belongs to the physical page: <4>[ 16.978800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 16.979152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.979460] page_type: 0xffffefff(slab) <4>[ 16.979682] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 16.980032] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 16.980356] page dumped because: kasan: bad access detected <3>[ 16.980620] <3>[ 16.980745] Memory state around the buggy address: <3>[ 16.980982] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.981308] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.981627] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 16.981984] ^ <3>[ 16.982247] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.982533] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.982788] ================================================================== <3>[ 16.983195] ================================================================== <3>[ 16.983525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49e0 <3>[ 16.983807] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.984082] <3>[ 16.984196] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.984572] Hardware name: linux,dummy-virt (DT) <3>[ 16.984770] Call trace: <3>[ 16.984905] dump_backtrace+0x9c/0x128 <3>[ 16.985088] show_stack+0x20/0x38 <3>[ 16.985254] dump_stack_lvl+0x8c/0xd0 <3>[ 16.985438] print_report+0x118/0x5e0 <3>[ 16.985631] kasan_report+0xc8/0x118 <3>[ 16.985811] kasan_check_range+0x100/0x1a8 <3>[ 16.986076] __kasan_check_write+0x20/0x30 <3>[ 16.986299] kasan_atomics_helper+0x3c8/0x49e0 <3>[ 16.986517] kasan_atomics+0x1a0/0x2e8 <3>[ 16.986732] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.986934] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 16.987171] kthread+0x24c/0x2d0 <3>[ 16.987327] ret_from_fork+0x10/0x20 <3>[ 16.987504] <3>[ 16.987608] Allocated by task 247: <4>[ 16.987766] kasan_save_stack+0x3c/0x68 <4>[ 16.987958] kasan_save_track+0x20/0x40 <4>[ 16.988147] kasan_save_alloc_info+0x40/0x58 <4>[ 16.988347] __kasan_kmalloc+0xd4/0xd8 <4>[ 16.988552] kmalloc_trace_noprof+0x15c/0x348 <4>[ 16.988767] kasan_atomics+0xb8/0x2e8 <4>[ 16.988954] kunit_try_run_case+0x14c/0x3d0 <4>[ 16.989167] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 16.989421] kthread+0x24c/0x2d0 <4>[ 16.989600] ret_from_fork+0x10/0x20 <3>[ 16.989801] <3>[ 16.989974] The buggy address belongs to the object at fff00000c65d1600 <3>[ 16.989974] which belongs to the cache kmalloc-64 of size 64 <3>[ 16.990480] The buggy address is located 0 bytes to the right of <3>[ 16.990480] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 16.990976] <3>[ 16.991095] The buggy address belongs to the physical page: <4>[ 16.991358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 16.991729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 16.992030] page_type: 0xffffefff(slab) <4>[ 16.992244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 16.992591] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 16.992915] page dumped because: kasan: bad access detected <3>[ 16.993183] <3>[ 16.993304] Memory state around the buggy address: <3>[ 16.993542] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.993878] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 16.994212] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 16.994538] ^ <3>[ 16.994784] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.995100] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 16.995410] ================================================================== <3>[ 16.995863] ================================================================== <3>[ 16.996175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49e0 <3>[ 16.996509] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 16.996832] <3>[ 16.996949] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 16.997370] Hardware name: linux,dummy-virt (DT) <3>[ 16.997573] Call trace: <3>[ 16.997703] dump_backtrace+0x9c/0x128 <3>[ 16.997947] show_stack+0x20/0x38 <3>[ 16.998173] dump_stack_lvl+0x8c/0xd0 <3>[ 16.998400] print_report+0x118/0x5e0 <3>[ 16.998612] kasan_report+0xc8/0x118 <3>[ 16.998839] kasan_check_range+0x100/0x1a8 <3>[ 16.999060] __kasan_check_write+0x20/0x30 <3>[ 16.999294] kasan_atomics_helper+0x434/0x49e0 <3>[ 16.999519] kasan_atomics+0x1a0/0x2e8 <3>[ 16.999746] kunit_try_run_case+0x14c/0x3d0 <3>[ 16.999966] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.000234] kthread+0x24c/0x2d0 <3>[ 17.000420] ret_from_fork+0x10/0x20 <3>[ 17.000643] <3>[ 17.000762] Allocated by task 247: <4>[ 17.000959] kasan_save_stack+0x3c/0x68 <4>[ 17.001180] kasan_save_track+0x20/0x40 <4>[ 17.001411] kasan_save_alloc_info+0x40/0x58 <4>[ 17.001651] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.001871] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.002138] kasan_atomics+0xb8/0x2e8 <4>[ 17.002349] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.002542] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.002769] kthread+0x24c/0x2d0 <4>[ 17.002950] ret_from_fork+0x10/0x20 <3>[ 17.003167] <3>[ 17.003282] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.003282] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.003756] The buggy address is located 0 bytes to the right of <3>[ 17.003756] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.004270] <3>[ 17.004392] The buggy address belongs to the physical page: <4>[ 17.004654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.004984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.005284] page_type: 0xffffefff(slab) <4>[ 17.005489] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.005839] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.006290] page dumped because: kasan: bad access detected <3>[ 17.006504] <3>[ 17.006608] Memory state around the buggy address: <3>[ 17.006800] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.007081] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.007368] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.007683] ^ <3>[ 17.007964] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.008371] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.008788] ================================================================== <3>[ 17.009342] ================================================================== <3>[ 17.009748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49e0 <3>[ 17.010386] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.010947] <3>[ 17.011116] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.011701] Hardware name: linux,dummy-virt (DT) <3>[ 17.012043] Call trace: <3>[ 17.012245] dump_backtrace+0x9c/0x128 <3>[ 17.012506] show_stack+0x20/0x38 <3>[ 17.012777] dump_stack_lvl+0x8c/0xd0 <3>[ 17.013064] print_report+0x118/0x5e0 <3>[ 17.013360] kasan_report+0xc8/0x118 <3>[ 17.013645] kasan_check_range+0x100/0x1a8 <3>[ 17.014042] __kasan_check_write+0x20/0x30 <3>[ 17.014371] kasan_atomics_helper+0x4a0/0x49e0 <3>[ 17.014670] kasan_atomics+0x1a0/0x2e8 <3>[ 17.014981] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.015273] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.015644] kthread+0x24c/0x2d0 <3>[ 17.015908] ret_from_fork+0x10/0x20 <3>[ 17.016173] <3>[ 17.016334] Allocated by task 247: <4>[ 17.016524] kasan_save_stack+0x3c/0x68 <4>[ 17.016721] kasan_save_track+0x20/0x40 <4>[ 17.016917] kasan_save_alloc_info+0x40/0x58 <4>[ 17.017112] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.017292] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.017499] kasan_atomics+0xb8/0x2e8 <4>[ 17.017669] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.017877] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.018233] kthread+0x24c/0x2d0 <4>[ 17.018469] ret_from_fork+0x10/0x20 <3>[ 17.018671] <3>[ 17.018786] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.018786] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.019238] The buggy address is located 0 bytes to the right of <3>[ 17.019238] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.019738] <3>[ 17.019847] The buggy address belongs to the physical page: <4>[ 17.020120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.020430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.020752] page_type: 0xffffefff(slab) <4>[ 17.020954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.021308] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.021639] page dumped because: kasan: bad access detected <3>[ 17.021895] <3>[ 17.022028] Memory state around the buggy address: <3>[ 17.022292] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.022597] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.022894] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.023172] ^ <3>[ 17.023390] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.023693] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.023980] ================================================================== <3>[ 17.024418] ================================================================== <3>[ 17.024716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49e0 <3>[ 17.025000] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.025300] <3>[ 17.025419] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.025802] Hardware name: linux,dummy-virt (DT) <3>[ 17.026097] Call trace: <3>[ 17.026238] dump_backtrace+0x9c/0x128 <3>[ 17.026438] show_stack+0x20/0x38 <3>[ 17.026606] dump_stack_lvl+0x8c/0xd0 <3>[ 17.026801] print_report+0x118/0x5e0 <3>[ 17.026979] kasan_report+0xc8/0x118 <3>[ 17.027148] kasan_check_range+0x100/0x1a8 <3>[ 17.027334] __kasan_check_write+0x20/0x30 <3>[ 17.027534] kasan_atomics_helper+0x50c/0x49e0 <3>[ 17.027735] kasan_atomics+0x1a0/0x2e8 <3>[ 17.027913] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.028096] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.028315] kthread+0x24c/0x2d0 <3>[ 17.028480] ret_from_fork+0x10/0x20 <3>[ 17.028652] <3>[ 17.028752] Allocated by task 247: <4>[ 17.028902] kasan_save_stack+0x3c/0x68 <4>[ 17.029081] kasan_save_track+0x20/0x40 <4>[ 17.029262] kasan_save_alloc_info+0x40/0x58 <4>[ 17.029445] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.029635] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.029837] kasan_atomics+0xb8/0x2e8 <4>[ 17.030058] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.030253] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.030483] kthread+0x24c/0x2d0 <4>[ 17.030638] ret_from_fork+0x10/0x20 <3>[ 17.030812] <3>[ 17.030916] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.030916] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.031348] The buggy address is located 0 bytes to the right of <3>[ 17.031348] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.031788] <3>[ 17.031885] The buggy address belongs to the physical page: <4>[ 17.032108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.032403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.032660] page_type: 0xffffefff(slab) <4>[ 17.032847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.033139] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.033423] page dumped because: kasan: bad access detected <3>[ 17.033637] <3>[ 17.033735] Memory state around the buggy address: <3>[ 17.033980] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.034255] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.034527] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.034785] ^ <3>[ 17.034981] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.035278] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.035579] ================================================================== <3>[ 17.036104] ================================================================== <3>[ 17.036479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49e0 <3>[ 17.036839] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.037207] <3>[ 17.037335] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.037690] Hardware name: linux,dummy-virt (DT) <3>[ 17.037902] Call trace: <3>[ 17.038065] dump_backtrace+0x9c/0x128 <3>[ 17.038261] show_stack+0x20/0x38 <3>[ 17.038423] dump_stack_lvl+0x8c/0xd0 <3>[ 17.038607] print_report+0x118/0x5e0 <3>[ 17.038776] kasan_report+0xc8/0x118 <3>[ 17.038946] kasan_check_range+0x100/0x1a8 <3>[ 17.039126] __kasan_check_write+0x20/0x30 <3>[ 17.039303] kasan_atomics_helper+0x578/0x49e0 <3>[ 17.039487] kasan_atomics+0x1a0/0x2e8 <3>[ 17.039658] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.039839] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.040060] kthread+0x24c/0x2d0 <3>[ 17.040248] ret_from_fork+0x10/0x20 <3>[ 17.040423] <3>[ 17.040523] Allocated by task 247: <4>[ 17.040677] kasan_save_stack+0x3c/0x68 <4>[ 17.040857] kasan_save_track+0x20/0x40 <4>[ 17.041040] kasan_save_alloc_info+0x40/0x58 <4>[ 17.041228] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.041410] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.041608] kasan_atomics+0xb8/0x2e8 <4>[ 17.041783] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.042026] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.042264] kthread+0x24c/0x2d0 <4>[ 17.042470] ret_from_fork+0x10/0x20 <3>[ 17.042659] <3>[ 17.042759] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.042759] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.043189] The buggy address is located 0 bytes to the right of <3>[ 17.043189] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.043642] <3>[ 17.043747] The buggy address belongs to the physical page: <4>[ 17.043986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.044309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.044567] page_type: 0xffffefff(slab) <4>[ 17.044763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.045099] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.045407] page dumped because: kasan: bad access detected <3>[ 17.045628] <3>[ 17.045732] Memory state around the buggy address: <3>[ 17.046005] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.046297] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.046563] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.046822] ^ <3>[ 17.047042] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.047432] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.047833] ================================================================== <3>[ 17.048504] ================================================================== <3>[ 17.048938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49e0 <3>[ 17.049309] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.049680] <3>[ 17.049835] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.050424] Hardware name: linux,dummy-virt (DT) <3>[ 17.050671] Call trace: <3>[ 17.050841] dump_backtrace+0x9c/0x128 <3>[ 17.051077] show_stack+0x20/0x38 <3>[ 17.051290] dump_stack_lvl+0x8c/0xd0 <3>[ 17.051523] print_report+0x118/0x5e0 <3>[ 17.051746] kasan_report+0xc8/0x118 <3>[ 17.051983] kasan_check_range+0x100/0x1a8 <3>[ 17.052221] __kasan_check_write+0x20/0x30 <3>[ 17.052456] kasan_atomics_helper+0x5e4/0x49e0 <3>[ 17.052713] kasan_atomics+0x1a0/0x2e8 <3>[ 17.052924] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.053110] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.053347] kthread+0x24c/0x2d0 <3>[ 17.053512] ret_from_fork+0x10/0x20 <3>[ 17.053698] <3>[ 17.053820] Allocated by task 247: <4>[ 17.054117] kasan_save_stack+0x3c/0x68 <4>[ 17.054392] kasan_save_track+0x20/0x40 <4>[ 17.054581] kasan_save_alloc_info+0x40/0x58 <4>[ 17.054782] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.054964] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.055182] kasan_atomics+0xb8/0x2e8 <4>[ 17.055386] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.055597] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.055868] kthread+0x24c/0x2d0 <4>[ 17.056060] ret_from_fork+0x10/0x20 <3>[ 17.056259] <3>[ 17.056380] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.056380] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.056886] The buggy address is located 0 bytes to the right of <3>[ 17.056886] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.057384] <3>[ 17.057508] The buggy address belongs to the physical page: <4>[ 17.057734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.058207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.058521] page_type: 0xffffefff(slab) <4>[ 17.058756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.059082] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.059411] page dumped because: kasan: bad access detected <3>[ 17.059667] <3>[ 17.059790] Memory state around the buggy address: <3>[ 17.060024] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.060350] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.060664] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.060974] ^ <3>[ 17.061217] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.061529] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.061840] ================================================================== <3>[ 17.062438] ================================================================== <3>[ 17.062727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49e0 <3>[ 17.063090] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.063411] <3>[ 17.063526] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.063944] Hardware name: linux,dummy-virt (DT) <3>[ 17.064163] Call trace: <3>[ 17.064304] dump_backtrace+0x9c/0x128 <3>[ 17.064495] show_stack+0x20/0x38 <3>[ 17.064690] dump_stack_lvl+0x8c/0xd0 <3>[ 17.064874] print_report+0x118/0x5e0 <3>[ 17.065077] kasan_report+0xc8/0x118 <3>[ 17.065275] kasan_check_range+0x100/0x1a8 <3>[ 17.065481] __kasan_check_write+0x20/0x30 <3>[ 17.065699] kasan_atomics_helper+0x650/0x49e0 <3>[ 17.065975] kasan_atomics+0x1a0/0x2e8 <3>[ 17.066267] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.066510] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.066754] kthread+0x24c/0x2d0 <3>[ 17.066934] ret_from_fork+0x10/0x20 <3>[ 17.067122] <3>[ 17.067222] Allocated by task 247: <4>[ 17.067383] kasan_save_stack+0x3c/0x68 <4>[ 17.067597] kasan_save_track+0x20/0x40 <4>[ 17.067784] kasan_save_alloc_info+0x40/0x58 <4>[ 17.067996] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.068196] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.068422] kasan_atomics+0xb8/0x2e8 <4>[ 17.068639] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.068859] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.069129] kthread+0x24c/0x2d0 <4>[ 17.069344] ret_from_fork+0x10/0x20 <3>[ 17.069542] <3>[ 17.069667] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.069667] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.070302] The buggy address is located 0 bytes to the right of <3>[ 17.070302] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.070835] <3>[ 17.070960] The buggy address belongs to the physical page: <4>[ 17.071207] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.071558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.071858] page_type: 0xffffefff(slab) <4>[ 17.072074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.072405] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.072703] page dumped because: kasan: bad access detected <3>[ 17.072943] <3>[ 17.073046] Memory state around the buggy address: <3>[ 17.073235] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.073566] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.073925] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.074273] ^ <3>[ 17.074526] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.074842] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.075176] ================================================================== <3>[ 17.075670] ================================================================== <3>[ 17.075984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49e0 <3>[ 17.076316] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.076640] <3>[ 17.076761] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.077192] Hardware name: linux,dummy-virt (DT) <3>[ 17.077407] Call trace: <3>[ 17.077538] dump_backtrace+0x9c/0x128 <3>[ 17.077719] show_stack+0x20/0x38 <3>[ 17.077919] dump_stack_lvl+0x8c/0xd0 <3>[ 17.078133] print_report+0x118/0x5e0 <3>[ 17.078365] kasan_report+0xc8/0x118 <3>[ 17.078576] kasan_check_range+0x100/0x1a8 <3>[ 17.078802] __kasan_check_write+0x20/0x30 <3>[ 17.079014] kasan_atomics_helper+0x6bc/0x49e0 <3>[ 17.079249] kasan_atomics+0x1a0/0x2e8 <3>[ 17.079453] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.079697] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.079945] kthread+0x24c/0x2d0 <3>[ 17.080126] ret_from_fork+0x10/0x20 <3>[ 17.080316] <3>[ 17.080418] Allocated by task 247: <4>[ 17.080583] kasan_save_stack+0x3c/0x68 <4>[ 17.080791] kasan_save_track+0x20/0x40 <4>[ 17.080983] kasan_save_alloc_info+0x40/0x58 <4>[ 17.081199] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.081390] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.081599] kasan_atomics+0xb8/0x2e8 <4>[ 17.081784] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.082061] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.082334] kthread+0x24c/0x2d0 <4>[ 17.082510] ret_from_fork+0x10/0x20 <3>[ 17.082678] <3>[ 17.082780] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.082780] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.083237] The buggy address is located 0 bytes to the right of <3>[ 17.083237] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.083713] <3>[ 17.083825] The buggy address belongs to the physical page: <4>[ 17.084059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.084376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.084650] page_type: 0xffffefff(slab) <4>[ 17.084848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.085142] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.085458] page dumped because: kasan: bad access detected <3>[ 17.085690] <3>[ 17.085805] Memory state around the buggy address: <3>[ 17.086142] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.086929] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.087455] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.087914] ^ <3>[ 17.088275] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.088731] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.089151] ================================================================== <3>[ 17.089795] ================================================================== <3>[ 17.090316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49e0 <3>[ 17.090662] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.090928] <3>[ 17.091028] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.091402] Hardware name: linux,dummy-virt (DT) <3>[ 17.091593] Call trace: <3>[ 17.091716] dump_backtrace+0x9c/0x128 <3>[ 17.091888] show_stack+0x20/0x38 <3>[ 17.092053] dump_stack_lvl+0x8c/0xd0 <3>[ 17.092222] print_report+0x118/0x5e0 <3>[ 17.092392] kasan_report+0xc8/0x118 <3>[ 17.092583] kasan_check_range+0x100/0x1a8 <3>[ 17.092794] __kasan_check_write+0x20/0x30 <3>[ 17.093003] kasan_atomics_helper+0x728/0x49e0 <3>[ 17.093238] kasan_atomics+0x1a0/0x2e8 <3>[ 17.093417] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.093638] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.093915] kthread+0x24c/0x2d0 <3>[ 17.094165] ret_from_fork+0x10/0x20 <3>[ 17.094357] <3>[ 17.094455] Allocated by task 247: <4>[ 17.094619] kasan_save_stack+0x3c/0x68 <4>[ 17.094798] kasan_save_track+0x20/0x40 <4>[ 17.094998] kasan_save_alloc_info+0x40/0x58 <4>[ 17.095189] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.095369] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.095555] kasan_atomics+0xb8/0x2e8 <4>[ 17.095730] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.095923] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.096142] kthread+0x24c/0x2d0 <4>[ 17.096299] ret_from_fork+0x10/0x20 <3>[ 17.096481] <3>[ 17.096576] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.096576] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.097005] The buggy address is located 0 bytes to the right of <3>[ 17.097005] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.097441] <3>[ 17.097537] The buggy address belongs to the physical page: <4>[ 17.097741] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.098168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.098448] page_type: 0xffffefff(slab) <4>[ 17.098634] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.098934] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.099207] page dumped because: kasan: bad access detected <3>[ 17.099413] <3>[ 17.099508] Memory state around the buggy address: <3>[ 17.099694] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.099968] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.100232] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.100489] ^ <3>[ 17.100681] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.100954] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.101209] ================================================================== <3>[ 17.101657] ================================================================== <3>[ 17.102018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49e0 <3>[ 17.102359] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.102728] <3>[ 17.102832] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.103298] Hardware name: linux,dummy-virt (DT) <3>[ 17.103507] Call trace: <3>[ 17.103649] dump_backtrace+0x9c/0x128 <3>[ 17.103845] show_stack+0x20/0x38 <3>[ 17.104030] dump_stack_lvl+0x8c/0xd0 <3>[ 17.104232] print_report+0x118/0x5e0 <3>[ 17.104432] kasan_report+0xc8/0x118 <3>[ 17.104626] kasan_check_range+0x100/0x1a8 <3>[ 17.104864] __kasan_check_write+0x20/0x30 <3>[ 17.105079] kasan_atomics_helper+0x7a0/0x49e0 <3>[ 17.105304] kasan_atomics+0x1a0/0x2e8 <3>[ 17.105511] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.105716] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.106079] kthread+0x24c/0x2d0 <3>[ 17.106310] ret_from_fork+0x10/0x20 <3>[ 17.106506] <3>[ 17.106619] Allocated by task 247: <4>[ 17.106807] kasan_save_stack+0x3c/0x68 <4>[ 17.107010] kasan_save_track+0x20/0x40 <4>[ 17.107212] kasan_save_alloc_info+0x40/0x58 <4>[ 17.107420] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.107623] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.107840] kasan_atomics+0xb8/0x2e8 <4>[ 17.108034] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.108237] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.108476] kthread+0x24c/0x2d0 <4>[ 17.108655] ret_from_fork+0x10/0x20 <3>[ 17.108843] <3>[ 17.108955] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.108955] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.109387] The buggy address is located 0 bytes to the right of <3>[ 17.109387] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.109850] <3>[ 17.109975] The buggy address belongs to the physical page: <4>[ 17.110199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.110522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.110794] page_type: 0xffffefff(slab) <4>[ 17.110984] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.111286] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.111567] page dumped because: kasan: bad access detected <3>[ 17.111790] <3>[ 17.111896] Memory state around the buggy address: <3>[ 17.112097] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.112371] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.112650] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.112925] ^ <3>[ 17.113134] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.113409] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.113691] ================================================================== <3>[ 17.114177] ================================================================== <3>[ 17.114494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49e0 <3>[ 17.114794] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.115090] <3>[ 17.115220] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.115619] Hardware name: linux,dummy-virt (DT) <3>[ 17.115817] Call trace: <3>[ 17.115956] dump_backtrace+0x9c/0x128 <3>[ 17.116166] show_stack+0x20/0x38 <3>[ 17.116344] dump_stack_lvl+0x8c/0xd0 <3>[ 17.116528] print_report+0x118/0x5e0 <3>[ 17.116721] kasan_report+0xc8/0x118 <3>[ 17.116903] kasan_check_range+0x100/0x1a8 <3>[ 17.117104] __kasan_check_write+0x20/0x30 <3>[ 17.117311] kasan_atomics_helper+0x810/0x49e0 <3>[ 17.117529] kasan_atomics+0x1a0/0x2e8 <3>[ 17.117715] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.117990] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.118258] kthread+0x24c/0x2d0 <3>[ 17.118454] ret_from_fork+0x10/0x20 <3>[ 17.118808] <3>[ 17.119044] Allocated by task 247: <4>[ 17.119252] kasan_save_stack+0x3c/0x68 <4>[ 17.119444] kasan_save_track+0x20/0x40 <4>[ 17.119633] kasan_save_alloc_info+0x40/0x58 <4>[ 17.119824] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.119995] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.120186] kasan_atomics+0xb8/0x2e8 <4>[ 17.120362] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.120553] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.120785] kthread+0x24c/0x2d0 <4>[ 17.120948] ret_from_fork+0x10/0x20 <3>[ 17.121113] <3>[ 17.121212] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.121212] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.121640] The buggy address is located 0 bytes to the right of <3>[ 17.121640] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.122497] <3>[ 17.122646] The buggy address belongs to the physical page: <4>[ 17.122960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.123398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.123706] page_type: 0xffffefff(slab) <4>[ 17.123927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.124234] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.124577] page dumped because: kasan: bad access detected <3>[ 17.124821] <3>[ 17.124921] Memory state around the buggy address: <3>[ 17.125130] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.125419] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.125710] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.126160] ^ <3>[ 17.126444] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.126749] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.127029] ================================================================== <3>[ 17.127493] ================================================================== <3>[ 17.127771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49e0 <3>[ 17.128048] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.128329] <3>[ 17.128426] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.128792] Hardware name: linux,dummy-virt (DT) <3>[ 17.128985] Call trace: <3>[ 17.129107] dump_backtrace+0x9c/0x128 <3>[ 17.129291] show_stack+0x20/0x38 <3>[ 17.129452] dump_stack_lvl+0x8c/0xd0 <3>[ 17.129625] print_report+0x118/0x5e0 <3>[ 17.129799] kasan_report+0xc8/0x118 <3>[ 17.130045] kasan_check_range+0x100/0x1a8 <3>[ 17.130252] __kasan_check_write+0x20/0x30 <3>[ 17.130447] kasan_atomics_helper+0x8d8/0x49e0 <3>[ 17.130661] kasan_atomics+0x1a0/0x2e8 <3>[ 17.130849] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.131037] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.131264] kthread+0x24c/0x2d0 <3>[ 17.131432] ret_from_fork+0x10/0x20 <3>[ 17.131600] <3>[ 17.131700] Allocated by task 247: <4>[ 17.131852] kasan_save_stack+0x3c/0x68 <4>[ 17.132037] kasan_save_track+0x20/0x40 <4>[ 17.132220] kasan_save_alloc_info+0x40/0x58 <4>[ 17.132426] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.132606] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.132797] kasan_atomics+0xb8/0x2e8 <4>[ 17.132970] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.133158] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.133388] kthread+0x24c/0x2d0 <4>[ 17.133543] ret_from_fork+0x10/0x20 <3>[ 17.133709] <3>[ 17.133806] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.133806] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.134301] The buggy address is located 0 bytes to the right of <3>[ 17.134301] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.134766] <3>[ 17.134864] The buggy address belongs to the physical page: <4>[ 17.135109] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.135518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.135864] page_type: 0xffffefff(slab) <4>[ 17.136091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.136424] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.136703] page dumped because: kasan: bad access detected <3>[ 17.136931] <3>[ 17.137029] Memory state around the buggy address: <3>[ 17.137229] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.137501] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.137763] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.138119] ^ <3>[ 17.138333] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.138601] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.138863] ================================================================== <3>[ 17.139232] ================================================================== <3>[ 17.139497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4458/0x49e0 <3>[ 17.139762] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.140066] <3>[ 17.140177] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.140535] Hardware name: linux,dummy-virt (DT) <3>[ 17.140716] Call trace: <3>[ 17.140843] dump_backtrace+0x9c/0x128 <3>[ 17.141021] show_stack+0x20/0x38 <3>[ 17.141182] dump_stack_lvl+0x8c/0xd0 <3>[ 17.141353] print_report+0x118/0x5e0 <3>[ 17.141525] kasan_report+0xc8/0x118 <3>[ 17.141693] __asan_report_load4_noabort+0x20/0x30 <3>[ 17.141966] kasan_atomics_helper+0x4458/0x49e0 <3>[ 17.142196] kasan_atomics+0x1a0/0x2e8 <3>[ 17.142394] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.142599] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.142830] kthread+0x24c/0x2d0 <3>[ 17.142993] ret_from_fork+0x10/0x20 <3>[ 17.143168] <3>[ 17.143275] Allocated by task 247: <4>[ 17.143444] kasan_save_stack+0x3c/0x68 <4>[ 17.143654] kasan_save_track+0x20/0x40 <4>[ 17.143847] kasan_save_alloc_info+0x40/0x58 <4>[ 17.144096] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.144352] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.144629] kasan_atomics+0xb8/0x2e8 <4>[ 17.144874] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.145091] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.145325] kthread+0x24c/0x2d0 <4>[ 17.145488] ret_from_fork+0x10/0x20 <3>[ 17.145658] <3>[ 17.145763] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.145763] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.146300] The buggy address is located 0 bytes to the right of <3>[ 17.146300] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.146834] <3>[ 17.146979] The buggy address belongs to the physical page: <4>[ 17.147287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.147661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.147914] page_type: 0xffffefff(slab) <4>[ 17.148103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.148382] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.148674] page dumped because: kasan: bad access detected <3>[ 17.148888] <3>[ 17.148989] Memory state around the buggy address: <3>[ 17.149231] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.149598] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.150012] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.150305] ^ <3>[ 17.150520] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.150813] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.151161] ================================================================== <3>[ 17.151693] ================================================================== <3>[ 17.152009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49e0 <3>[ 17.152331] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.152701] <3>[ 17.152834] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.153278] Hardware name: linux,dummy-virt (DT) <3>[ 17.153515] Call trace: <3>[ 17.153677] dump_backtrace+0x9c/0x128 <3>[ 17.153969] show_stack+0x20/0x38 <3>[ 17.154165] dump_stack_lvl+0x8c/0xd0 <3>[ 17.154350] print_report+0x118/0x5e0 <3>[ 17.154544] kasan_report+0xc8/0x118 <3>[ 17.154723] kasan_check_range+0x100/0x1a8 <3>[ 17.154917] __kasan_check_write+0x20/0x30 <3>[ 17.155103] kasan_atomics_helper+0x978/0x49e0 <3>[ 17.155301] kasan_atomics+0x1a0/0x2e8 <3>[ 17.155475] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.155673] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.155907] kthread+0x24c/0x2d0 <3>[ 17.156069] ret_from_fork+0x10/0x20 <3>[ 17.156248] <3>[ 17.156349] Allocated by task 247: <4>[ 17.156511] kasan_save_stack+0x3c/0x68 <4>[ 17.156698] kasan_save_track+0x20/0x40 <4>[ 17.156902] kasan_save_alloc_info+0x40/0x58 <4>[ 17.157109] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.157301] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.157515] kasan_atomics+0xb8/0x2e8 <4>[ 17.157698] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.157987] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.158339] kthread+0x24c/0x2d0 <4>[ 17.158565] ret_from_fork+0x10/0x20 <3>[ 17.158802] <3>[ 17.158911] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.158911] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.159323] The buggy address is located 0 bytes to the right of <3>[ 17.159323] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.159788] <3>[ 17.159906] The buggy address belongs to the physical page: <4>[ 17.160160] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.160481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.160779] page_type: 0xffffefff(slab) <4>[ 17.160995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.161319] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.161615] page dumped because: kasan: bad access detected <3>[ 17.161887] <3>[ 17.162048] Memory state around the buggy address: <3>[ 17.162275] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.162549] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.162820] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.163088] ^ <3>[ 17.163293] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.163613] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.163938] ================================================================== <3>[ 17.164418] ================================================================== <3>[ 17.164725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49e0 <3>[ 17.165024] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.165364] <3>[ 17.165468] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.165975] Hardware name: linux,dummy-virt (DT) <3>[ 17.166241] Call trace: <3>[ 17.166379] dump_backtrace+0x9c/0x128 <3>[ 17.166612] show_stack+0x20/0x38 <3>[ 17.166776] dump_stack_lvl+0x8c/0xd0 <3>[ 17.166959] print_report+0x118/0x5e0 <3>[ 17.167140] kasan_report+0xc8/0x118 <3>[ 17.167324] kasan_check_range+0x100/0x1a8 <3>[ 17.167524] __kasan_check_write+0x20/0x30 <3>[ 17.167710] kasan_atomics_helper+0x9e4/0x49e0 <3>[ 17.167909] kasan_atomics+0x1a0/0x2e8 <3>[ 17.168085] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.168335] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.168600] kthread+0x24c/0x2d0 <3>[ 17.168789] ret_from_fork+0x10/0x20 <3>[ 17.169003] <3>[ 17.169120] Allocated by task 247: <4>[ 17.169323] kasan_save_stack+0x3c/0x68 <4>[ 17.169528] kasan_save_track+0x20/0x40 <4>[ 17.169762] kasan_save_alloc_info+0x40/0x58 <4>[ 17.170054] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.170262] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.170506] kasan_atomics+0xb8/0x2e8 <4>[ 17.170701] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.170940] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.171206] kthread+0x24c/0x2d0 <4>[ 17.171390] ret_from_fork+0x10/0x20 <3>[ 17.171592] <3>[ 17.171711] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.171711] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.172214] The buggy address is located 0 bytes to the right of <3>[ 17.172214] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.172668] <3>[ 17.172766] The buggy address belongs to the physical page: <4>[ 17.172970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.173268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.173571] page_type: 0xffffefff(slab) <4>[ 17.173788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.174243] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.174567] page dumped because: kasan: bad access detected <3>[ 17.174829] <3>[ 17.174951] Memory state around the buggy address: <3>[ 17.175183] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.175511] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.175828] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.176136] ^ <3>[ 17.176385] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.176698] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.177014] ================================================================== <3>[ 17.177443] ================================================================== <3>[ 17.177711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49e0 <3>[ 17.178133] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.178462] <3>[ 17.178578] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.178993] Hardware name: linux,dummy-virt (DT) <3>[ 17.179208] Call trace: <3>[ 17.179367] dump_backtrace+0x9c/0x128 <3>[ 17.179587] show_stack+0x20/0x38 <3>[ 17.179778] dump_stack_lvl+0x8c/0xd0 <3>[ 17.179999] print_report+0x118/0x5e0 <3>[ 17.180199] kasan_report+0xc8/0x118 <3>[ 17.180419] kasan_check_range+0x100/0x1a8 <3>[ 17.180633] __kasan_check_write+0x20/0x30 <3>[ 17.180866] kasan_atomics_helper+0xa50/0x49e0 <3>[ 17.181084] kasan_atomics+0x1a0/0x2e8 <3>[ 17.181295] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.181490] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.181728] kthread+0x24c/0x2d0 <3>[ 17.181950] ret_from_fork+0x10/0x20 <3>[ 17.182153] <3>[ 17.182273] Allocated by task 247: <4>[ 17.182457] kasan_save_stack+0x3c/0x68 <4>[ 17.182633] kasan_save_track+0x20/0x40 <4>[ 17.182829] kasan_save_alloc_info+0x40/0x58 <4>[ 17.183036] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.183239] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.183453] kasan_atomics+0xb8/0x2e8 <4>[ 17.183636] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.183833] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.184083] kthread+0x24c/0x2d0 <4>[ 17.184255] ret_from_fork+0x10/0x20 <3>[ 17.184436] <3>[ 17.184535] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.184535] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.184962] The buggy address is located 0 bytes to the right of <3>[ 17.184962] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.185408] <3>[ 17.185518] The buggy address belongs to the physical page: <4>[ 17.185748] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.186233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.186499] page_type: 0xffffefff(slab) <4>[ 17.186694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.187001] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.187293] page dumped because: kasan: bad access detected <3>[ 17.187508] <3>[ 17.187604] Memory state around the buggy address: <3>[ 17.187821] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.188114] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.188421] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.188695] ^ <3>[ 17.188927] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.189236] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.189555] ================================================================== <3>[ 17.190064] ================================================================== <3>[ 17.190392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49e0 <3>[ 17.190702] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.191028] <3>[ 17.191148] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.191564] Hardware name: linux,dummy-virt (DT) <3>[ 17.191791] Call trace: <3>[ 17.191941] dump_backtrace+0x9c/0x128 <3>[ 17.192145] show_stack+0x20/0x38 <3>[ 17.192330] dump_stack_lvl+0x8c/0xd0 <3>[ 17.192507] print_report+0x118/0x5e0 <3>[ 17.192701] kasan_report+0xc8/0x118 <3>[ 17.192865] kasan_check_range+0x100/0x1a8 <3>[ 17.193058] __kasan_check_write+0x20/0x30 <3>[ 17.193242] kasan_atomics_helper+0xabc/0x49e0 <3>[ 17.193452] kasan_atomics+0x1a0/0x2e8 <3>[ 17.193674] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.193923] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.194248] kthread+0x24c/0x2d0 <3>[ 17.194456] ret_from_fork+0x10/0x20 <3>[ 17.194651] <3>[ 17.194777] Allocated by task 247: <4>[ 17.194958] kasan_save_stack+0x3c/0x68 <4>[ 17.195192] kasan_save_track+0x20/0x40 <4>[ 17.195404] kasan_save_alloc_info+0x40/0x58 <4>[ 17.195640] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.195850] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.196080] kasan_atomics+0xb8/0x2e8 <4>[ 17.196293] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.196517] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.196790] kthread+0x24c/0x2d0 <4>[ 17.196976] ret_from_fork+0x10/0x20 <3>[ 17.197194] <3>[ 17.197315] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.197315] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.197771] The buggy address is located 0 bytes to the right of <3>[ 17.197771] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.198448] <3>[ 17.198587] The buggy address belongs to the physical page: <4>[ 17.198818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.199158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.199438] page_type: 0xffffefff(slab) <4>[ 17.199654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.199973] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.200280] page dumped because: kasan: bad access detected <3>[ 17.200525] <3>[ 17.200624] Memory state around the buggy address: <3>[ 17.200851] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.201150] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.201454] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.201743] ^ <3>[ 17.202031] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.202346] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.202616] ================================================================== <3>[ 17.203076] ================================================================== <3>[ 17.203446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49e0 <3>[ 17.203817] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.204096] <3>[ 17.204198] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.204607] Hardware name: linux,dummy-virt (DT) <3>[ 17.204810] Call trace: <3>[ 17.204949] dump_backtrace+0x9c/0x128 <3>[ 17.205160] show_stack+0x20/0x38 <3>[ 17.205346] dump_stack_lvl+0x8c/0xd0 <3>[ 17.205527] print_report+0x118/0x5e0 <3>[ 17.205736] kasan_report+0xc8/0x118 <3>[ 17.205995] kasan_check_range+0x100/0x1a8 <3>[ 17.206348] __kasan_check_write+0x20/0x30 <3>[ 17.206641] kasan_atomics_helper+0xb28/0x49e0 <3>[ 17.206871] kasan_atomics+0x1a0/0x2e8 <3>[ 17.207069] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.207306] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.207538] kthread+0x24c/0x2d0 <3>[ 17.207711] ret_from_fork+0x10/0x20 <3>[ 17.207918] <3>[ 17.208060] Allocated by task 247: <4>[ 17.208278] kasan_save_stack+0x3c/0x68 <4>[ 17.208555] kasan_save_track+0x20/0x40 <4>[ 17.208767] kasan_save_alloc_info+0x40/0x58 <4>[ 17.209003] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.209202] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.209433] kasan_atomics+0xb8/0x2e8 <4>[ 17.209653] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.209929] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.210262] kthread+0x24c/0x2d0 <4>[ 17.210429] ret_from_fork+0x10/0x20 <3>[ 17.210606] <3>[ 17.210706] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.210706] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.211134] The buggy address is located 0 bytes to the right of <3>[ 17.211134] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.211581] <3>[ 17.211676] The buggy address belongs to the physical page: <4>[ 17.211878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.212163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.212449] page_type: 0xffffefff(slab) <4>[ 17.212638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.212942] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.213244] page dumped because: kasan: bad access detected <3>[ 17.213486] <3>[ 17.213598] Memory state around the buggy address: <3>[ 17.213847] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.214264] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.214566] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.214871] ^ <3>[ 17.215096] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.215411] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.215706] ================================================================== <3>[ 17.216260] ================================================================== <3>[ 17.216567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49e0 <3>[ 17.216883] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.217189] <3>[ 17.217293] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.217688] Hardware name: linux,dummy-virt (DT) <3>[ 17.217915] Call trace: <3>[ 17.218088] dump_backtrace+0x9c/0x128 <3>[ 17.218305] show_stack+0x20/0x38 <3>[ 17.218495] dump_stack_lvl+0x8c/0xd0 <3>[ 17.218706] print_report+0x118/0x5e0 <3>[ 17.218934] kasan_report+0xc8/0x118 <3>[ 17.219111] __asan_report_load4_noabort+0x20/0x30 <3>[ 17.219331] kasan_atomics_helper+0x3f4c/0x49e0 <3>[ 17.219535] kasan_atomics+0x1a0/0x2e8 <3>[ 17.219715] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.219917] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.220140] kthread+0x24c/0x2d0 <3>[ 17.220315] ret_from_fork+0x10/0x20 <3>[ 17.220579] <3>[ 17.220730] Allocated by task 247: <4>[ 17.220925] kasan_save_stack+0x3c/0x68 <4>[ 17.221115] kasan_save_track+0x20/0x40 <4>[ 17.221303] kasan_save_alloc_info+0x40/0x58 <4>[ 17.221503] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.221684] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.221999] kasan_atomics+0xb8/0x2e8 <4>[ 17.222247] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.222473] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.222713] kthread+0x24c/0x2d0 <4>[ 17.222902] ret_from_fork+0x10/0x20 <3>[ 17.223079] <3>[ 17.223206] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.223206] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.223696] The buggy address is located 0 bytes to the right of <3>[ 17.223696] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.224182] <3>[ 17.224305] The buggy address belongs to the physical page: <4>[ 17.224544] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.224903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.225221] page_type: 0xffffefff(slab) <4>[ 17.225420] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.225714] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.226068] page dumped because: kasan: bad access detected <3>[ 17.226330] <3>[ 17.226428] Memory state around the buggy address: <3>[ 17.226617] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.226879] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.227135] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.227403] ^ <3>[ 17.227599] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.227875] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.228129] ================================================================== <3>[ 17.228556] ================================================================== <3>[ 17.228834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49e0 <3>[ 17.229118] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.229390] <3>[ 17.229488] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.229851] Hardware name: linux,dummy-virt (DT) <3>[ 17.230076] Call trace: <3>[ 17.230229] dump_backtrace+0x9c/0x128 <3>[ 17.230409] show_stack+0x20/0x38 <3>[ 17.230575] dump_stack_lvl+0x8c/0xd0 <3>[ 17.230748] print_report+0x118/0x5e0 <3>[ 17.230937] kasan_report+0xc8/0x118 <3>[ 17.231124] kasan_check_range+0x100/0x1a8 <3>[ 17.231313] __kasan_check_write+0x20/0x30 <3>[ 17.231496] kasan_atomics_helper+0xbc8/0x49e0 <3>[ 17.231687] kasan_atomics+0x1a0/0x2e8 <3>[ 17.231859] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.232040] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.232260] kthread+0x24c/0x2d0 <3>[ 17.232416] ret_from_fork+0x10/0x20 <3>[ 17.232585] <3>[ 17.232680] Allocated by task 247: <4>[ 17.232828] kasan_save_stack+0x3c/0x68 <4>[ 17.233023] kasan_save_track+0x20/0x40 <4>[ 17.233212] kasan_save_alloc_info+0x40/0x58 <4>[ 17.233400] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.233582] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.233774] kasan_atomics+0xb8/0x2e8 <4>[ 17.234014] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.234256] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.234476] kthread+0x24c/0x2d0 <4>[ 17.234636] ret_from_fork+0x10/0x20 <3>[ 17.234818] <3>[ 17.234922] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.234922] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.235370] The buggy address is located 0 bytes to the right of <3>[ 17.235370] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.235997] <3>[ 17.236153] The buggy address belongs to the physical page: <4>[ 17.236470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.236815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.237067] page_type: 0xffffefff(slab) <4>[ 17.237245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.237531] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.237799] page dumped because: kasan: bad access detected <3>[ 17.238085] <3>[ 17.238221] Memory state around the buggy address: <3>[ 17.238421] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.238684] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.238939] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.239190] ^ <3>[ 17.239379] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.239657] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.239907] ================================================================== <3>[ 17.240278] ================================================================== <3>[ 17.240555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f3c/0x49e0 <3>[ 17.240843] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.241105] <3>[ 17.241203] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.241555] Hardware name: linux,dummy-virt (DT) <3>[ 17.241739] Call trace: <3>[ 17.241885] dump_backtrace+0x9c/0x128 <3>[ 17.242114] show_stack+0x20/0x38 <3>[ 17.242286] dump_stack_lvl+0x8c/0xd0 <3>[ 17.242471] print_report+0x118/0x5e0 <3>[ 17.242661] kasan_report+0xc8/0x118 <3>[ 17.242834] __asan_report_load4_noabort+0x20/0x30 <3>[ 17.243043] kasan_atomics_helper+0x3f3c/0x49e0 <3>[ 17.243242] kasan_atomics+0x1a0/0x2e8 <3>[ 17.243427] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.243631] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.243873] kthread+0x24c/0x2d0 <3>[ 17.244038] ret_from_fork+0x10/0x20 <3>[ 17.244230] <3>[ 17.244339] Allocated by task 247: <4>[ 17.244492] kasan_save_stack+0x3c/0x68 <4>[ 17.244682] kasan_save_track+0x20/0x40 <4>[ 17.244874] kasan_save_alloc_info+0x40/0x58 <4>[ 17.245077] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.245248] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.245444] kasan_atomics+0xb8/0x2e8 <4>[ 17.245616] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.245808] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.246141] kthread+0x24c/0x2d0 <4>[ 17.246344] ret_from_fork+0x10/0x20 <3>[ 17.246514] <3>[ 17.246618] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.246618] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.247125] The buggy address is located 0 bytes to the right of <3>[ 17.247125] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.247787] <3>[ 17.247946] The buggy address belongs to the physical page: <4>[ 17.248249] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.248664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.249014] page_type: 0xffffefff(slab) <4>[ 17.249265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.249695] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.250329] page dumped because: kasan: bad access detected <3>[ 17.250672] <3>[ 17.250824] Memory state around the buggy address: <3>[ 17.251101] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.251531] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.251923] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.252314] ^ <3>[ 17.252592] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.252987] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.253371] ================================================================== <3>[ 17.254027] ================================================================== <3>[ 17.254494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49e0 <3>[ 17.254875] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.255208] <3>[ 17.255322] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.255688] Hardware name: linux,dummy-virt (DT) <3>[ 17.255904] Call trace: <3>[ 17.256044] dump_backtrace+0x9c/0x128 <3>[ 17.256235] show_stack+0x20/0x38 <3>[ 17.256409] dump_stack_lvl+0x8c/0xd0 <3>[ 17.256601] print_report+0x118/0x5e0 <3>[ 17.256791] kasan_report+0xc8/0x118 <3>[ 17.256998] kasan_check_range+0x100/0x1a8 <3>[ 17.257209] __kasan_check_write+0x20/0x30 <3>[ 17.257403] kasan_atomics_helper+0xc64/0x49e0 <3>[ 17.257610] kasan_atomics+0x1a0/0x2e8 <3>[ 17.257800] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.258083] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.258345] kthread+0x24c/0x2d0 <3>[ 17.258509] ret_from_fork+0x10/0x20 <3>[ 17.258689] <3>[ 17.258793] Allocated by task 247: <4>[ 17.258942] kasan_save_stack+0x3c/0x68 <4>[ 17.259126] kasan_save_track+0x20/0x40 <4>[ 17.259315] kasan_save_alloc_info+0x40/0x58 <4>[ 17.259514] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.259732] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.259938] kasan_atomics+0xb8/0x2e8 <4>[ 17.260143] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.260365] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.260638] kthread+0x24c/0x2d0 <4>[ 17.260829] ret_from_fork+0x10/0x20 <3>[ 17.261024] <3>[ 17.261150] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.261150] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.261625] The buggy address is located 0 bytes to the right of <3>[ 17.261625] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.262331] <3>[ 17.262434] The buggy address belongs to the physical page: <4>[ 17.262646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.262947] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.263231] page_type: 0xffffefff(slab) <4>[ 17.263432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.263757] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.264073] page dumped because: kasan: bad access detected <3>[ 17.264316] <3>[ 17.264432] Memory state around the buggy address: <3>[ 17.264636] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.264943] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.265238] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.265552] ^ <3>[ 17.265768] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.266273] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.266557] ================================================================== <3>[ 17.266925] ================================================================== <3>[ 17.267194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f64/0x49e0 <3>[ 17.267467] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.267753] <3>[ 17.267868] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.268254] Hardware name: linux,dummy-virt (DT) <3>[ 17.268462] Call trace: <3>[ 17.268607] dump_backtrace+0x9c/0x128 <3>[ 17.268795] show_stack+0x20/0x38 <3>[ 17.268978] dump_stack_lvl+0x8c/0xd0 <3>[ 17.269169] print_report+0x118/0x5e0 <3>[ 17.269386] kasan_report+0xc8/0x118 <3>[ 17.269572] __asan_report_load4_noabort+0x20/0x30 <3>[ 17.269799] kasan_atomics_helper+0x3f64/0x49e0 <3>[ 17.270086] kasan_atomics+0x1a0/0x2e8 <3>[ 17.270275] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.270468] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.270689] kthread+0x24c/0x2d0 <3>[ 17.270849] ret_from_fork+0x10/0x20 <3>[ 17.271019] <3>[ 17.271126] Allocated by task 247: <4>[ 17.271300] kasan_save_stack+0x3c/0x68 <4>[ 17.271493] kasan_save_track+0x20/0x40 <4>[ 17.271698] kasan_save_alloc_info+0x40/0x58 <4>[ 17.271906] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.272097] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.272328] kasan_atomics+0xb8/0x2e8 <4>[ 17.272509] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.272714] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.272967] kthread+0x24c/0x2d0 <4>[ 17.273139] ret_from_fork+0x10/0x20 <3>[ 17.273325] <3>[ 17.273429] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.273429] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.274083] The buggy address is located 0 bytes to the right of <3>[ 17.274083] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.274693] <3>[ 17.274799] The buggy address belongs to the physical page: <4>[ 17.275009] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.275308] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.275577] page_type: 0xffffefff(slab) <4>[ 17.275771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.276075] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.276371] page dumped because: kasan: bad access detected <3>[ 17.276599] <3>[ 17.276698] Memory state around the buggy address: <3>[ 17.276907] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.277180] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.277448] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.277707] ^ <3>[ 17.277966] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.278323] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.278634] ================================================================== <3>[ 17.279055] ================================================================== <3>[ 17.279337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49e0 <3>[ 17.279612] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.279896] <3>[ 17.280016] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.280385] Hardware name: linux,dummy-virt (DT) <3>[ 17.280587] Call trace: <3>[ 17.280724] dump_backtrace+0x9c/0x128 <3>[ 17.280904] show_stack+0x20/0x38 <3>[ 17.281065] dump_stack_lvl+0x8c/0xd0 <3>[ 17.281237] print_report+0x118/0x5e0 <3>[ 17.281414] kasan_report+0xc8/0x118 <3>[ 17.281596] kasan_check_range+0x100/0x1a8 <3>[ 17.281774] __kasan_check_write+0x20/0x30 <3>[ 17.282021] kasan_atomics_helper+0xd00/0x49e0 <3>[ 17.282236] kasan_atomics+0x1a0/0x2e8 <3>[ 17.282443] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.282630] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.282864] kthread+0x24c/0x2d0 <3>[ 17.283030] ret_from_fork+0x10/0x20 <3>[ 17.283206] <3>[ 17.283311] Allocated by task 247: <4>[ 17.283477] kasan_save_stack+0x3c/0x68 <4>[ 17.283686] kasan_save_track+0x20/0x40 <4>[ 17.283872] kasan_save_alloc_info+0x40/0x58 <4>[ 17.284081] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.284266] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.284482] kasan_atomics+0xb8/0x2e8 <4>[ 17.284662] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.284864] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.285098] kthread+0x24c/0x2d0 <4>[ 17.285270] ret_from_fork+0x10/0x20 <3>[ 17.285452] <3>[ 17.285565] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.285565] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.286135] The buggy address is located 0 bytes to the right of <3>[ 17.286135] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.286655] <3>[ 17.286769] The buggy address belongs to the physical page: <4>[ 17.287032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.287336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.287601] page_type: 0xffffefff(slab) <4>[ 17.287827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.288223] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.288569] page dumped because: kasan: bad access detected <3>[ 17.288828] <3>[ 17.288946] Memory state around the buggy address: <3>[ 17.289185] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.289549] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.289933] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.290275] ^ <3>[ 17.290475] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.290785] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.291127] ================================================================== <3>[ 17.291621] ================================================================== <3>[ 17.291936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x49e0 <3>[ 17.292248] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.292592] <3>[ 17.292726] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.293097] Hardware name: linux,dummy-virt (DT) <3>[ 17.293336] Call trace: <3>[ 17.293485] dump_backtrace+0x9c/0x128 <3>[ 17.293707] show_stack+0x20/0x38 <3>[ 17.293954] dump_stack_lvl+0x8c/0xd0 <3>[ 17.294214] print_report+0x118/0x5e0 <3>[ 17.294456] kasan_report+0xc8/0x118 <3>[ 17.294695] __asan_report_load4_noabort+0x20/0x30 <3>[ 17.294973] kasan_atomics_helper+0x3f58/0x49e0 <3>[ 17.295243] kasan_atomics+0x1a0/0x2e8 <3>[ 17.295499] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.295745] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.296025] kthread+0x24c/0x2d0 <3>[ 17.296243] ret_from_fork+0x10/0x20 <3>[ 17.296477] <3>[ 17.296612] Allocated by task 247: <4>[ 17.296822] kasan_save_stack+0x3c/0x68 <4>[ 17.297062] kasan_save_track+0x20/0x40 <4>[ 17.297298] kasan_save_alloc_info+0x40/0x58 <4>[ 17.297529] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.297709] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.297964] kasan_atomics+0xb8/0x2e8 <4>[ 17.298197] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.298394] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.298612] kthread+0x24c/0x2d0 <4>[ 17.298770] ret_from_fork+0x10/0x20 <3>[ 17.298949] <3>[ 17.299057] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.299057] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.299582] The buggy address is located 0 bytes to the right of <3>[ 17.299582] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.300137] <3>[ 17.300240] The buggy address belongs to the physical page: <4>[ 17.300455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.300755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.301080] page_type: 0xffffefff(slab) <4>[ 17.301306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.301689] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.302154] page dumped because: kasan: bad access detected <3>[ 17.302421] <3>[ 17.302523] Memory state around the buggy address: <3>[ 17.302718] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.302991] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.303251] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.303498] ^ <3>[ 17.303689] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.303972] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.304335] ================================================================== <3>[ 17.304859] ================================================================== <3>[ 17.305203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49e0 <3>[ 17.305522] Write of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.305900] <3>[ 17.306030] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.306540] Hardware name: linux,dummy-virt (DT) <3>[ 17.306810] Call trace: <3>[ 17.306975] dump_backtrace+0x9c/0x128 <3>[ 17.307185] show_stack+0x20/0x38 <3>[ 17.307395] dump_stack_lvl+0x8c/0xd0 <3>[ 17.307626] print_report+0x118/0x5e0 <3>[ 17.307843] kasan_report+0xc8/0x118 <3>[ 17.308081] kasan_check_range+0x100/0x1a8 <3>[ 17.308334] __kasan_check_write+0x20/0x30 <3>[ 17.308567] kasan_atomics_helper+0xda0/0x49e0 <3>[ 17.308825] kasan_atomics+0x1a0/0x2e8 <3>[ 17.309052] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.309309] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.309609] kthread+0x24c/0x2d0 <3>[ 17.309830] ret_from_fork+0x10/0x20 <3>[ 17.310093] <3>[ 17.310198] Allocated by task 247: <4>[ 17.310381] kasan_save_stack+0x3c/0x68 <4>[ 17.310567] kasan_save_track+0x20/0x40 <4>[ 17.310787] kasan_save_alloc_info+0x40/0x58 <4>[ 17.311035] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.311226] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.311458] kasan_atomics+0xb8/0x2e8 <4>[ 17.311658] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.311869] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.312110] kthread+0x24c/0x2d0 <4>[ 17.312286] ret_from_fork+0x10/0x20 <3>[ 17.312462] <3>[ 17.312564] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.312564] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.312999] The buggy address is located 0 bytes to the right of <3>[ 17.312999] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.313610] <3>[ 17.313737] The buggy address belongs to the physical page: <4>[ 17.314116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.314553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.314892] page_type: 0xffffefff(slab) <4>[ 17.315123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.315472] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.315790] page dumped because: kasan: bad access detected <3>[ 17.316066] <3>[ 17.316181] Memory state around the buggy address: <3>[ 17.316428] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.316793] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.317157] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.317513] ^ <3>[ 17.317780] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.318234] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.318496] ================================================================== <3>[ 17.318869] ================================================================== <3>[ 17.319133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f84/0x49e0 <3>[ 17.319396] Read of size 4 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.319654] <3>[ 17.319756] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.320098] Hardware name: linux,dummy-virt (DT) <3>[ 17.320281] Call trace: <3>[ 17.320400] dump_backtrace+0x9c/0x128 <3>[ 17.320572] show_stack+0x20/0x38 <3>[ 17.320728] dump_stack_lvl+0x8c/0xd0 <3>[ 17.320892] print_report+0x118/0x5e0 <3>[ 17.321080] kasan_report+0xc8/0x118 <3>[ 17.321243] __asan_report_load4_noabort+0x20/0x30 <3>[ 17.321438] kasan_atomics_helper+0x3f84/0x49e0 <3>[ 17.321627] kasan_atomics+0x1a0/0x2e8 <3>[ 17.321817] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.322028] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.322280] kthread+0x24c/0x2d0 <3>[ 17.322439] ret_from_fork+0x10/0x20 <3>[ 17.322612] <3>[ 17.322711] Allocated by task 247: <4>[ 17.322867] kasan_save_stack+0x3c/0x68 <4>[ 17.323049] kasan_save_track+0x20/0x40 <4>[ 17.323228] kasan_save_alloc_info+0x40/0x58 <4>[ 17.323422] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.323596] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.323785] kasan_atomics+0xb8/0x2e8 <4>[ 17.323959] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.324165] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.324396] kthread+0x24c/0x2d0 <4>[ 17.324588] ret_from_fork+0x10/0x20 <3>[ 17.324761] <3>[ 17.324859] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.324859] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.325282] The buggy address is located 0 bytes to the right of <3>[ 17.325282] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.325760] <3>[ 17.325888] The buggy address belongs to the physical page: <4>[ 17.326191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.326579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.326836] page_type: 0xffffefff(slab) <4>[ 17.327018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.327411] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.327726] page dumped because: kasan: bad access detected <3>[ 17.327966] <3>[ 17.328082] Memory state around the buggy address: <3>[ 17.328324] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.328639] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.328958] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.329276] ^ <3>[ 17.329517] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.329838] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.330223] ================================================================== <3>[ 17.330719] ================================================================== <3>[ 17.331064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49e0 <3>[ 17.331383] Read of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.331645] <3>[ 17.331755] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.332104] Hardware name: linux,dummy-virt (DT) <3>[ 17.332286] Call trace: <3>[ 17.332406] dump_backtrace+0x9c/0x128 <3>[ 17.332576] show_stack+0x20/0x38 <3>[ 17.332730] dump_stack_lvl+0x8c/0xd0 <3>[ 17.332896] print_report+0x118/0x5e0 <3>[ 17.333085] kasan_report+0xc8/0x118 <3>[ 17.333303] kasan_check_range+0x100/0x1a8 <3>[ 17.333544] __kasan_check_read+0x20/0x30 <3>[ 17.333784] kasan_atomics_helper+0xe3c/0x49e0 <3>[ 17.334093] kasan_atomics+0x1a0/0x2e8 <3>[ 17.334358] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.334604] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.334891] kthread+0x24c/0x2d0 <3>[ 17.335096] ret_from_fork+0x10/0x20 <3>[ 17.335328] <3>[ 17.335473] Allocated by task 247: <4>[ 17.335689] kasan_save_stack+0x3c/0x68 <4>[ 17.335935] kasan_save_track+0x20/0x40 <4>[ 17.336183] kasan_save_alloc_info+0x40/0x58 <4>[ 17.336446] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.336705] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.336963] kasan_atomics+0xb8/0x2e8 <4>[ 17.337165] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.337414] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.337719] kthread+0x24c/0x2d0 <4>[ 17.337986] ret_from_fork+0x10/0x20 <3>[ 17.338222] <3>[ 17.338361] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.338361] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.338889] The buggy address is located 0 bytes to the right of <3>[ 17.338889] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.339486] <3>[ 17.339622] The buggy address belongs to the physical page: <4>[ 17.339912] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.340300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.340622] page_type: 0xffffefff(slab) <4>[ 17.340847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.341239] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.341624] page dumped because: kasan: bad access detected <3>[ 17.341988] <3>[ 17.342128] Memory state around the buggy address: <3>[ 17.342383] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.342710] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.343027] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.343365] ^ <3>[ 17.343630] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.343951] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.344291] ================================================================== <3>[ 17.344788] ================================================================== <3>[ 17.345132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40d8/0x49e0 <3>[ 17.345486] Read of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.345849] <3>[ 17.346001] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.346550] Hardware name: linux,dummy-virt (DT) <3>[ 17.346831] Call trace: <3>[ 17.346989] dump_backtrace+0x9c/0x128 <3>[ 17.347224] show_stack+0x20/0x38 <3>[ 17.347449] dump_stack_lvl+0x8c/0xd0 <3>[ 17.347704] print_report+0x118/0x5e0 <3>[ 17.347974] kasan_report+0xc8/0x118 <3>[ 17.348215] __asan_report_load8_noabort+0x20/0x30 <3>[ 17.348523] kasan_atomics_helper+0x40d8/0x49e0 <3>[ 17.348781] kasan_atomics+0x1a0/0x2e8 <3>[ 17.348978] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.349235] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.349538] kthread+0x24c/0x2d0 <3>[ 17.349718] ret_from_fork+0x10/0x20 <3>[ 17.349932] <3>[ 17.350056] Allocated by task 247: <4>[ 17.350263] kasan_save_stack+0x3c/0x68 <4>[ 17.350505] kasan_save_track+0x20/0x40 <4>[ 17.350742] kasan_save_alloc_info+0x40/0x58 <4>[ 17.351009] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.351221] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.351437] kasan_atomics+0xb8/0x2e8 <4>[ 17.351638] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.351862] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.352161] kthread+0x24c/0x2d0 <4>[ 17.352389] ret_from_fork+0x10/0x20 <3>[ 17.352604] <3>[ 17.352729] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.352729] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.353290] The buggy address is located 0 bytes to the right of <3>[ 17.353290] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.353847] <3>[ 17.353982] The buggy address belongs to the physical page: <4>[ 17.354269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.354612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.354916] page_type: 0xffffefff(slab) <4>[ 17.355150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.355533] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.355903] page dumped because: kasan: bad access detected <3>[ 17.356208] <3>[ 17.356333] Memory state around the buggy address: <3>[ 17.356586] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.356935] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.357273] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.357617] ^ <3>[ 17.357871] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.358244] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.358569] ================================================================== <3>[ 17.359102] ================================================================== <3>[ 17.359455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49e0 <3>[ 17.359798] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.360132] <3>[ 17.360252] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.360700] Hardware name: linux,dummy-virt (DT) <3>[ 17.360918] Call trace: <3>[ 17.361054] dump_backtrace+0x9c/0x128 <3>[ 17.361249] show_stack+0x20/0x38 <3>[ 17.361458] dump_stack_lvl+0x8c/0xd0 <3>[ 17.361665] print_report+0x118/0x5e0 <3>[ 17.361940] kasan_report+0xc8/0x118 <3>[ 17.362196] kasan_check_range+0x100/0x1a8 <3>[ 17.362488] __kasan_check_write+0x20/0x30 <3>[ 17.362751] kasan_atomics_helper+0xeb0/0x49e0 <3>[ 17.362962] kasan_atomics+0x1a0/0x2e8 <3>[ 17.363151] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.363401] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.363709] kthread+0x24c/0x2d0 <3>[ 17.363923] ret_from_fork+0x10/0x20 <3>[ 17.364158] <3>[ 17.364295] Allocated by task 247: <4>[ 17.364518] kasan_save_stack+0x3c/0x68 <4>[ 17.364777] kasan_save_track+0x20/0x40 <4>[ 17.365019] kasan_save_alloc_info+0x40/0x58 <4>[ 17.365301] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.365567] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.365846] kasan_atomics+0xb8/0x2e8 <4>[ 17.366042] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.366239] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.366480] kthread+0x24c/0x2d0 <4>[ 17.366638] ret_from_fork+0x10/0x20 <3>[ 17.366809] <3>[ 17.366911] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.366911] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.367418] The buggy address is located 0 bytes to the right of <3>[ 17.367418] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.367969] <3>[ 17.368094] The buggy address belongs to the physical page: <4>[ 17.368357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.368748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.369062] page_type: 0xffffefff(slab) <4>[ 17.369297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.369675] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.370073] page dumped because: kasan: bad access detected <3>[ 17.370353] <3>[ 17.370488] Memory state around the buggy address: <3>[ 17.370751] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.371079] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.371393] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.371678] ^ <3>[ 17.371926] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.372264] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.372613] ================================================================== <3>[ 17.373088] ================================================================== <3>[ 17.373436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fdc/0x49e0 <3>[ 17.373752] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.374097] <3>[ 17.374231] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.374648] Hardware name: linux,dummy-virt (DT) <3>[ 17.374910] Call trace: <3>[ 17.375100] dump_backtrace+0x9c/0x128 <3>[ 17.375360] show_stack+0x20/0x38 <3>[ 17.375573] dump_stack_lvl+0x8c/0xd0 <3>[ 17.375784] print_report+0x118/0x5e0 <3>[ 17.376006] kasan_report+0xc8/0x118 <3>[ 17.376198] __asan_report_store8_noabort+0x20/0x30 <3>[ 17.376440] kasan_atomics_helper+0x3fdc/0x49e0 <3>[ 17.376684] kasan_atomics+0x1a0/0x2e8 <3>[ 17.376896] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.377149] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.377491] kthread+0x24c/0x2d0 <3>[ 17.377734] ret_from_fork+0x10/0x20 <3>[ 17.377966] <3>[ 17.378104] Allocated by task 247: <4>[ 17.378329] kasan_save_stack+0x3c/0x68 <4>[ 17.378570] kasan_save_track+0x20/0x40 <4>[ 17.378776] kasan_save_alloc_info+0x40/0x58 <4>[ 17.379023] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.379242] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.379496] kasan_atomics+0xb8/0x2e8 <4>[ 17.379725] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.379955] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.380251] kthread+0x24c/0x2d0 <4>[ 17.380464] ret_from_fork+0x10/0x20 <3>[ 17.380694] <3>[ 17.380826] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.380826] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.381370] The buggy address is located 0 bytes to the right of <3>[ 17.381370] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.381943] <3>[ 17.382088] The buggy address belongs to the physical page: <4>[ 17.382376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.382710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.382955] page_type: 0xffffefff(slab) <4>[ 17.383129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.383408] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.383677] page dumped because: kasan: bad access detected <3>[ 17.383893] <3>[ 17.383989] Memory state around the buggy address: <3>[ 17.384177] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.384435] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.384695] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.384949] ^ <3>[ 17.385144] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.385445] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.385783] ================================================================== <3>[ 17.386247] ================================================================== <3>[ 17.386598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49e0 <3>[ 17.386931] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.387295] <3>[ 17.387423] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.387889] Hardware name: linux,dummy-virt (DT) <3>[ 17.388123] Call trace: <3>[ 17.388303] dump_backtrace+0x9c/0x128 <3>[ 17.388539] show_stack+0x20/0x38 <3>[ 17.388763] dump_stack_lvl+0x8c/0xd0 <3>[ 17.388972] print_report+0x118/0x5e0 <3>[ 17.389180] kasan_report+0xc8/0x118 <3>[ 17.389392] kasan_check_range+0x100/0x1a8 <3>[ 17.389645] __kasan_check_write+0x20/0x30 <3>[ 17.389881] kasan_atomics_helper+0xf28/0x49e0 <3>[ 17.390145] kasan_atomics+0x1a0/0x2e8 <3>[ 17.390371] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.390606] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.390888] kthread+0x24c/0x2d0 <3>[ 17.391091] ret_from_fork+0x10/0x20 <3>[ 17.391317] <3>[ 17.391462] Allocated by task 247: <4>[ 17.391679] kasan_save_stack+0x3c/0x68 <4>[ 17.391930] kasan_save_track+0x20/0x40 <4>[ 17.392192] kasan_save_alloc_info+0x40/0x58 <4>[ 17.392457] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.392722] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.392991] kasan_atomics+0xb8/0x2e8 <4>[ 17.393223] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.393449] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.393750] kthread+0x24c/0x2d0 <4>[ 17.393966] ret_from_fork+0x10/0x20 <3>[ 17.394206] <3>[ 17.394337] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.394337] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.394868] The buggy address is located 0 bytes to the right of <3>[ 17.394868] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.395485] <3>[ 17.395598] The buggy address belongs to the physical page: <4>[ 17.395849] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.396224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.396542] page_type: 0xffffefff(slab) <4>[ 17.396757] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.397118] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.397459] page dumped because: kasan: bad access detected <3>[ 17.397734] <3>[ 17.397873] Memory state around the buggy address: <3>[ 17.398124] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.398478] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.398853] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.399181] ^ <3>[ 17.399451] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.399799] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.400113] ================================================================== <3>[ 17.400534] ================================================================== <3>[ 17.400808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49e0 <3>[ 17.401106] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.401458] <3>[ 17.401600] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.402057] Hardware name: linux,dummy-virt (DT) <3>[ 17.402294] Call trace: <3>[ 17.402439] dump_backtrace+0x9c/0x128 <3>[ 17.402629] show_stack+0x20/0x38 <3>[ 17.402790] dump_stack_lvl+0x8c/0xd0 <3>[ 17.403010] print_report+0x118/0x5e0 <3>[ 17.403214] kasan_report+0xc8/0x118 <3>[ 17.403386] kasan_check_range+0x100/0x1a8 <3>[ 17.403596] __kasan_check_write+0x20/0x30 <3>[ 17.403836] kasan_atomics_helper+0xf94/0x49e0 <3>[ 17.404092] kasan_atomics+0x1a0/0x2e8 <3>[ 17.404313] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.404563] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.404861] kthread+0x24c/0x2d0 <3>[ 17.405054] ret_from_fork+0x10/0x20 <3>[ 17.405265] <3>[ 17.405390] Allocated by task 247: <4>[ 17.405606] kasan_save_stack+0x3c/0x68 <4>[ 17.405864] kasan_save_track+0x20/0x40 <4>[ 17.406103] kasan_save_alloc_info+0x40/0x58 <4>[ 17.406353] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.406575] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.406823] kasan_atomics+0xb8/0x2e8 <4>[ 17.407087] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.407371] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.407675] kthread+0x24c/0x2d0 <4>[ 17.407911] ret_from_fork+0x10/0x20 <3>[ 17.408085] <3>[ 17.408183] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.408183] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.408647] The buggy address is located 0 bytes to the right of <3>[ 17.408647] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.409186] <3>[ 17.409310] The buggy address belongs to the physical page: <4>[ 17.409533] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.409889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.410165] page_type: 0xffffefff(slab) <4>[ 17.410409] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.410716] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.411074] page dumped because: kasan: bad access detected <3>[ 17.411333] <3>[ 17.411430] Memory state around the buggy address: <3>[ 17.411619] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.411896] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.412200] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.412513] ^ <3>[ 17.412793] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.413158] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.413522] ================================================================== <3>[ 17.414011] ================================================================== <3>[ 17.414373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49e0 <3>[ 17.414661] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.414942] <3>[ 17.415052] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.415477] Hardware name: linux,dummy-virt (DT) <3>[ 17.415683] Call trace: <3>[ 17.415806] dump_backtrace+0x9c/0x128 <3>[ 17.415982] show_stack+0x20/0x38 <3>[ 17.416185] dump_stack_lvl+0x8c/0xd0 <3>[ 17.416377] print_report+0x118/0x5e0 <3>[ 17.416576] kasan_report+0xc8/0x118 <3>[ 17.416785] kasan_check_range+0x100/0x1a8 <3>[ 17.416978] __kasan_check_write+0x20/0x30 <3>[ 17.417177] kasan_atomics_helper+0x1000/0x49e0 <3>[ 17.417399] kasan_atomics+0x1a0/0x2e8 <3>[ 17.417570] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.417757] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.417993] kthread+0x24c/0x2d0 <3>[ 17.418149] ret_from_fork+0x10/0x20 <3>[ 17.418328] <3>[ 17.418428] Allocated by task 247: <4>[ 17.418587] kasan_save_stack+0x3c/0x68 <4>[ 17.418777] kasan_save_track+0x20/0x40 <4>[ 17.418975] kasan_save_alloc_info+0x40/0x58 <4>[ 17.419170] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.419349] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.419617] kasan_atomics+0xb8/0x2e8 <4>[ 17.419856] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.420143] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.420463] kthread+0x24c/0x2d0 <4>[ 17.420670] ret_from_fork+0x10/0x20 <3>[ 17.420902] <3>[ 17.421028] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.421028] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.421544] The buggy address is located 0 bytes to the right of <3>[ 17.421544] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.422146] <3>[ 17.422292] The buggy address belongs to the physical page: <4>[ 17.422584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.422980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.423275] page_type: 0xffffefff(slab) <4>[ 17.423477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.423801] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.424161] page dumped because: kasan: bad access detected <3>[ 17.424439] <3>[ 17.424538] Memory state around the buggy address: <3>[ 17.424762] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.425113] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.425491] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.425806] ^ <3>[ 17.426063] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.426408] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.426775] ================================================================== <3>[ 17.427318] ================================================================== <3>[ 17.427679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49e0 <3>[ 17.428004] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.428266] <3>[ 17.428365] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.428721] Hardware name: linux,dummy-virt (DT) <3>[ 17.428907] Call trace: <3>[ 17.429024] dump_backtrace+0x9c/0x128 <3>[ 17.429191] show_stack+0x20/0x38 <3>[ 17.429345] dump_stack_lvl+0x8c/0xd0 <3>[ 17.429510] print_report+0x118/0x5e0 <3>[ 17.429682] kasan_report+0xc8/0x118 <3>[ 17.429856] kasan_check_range+0x100/0x1a8 <3>[ 17.430045] __kasan_check_write+0x20/0x30 <3>[ 17.430236] kasan_atomics_helper+0x106c/0x49e0 <3>[ 17.430431] kasan_atomics+0x1a0/0x2e8 <3>[ 17.430602] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.430783] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.431002] kthread+0x24c/0x2d0 <3>[ 17.431160] ret_from_fork+0x10/0x20 <3>[ 17.431359] <3>[ 17.431493] Allocated by task 247: <4>[ 17.431676] kasan_save_stack+0x3c/0x68 <4>[ 17.431893] kasan_save_track+0x20/0x40 <4>[ 17.432118] kasan_save_alloc_info+0x40/0x58 <4>[ 17.432368] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.432584] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.432828] kasan_atomics+0xb8/0x2e8 <4>[ 17.433065] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.433345] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.433656] kthread+0x24c/0x2d0 <4>[ 17.433897] ret_from_fork+0x10/0x20 <3>[ 17.434105] <3>[ 17.434238] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.434238] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.434806] The buggy address is located 0 bytes to the right of <3>[ 17.434806] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.435356] <3>[ 17.435477] The buggy address belongs to the physical page: <4>[ 17.435750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.436149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.436473] page_type: 0xffffefff(slab) <4>[ 17.436706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.437032] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.437362] page dumped because: kasan: bad access detected <3>[ 17.437573] <3>[ 17.437674] Memory state around the buggy address: <3>[ 17.437872] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.438158] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.438441] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.438765] ^ <3>[ 17.439020] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.439391] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.439760] ================================================================== <3>[ 17.440266] ================================================================== <3>[ 17.440788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49e0 <3>[ 17.441141] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.441488] <3>[ 17.441618] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.442133] Hardware name: linux,dummy-virt (DT) <3>[ 17.442392] Call trace: <3>[ 17.442545] dump_backtrace+0x9c/0x128 <3>[ 17.442791] show_stack+0x20/0x38 <3>[ 17.443019] dump_stack_lvl+0x8c/0xd0 <3>[ 17.443222] print_report+0x118/0x5e0 <3>[ 17.443448] kasan_report+0xc8/0x118 <3>[ 17.443683] kasan_check_range+0x100/0x1a8 <3>[ 17.443912] __kasan_check_write+0x20/0x30 <3>[ 17.444120] kasan_atomics_helper+0x10d8/0x49e0 <3>[ 17.444363] kasan_atomics+0x1a0/0x2e8 <3>[ 17.444618] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.444862] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.445176] kthread+0x24c/0x2d0 <3>[ 17.445338] ret_from_fork+0x10/0x20 <3>[ 17.445530] <3>[ 17.445653] Allocated by task 247: <4>[ 17.445827] kasan_save_stack+0x3c/0x68 <4>[ 17.446069] kasan_save_track+0x20/0x40 <4>[ 17.446308] kasan_save_alloc_info+0x40/0x58 <4>[ 17.446558] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.446807] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.447081] kasan_atomics+0xb8/0x2e8 <4>[ 17.447312] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.447525] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.447797] kthread+0x24c/0x2d0 <4>[ 17.447989] ret_from_fork+0x10/0x20 <3>[ 17.448243] <3>[ 17.448347] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.448347] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.448885] The buggy address is located 0 bytes to the right of <3>[ 17.448885] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.449458] <3>[ 17.449594] The buggy address belongs to the physical page: <4>[ 17.449866] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.450264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.450576] page_type: 0xffffefff(slab) <4>[ 17.450775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.451155] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.451512] page dumped because: kasan: bad access detected <3>[ 17.451766] <3>[ 17.451871] Memory state around the buggy address: <3>[ 17.452133] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.452503] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.452859] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.453249] ^ <3>[ 17.453455] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.453804] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.454163] ================================================================== <3>[ 17.454771] ================================================================== <3>[ 17.455129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49e0 <3>[ 17.455486] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.455820] <3>[ 17.455939] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.456366] Hardware name: linux,dummy-virt (DT) <3>[ 17.456573] Call trace: <3>[ 17.456696] dump_backtrace+0x9c/0x128 <3>[ 17.456880] show_stack+0x20/0x38 <3>[ 17.457040] dump_stack_lvl+0x8c/0xd0 <3>[ 17.457247] print_report+0x118/0x5e0 <3>[ 17.457472] kasan_report+0xc8/0x118 <3>[ 17.457691] kasan_check_range+0x100/0x1a8 <3>[ 17.457952] __kasan_check_write+0x20/0x30 <3>[ 17.458194] kasan_atomics_helper+0x1144/0x49e0 <3>[ 17.458464] kasan_atomics+0x1a0/0x2e8 <3>[ 17.458671] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.458883] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.459146] kthread+0x24c/0x2d0 <3>[ 17.459321] ret_from_fork+0x10/0x20 <3>[ 17.459526] <3>[ 17.459637] Allocated by task 247: <4>[ 17.459823] kasan_save_stack+0x3c/0x68 <4>[ 17.460027] kasan_save_track+0x20/0x40 <4>[ 17.460234] kasan_save_alloc_info+0x40/0x58 <4>[ 17.460440] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.460649] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.460867] kasan_atomics+0xb8/0x2e8 <4>[ 17.461087] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.461306] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.461592] kthread+0x24c/0x2d0 <4>[ 17.461784] ret_from_fork+0x10/0x20 <3>[ 17.461987] <3>[ 17.462122] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.462122] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.462689] The buggy address is located 0 bytes to the right of <3>[ 17.462689] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.463266] <3>[ 17.463395] The buggy address belongs to the physical page: <4>[ 17.463651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.464029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.464344] page_type: 0xffffefff(slab) <4>[ 17.464552] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.464830] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.465097] page dumped because: kasan: bad access detected <3>[ 17.465301] <3>[ 17.465396] Memory state around the buggy address: <3>[ 17.465583] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.465845] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.466138] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.466486] ^ <3>[ 17.466711] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.467073] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.467408] ================================================================== <3>[ 17.467883] ================================================================== <3>[ 17.468233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49e0 <3>[ 17.468587] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.468941] <3>[ 17.469079] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.469501] Hardware name: linux,dummy-virt (DT) <3>[ 17.469739] Call trace: <3>[ 17.469873] dump_backtrace+0x9c/0x128 <3>[ 17.470096] show_stack+0x20/0x38 <3>[ 17.470276] dump_stack_lvl+0x8c/0xd0 <3>[ 17.470507] print_report+0x118/0x5e0 <3>[ 17.470712] kasan_report+0xc8/0x118 <3>[ 17.470932] kasan_check_range+0x100/0x1a8 <3>[ 17.471121] __kasan_check_write+0x20/0x30 <3>[ 17.471330] kasan_atomics_helper+0x11b0/0x49e0 <3>[ 17.471601] kasan_atomics+0x1a0/0x2e8 <3>[ 17.471828] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.472046] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.472329] kthread+0x24c/0x2d0 <3>[ 17.472536] ret_from_fork+0x10/0x20 <3>[ 17.472759] <3>[ 17.472886] Allocated by task 247: <4>[ 17.473061] kasan_save_stack+0x3c/0x68 <4>[ 17.473279] kasan_save_track+0x20/0x40 <4>[ 17.473533] kasan_save_alloc_info+0x40/0x58 <4>[ 17.473758] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.473968] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.474219] kasan_atomics+0xb8/0x2e8 <4>[ 17.474439] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.474660] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.474953] kthread+0x24c/0x2d0 <4>[ 17.475167] ret_from_fork+0x10/0x20 <3>[ 17.475381] <3>[ 17.475493] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.475493] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.475984] The buggy address is located 0 bytes to the right of <3>[ 17.475984] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.476530] <3>[ 17.476634] The buggy address belongs to the physical page: <4>[ 17.476851] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.477156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.477401] page_type: 0xffffefff(slab) <4>[ 17.477579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.477877] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.478253] page dumped because: kasan: bad access detected <3>[ 17.478511] <3>[ 17.478640] Memory state around the buggy address: <3>[ 17.478924] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.479272] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.479636] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.479977] ^ <3>[ 17.480198] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.480510] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.480856] ================================================================== <3>[ 17.481257] ================================================================== <3>[ 17.481605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49e0 <3>[ 17.481996] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.482393] <3>[ 17.482532] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.483003] Hardware name: linux,dummy-virt (DT) <3>[ 17.483248] Call trace: <3>[ 17.483419] dump_backtrace+0x9c/0x128 <3>[ 17.483671] show_stack+0x20/0x38 <3>[ 17.483852] dump_stack_lvl+0x8c/0xd0 <3>[ 17.484027] print_report+0x118/0x5e0 <3>[ 17.484228] kasan_report+0xc8/0x118 <3>[ 17.484415] kasan_check_range+0x100/0x1a8 <3>[ 17.484625] __kasan_check_write+0x20/0x30 <3>[ 17.484858] kasan_atomics_helper+0x121c/0x49e0 <3>[ 17.485053] kasan_atomics+0x1a0/0x2e8 <3>[ 17.485226] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.485410] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.485633] kthread+0x24c/0x2d0 <3>[ 17.485793] ret_from_fork+0x10/0x20 <3>[ 17.486001] <3>[ 17.486124] Allocated by task 247: <4>[ 17.486330] kasan_save_stack+0x3c/0x68 <4>[ 17.486566] kasan_save_track+0x20/0x40 <4>[ 17.486755] kasan_save_alloc_info+0x40/0x58 <4>[ 17.487007] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.487245] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.487485] kasan_atomics+0xb8/0x2e8 <4>[ 17.487677] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.487930] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.488234] kthread+0x24c/0x2d0 <4>[ 17.488448] ret_from_fork+0x10/0x20 <3>[ 17.488663] <3>[ 17.488787] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.488787] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.489355] The buggy address is located 0 bytes to the right of <3>[ 17.489355] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.489888] <3>[ 17.490006] The buggy address belongs to the physical page: <4>[ 17.490300] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.490675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.490946] page_type: 0xffffefff(slab) <4>[ 17.491131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.491519] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.491847] page dumped because: kasan: bad access detected <3>[ 17.492149] <3>[ 17.492271] Memory state around the buggy address: <3>[ 17.492507] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.492877] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.493236] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.493523] ^ <3>[ 17.493748] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.494034] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.494381] ================================================================== <3>[ 17.494885] ================================================================== <3>[ 17.495228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49e0 <3>[ 17.495531] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.495796] <3>[ 17.495891] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.496250] Hardware name: linux,dummy-virt (DT) <3>[ 17.496462] Call trace: <3>[ 17.496641] dump_backtrace+0x9c/0x128 <3>[ 17.496876] show_stack+0x20/0x38 <3>[ 17.497057] dump_stack_lvl+0x8c/0xd0 <3>[ 17.497256] print_report+0x118/0x5e0 <3>[ 17.497447] kasan_report+0xc8/0x118 <3>[ 17.497642] kasan_check_range+0x100/0x1a8 <3>[ 17.497884] __kasan_check_write+0x20/0x30 <3>[ 17.498102] kasan_atomics_helper+0x1288/0x49e0 <3>[ 17.498352] kasan_atomics+0x1a0/0x2e8 <3>[ 17.498540] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.498742] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.499048] kthread+0x24c/0x2d0 <3>[ 17.499282] ret_from_fork+0x10/0x20 <3>[ 17.499468] <3>[ 17.499584] Allocated by task 247: <4>[ 17.499743] kasan_save_stack+0x3c/0x68 <4>[ 17.499939] kasan_save_track+0x20/0x40 <4>[ 17.500128] kasan_save_alloc_info+0x40/0x58 <4>[ 17.500380] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.500629] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.500832] kasan_atomics+0xb8/0x2e8 <4>[ 17.501005] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.501220] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.501499] kthread+0x24c/0x2d0 <4>[ 17.501736] ret_from_fork+0x10/0x20 <3>[ 17.501969] <3>[ 17.502098] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.502098] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.502686] The buggy address is located 0 bytes to the right of <3>[ 17.502686] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.503172] <3>[ 17.503284] The buggy address belongs to the physical page: <4>[ 17.503522] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.503929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.504259] page_type: 0xffffefff(slab) <4>[ 17.504510] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.504873] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.505189] page dumped because: kasan: bad access detected <3>[ 17.505460] <3>[ 17.505586] Memory state around the buggy address: <3>[ 17.505862] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.506252] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.506559] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.506863] ^ <3>[ 17.507059] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.507384] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.507738] ================================================================== <3>[ 17.508226] ================================================================== <3>[ 17.508577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49e0 <3>[ 17.508928] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.509278] <3>[ 17.509394] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.509880] Hardware name: linux,dummy-virt (DT) <3>[ 17.510155] Call trace: <3>[ 17.510298] dump_backtrace+0x9c/0x128 <3>[ 17.510495] show_stack+0x20/0x38 <3>[ 17.510676] dump_stack_lvl+0x8c/0xd0 <3>[ 17.510907] print_report+0x118/0x5e0 <3>[ 17.511140] kasan_report+0xc8/0x118 <3>[ 17.511362] kasan_check_range+0x100/0x1a8 <3>[ 17.511603] __kasan_check_write+0x20/0x30 <3>[ 17.511840] kasan_atomics_helper+0x1300/0x49e0 <3>[ 17.512113] kasan_atomics+0x1a0/0x2e8 <3>[ 17.512322] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.512560] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.512852] kthread+0x24c/0x2d0 <3>[ 17.513044] ret_from_fork+0x10/0x20 <3>[ 17.513253] <3>[ 17.513377] Allocated by task 247: <4>[ 17.513585] kasan_save_stack+0x3c/0x68 <4>[ 17.513824] kasan_save_track+0x20/0x40 <4>[ 17.514061] kasan_save_alloc_info+0x40/0x58 <4>[ 17.514310] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.514506] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.514707] kasan_atomics+0xb8/0x2e8 <4>[ 17.514880] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.515063] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.515286] kthread+0x24c/0x2d0 <4>[ 17.515441] ret_from_fork+0x10/0x20 <3>[ 17.515607] <3>[ 17.515706] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.515706] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.516118] The buggy address is located 0 bytes to the right of <3>[ 17.516118] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.516540] <3>[ 17.516635] The buggy address belongs to the physical page: <4>[ 17.516840] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.517131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.517380] page_type: 0xffffefff(slab) <4>[ 17.517557] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.517843] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.518115] page dumped because: kasan: bad access detected <3>[ 17.518336] <3>[ 17.518435] Memory state around the buggy address: <3>[ 17.518620] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.518881] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.519141] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.519394] ^ <3>[ 17.519583] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.519899] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.520197] ================================================================== <3>[ 17.520620] ================================================================== <3>[ 17.520965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49e0 <3>[ 17.521268] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.521542] <3>[ 17.521667] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.522144] Hardware name: linux,dummy-virt (DT) <3>[ 17.522385] Call trace: <3>[ 17.522508] dump_backtrace+0x9c/0x128 <3>[ 17.522691] show_stack+0x20/0x38 <3>[ 17.522858] dump_stack_lvl+0x8c/0xd0 <3>[ 17.523057] print_report+0x118/0x5e0 <3>[ 17.523261] kasan_report+0xc8/0x118 <3>[ 17.523431] kasan_check_range+0x100/0x1a8 <3>[ 17.523637] __kasan_check_write+0x20/0x30 <3>[ 17.523839] kasan_atomics_helper+0x1370/0x49e0 <3>[ 17.524042] kasan_atomics+0x1a0/0x2e8 <3>[ 17.524230] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.524439] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.524658] kthread+0x24c/0x2d0 <3>[ 17.524834] ret_from_fork+0x10/0x20 <3>[ 17.525027] <3>[ 17.525125] Allocated by task 247: <4>[ 17.525275] kasan_save_stack+0x3c/0x68 <4>[ 17.525457] kasan_save_track+0x20/0x40 <4>[ 17.525636] kasan_save_alloc_info+0x40/0x58 <4>[ 17.525827] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.526001] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.526189] kasan_atomics+0xb8/0x2e8 <4>[ 17.526366] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.526548] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.526765] kthread+0x24c/0x2d0 <4>[ 17.526938] ret_from_fork+0x10/0x20 <3>[ 17.527138] <3>[ 17.527236] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.527236] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.527739] The buggy address is located 0 bytes to the right of <3>[ 17.527739] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.528265] <3>[ 17.528404] The buggy address belongs to the physical page: <4>[ 17.528652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.529000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.529283] page_type: 0xffffefff(slab) <4>[ 17.529484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.529787] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.530153] page dumped because: kasan: bad access detected <3>[ 17.530430] <3>[ 17.530531] Memory state around the buggy address: <3>[ 17.530773] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.531147] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.531468] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.531763] ^ <3>[ 17.531996] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.532298] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.532604] ================================================================== <3>[ 17.533058] ================================================================== <3>[ 17.533382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49e0 <3>[ 17.533659] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.534014] <3>[ 17.534156] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.534640] Hardware name: linux,dummy-virt (DT) <3>[ 17.534892] Call trace: <3>[ 17.535046] dump_backtrace+0x9c/0x128 <3>[ 17.535247] show_stack+0x20/0x38 <3>[ 17.535423] dump_stack_lvl+0x8c/0xd0 <3>[ 17.535649] print_report+0x118/0x5e0 <3>[ 17.535892] kasan_report+0xc8/0x118 <3>[ 17.536084] kasan_check_range+0x100/0x1a8 <3>[ 17.536290] __kasan_check_write+0x20/0x30 <3>[ 17.536499] kasan_atomics_helper+0x141c/0x49e0 <3>[ 17.536750] kasan_atomics+0x1a0/0x2e8 <3>[ 17.536975] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.537216] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.537513] kthread+0x24c/0x2d0 <3>[ 17.537686] ret_from_fork+0x10/0x20 <3>[ 17.537891] <3>[ 17.537991] Allocated by task 247: <4>[ 17.538147] kasan_save_stack+0x3c/0x68 <4>[ 17.538402] kasan_save_track+0x20/0x40 <4>[ 17.538589] kasan_save_alloc_info+0x40/0x58 <4>[ 17.538847] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.539054] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.539284] kasan_atomics+0xb8/0x2e8 <4>[ 17.539488] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.539693] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.539936] kthread+0x24c/0x2d0 <4>[ 17.540145] ret_from_fork+0x10/0x20 <3>[ 17.540393] <3>[ 17.540521] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.540521] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.541108] The buggy address is located 0 bytes to the right of <3>[ 17.541108] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.541661] <3>[ 17.541786] The buggy address belongs to the physical page: <4>[ 17.542038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.542410] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.542713] page_type: 0xffffefff(slab) <4>[ 17.542961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.543354] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.543682] page dumped because: kasan: bad access detected <3>[ 17.543892] <3>[ 17.544000] Memory state around the buggy address: <3>[ 17.544198] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.544467] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.544759] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.545072] ^ <3>[ 17.545267] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.545611] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.545939] ================================================================== <3>[ 17.546310] ================================================================== <3>[ 17.546615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4084/0x49e0 <3>[ 17.546908] Read of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.547208] <3>[ 17.547317] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.547763] Hardware name: linux,dummy-virt (DT) <3>[ 17.548012] Call trace: <3>[ 17.548141] dump_backtrace+0x9c/0x128 <3>[ 17.548311] show_stack+0x20/0x38 <3>[ 17.548468] dump_stack_lvl+0x8c/0xd0 <3>[ 17.548636] print_report+0x118/0x5e0 <3>[ 17.548806] kasan_report+0xc8/0x118 <3>[ 17.548970] __asan_report_load8_noabort+0x20/0x30 <3>[ 17.549164] kasan_atomics_helper+0x4084/0x49e0 <3>[ 17.549355] kasan_atomics+0x1a0/0x2e8 <3>[ 17.549520] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.549700] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.549926] kthread+0x24c/0x2d0 <3>[ 17.550086] ret_from_fork+0x10/0x20 <3>[ 17.550266] <3>[ 17.550366] Allocated by task 247: <4>[ 17.550517] kasan_save_stack+0x3c/0x68 <4>[ 17.550694] kasan_save_track+0x20/0x40 <4>[ 17.550862] kasan_save_alloc_info+0x40/0x58 <4>[ 17.551046] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.551231] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.551464] kasan_atomics+0xb8/0x2e8 <4>[ 17.551654] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.551871] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.552117] kthread+0x24c/0x2d0 <4>[ 17.552302] ret_from_fork+0x10/0x20 <3>[ 17.552521] <3>[ 17.552650] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.552650] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.553183] The buggy address is located 0 bytes to the right of <3>[ 17.553183] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.553723] <3>[ 17.553845] The buggy address belongs to the physical page: <4>[ 17.554071] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.554393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.554673] page_type: 0xffffefff(slab) <4>[ 17.554858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.555230] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.555577] page dumped because: kasan: bad access detected <3>[ 17.555790] <3>[ 17.555902] Memory state around the buggy address: <3>[ 17.556096] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.556444] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.556790] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.557073] ^ <3>[ 17.557270] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.557614] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.557957] ================================================================== <3>[ 17.558690] ================================================================== <3>[ 17.559080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49e0 <3>[ 17.559460] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.559782] <3>[ 17.559915] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.560358] Hardware name: linux,dummy-virt (DT) <3>[ 17.560561] Call trace: <3>[ 17.560702] dump_backtrace+0x9c/0x128 <3>[ 17.560895] show_stack+0x20/0x38 <3>[ 17.561093] dump_stack_lvl+0x8c/0xd0 <3>[ 17.561342] print_report+0x118/0x5e0 <3>[ 17.561517] kasan_report+0xc8/0x118 <3>[ 17.561725] kasan_check_range+0x100/0x1a8 <3>[ 17.561993] __kasan_check_write+0x20/0x30 <3>[ 17.562193] kasan_atomics_helper+0x14ac/0x49e0 <3>[ 17.562431] kasan_atomics+0x1a0/0x2e8 <3>[ 17.562667] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.562920] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.563211] kthread+0x24c/0x2d0 <3>[ 17.563373] ret_from_fork+0x10/0x20 <3>[ 17.563593] <3>[ 17.563691] Allocated by task 247: <4>[ 17.563842] kasan_save_stack+0x3c/0x68 <4>[ 17.564048] kasan_save_track+0x20/0x40 <4>[ 17.564230] kasan_save_alloc_info+0x40/0x58 <4>[ 17.564447] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.564624] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.564848] kasan_atomics+0xb8/0x2e8 <4>[ 17.565046] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.565293] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.565518] kthread+0x24c/0x2d0 <4>[ 17.565677] ret_from_fork+0x10/0x20 <3>[ 17.565864] <3>[ 17.566000] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.566000] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.566591] The buggy address is located 0 bytes to the right of <3>[ 17.566591] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.567107] <3>[ 17.567247] The buggy address belongs to the physical page: <4>[ 17.567547] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.567910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.568175] page_type: 0xffffefff(slab) <4>[ 17.568362] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.568664] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.568946] page dumped because: kasan: bad access detected <3>[ 17.569164] <3>[ 17.569259] Memory state around the buggy address: <3>[ 17.569449] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.569746] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.570017] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.570295] ^ <3>[ 17.570495] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.570771] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.571026] ================================================================== <3>[ 17.571412] ================================================================== <3>[ 17.571678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49e0 <3>[ 17.571951] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.572212] <3>[ 17.572306] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.572665] Hardware name: linux,dummy-virt (DT) <3>[ 17.572850] Call trace: <3>[ 17.572972] dump_backtrace+0x9c/0x128 <3>[ 17.573149] show_stack+0x20/0x38 <3>[ 17.573310] dump_stack_lvl+0x8c/0xd0 <3>[ 17.573474] print_report+0x118/0x5e0 <3>[ 17.573646] kasan_report+0xc8/0x118 <3>[ 17.573806] kasan_check_range+0x100/0x1a8 <3>[ 17.574007] __kasan_check_write+0x20/0x30 <3>[ 17.574187] kasan_atomics_helper+0x1518/0x49e0 <3>[ 17.574387] kasan_atomics+0x1a0/0x2e8 <3>[ 17.574560] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.574743] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.574955] kthread+0x24c/0x2d0 <3>[ 17.575110] ret_from_fork+0x10/0x20 <3>[ 17.575274] <3>[ 17.575371] Allocated by task 247: <4>[ 17.575522] kasan_save_stack+0x3c/0x68 <4>[ 17.575703] kasan_save_track+0x20/0x40 <4>[ 17.575880] kasan_save_alloc_info+0x40/0x58 <4>[ 17.576082] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.576252] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.576457] kasan_atomics+0xb8/0x2e8 <4>[ 17.576631] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.576826] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.577070] kthread+0x24c/0x2d0 <4>[ 17.577251] ret_from_fork+0x10/0x20 <3>[ 17.577474] <3>[ 17.577608] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.577608] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.578178] The buggy address is located 0 bytes to the right of <3>[ 17.578178] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.578769] <3>[ 17.578915] The buggy address belongs to the physical page: <4>[ 17.579196] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.579519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.579818] page_type: 0xffffefff(slab) <4>[ 17.580019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.580359] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.580670] page dumped because: kasan: bad access detected <3>[ 17.580902] <3>[ 17.581004] Memory state around the buggy address: <3>[ 17.581228] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.581508] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.581810] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.582091] ^ <3>[ 17.582301] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.582647] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.583007] ================================================================== <3>[ 17.583439] ================================================================== <3>[ 17.583771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49e0 <3>[ 17.584087] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.584383] <3>[ 17.584508] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.584940] Hardware name: linux,dummy-virt (DT) <3>[ 17.585143] Call trace: <3>[ 17.585292] dump_backtrace+0x9c/0x128 <3>[ 17.585512] show_stack+0x20/0x38 <3>[ 17.585724] dump_stack_lvl+0x8c/0xd0 <3>[ 17.585974] print_report+0x118/0x5e0 <3>[ 17.586223] kasan_report+0xc8/0x118 <3>[ 17.586397] kasan_check_range+0x100/0x1a8 <3>[ 17.586604] __kasan_check_write+0x20/0x30 <3>[ 17.586795] kasan_atomics_helper+0x1584/0x49e0 <3>[ 17.586998] kasan_atomics+0x1a0/0x2e8 <3>[ 17.587170] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.587361] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.587589] kthread+0x24c/0x2d0 <3>[ 17.587753] ret_from_fork+0x10/0x20 <3>[ 17.587922] <3>[ 17.588027] Allocated by task 247: <4>[ 17.588185] kasan_save_stack+0x3c/0x68 <4>[ 17.588369] kasan_save_track+0x20/0x40 <4>[ 17.588547] kasan_save_alloc_info+0x40/0x58 <4>[ 17.588739] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.588911] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.589110] kasan_atomics+0xb8/0x2e8 <4>[ 17.589293] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.589492] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.589705] kthread+0x24c/0x2d0 <4>[ 17.589865] ret_from_fork+0x10/0x20 <3>[ 17.590025] <3>[ 17.590120] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.590120] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.590534] The buggy address is located 0 bytes to the right of <3>[ 17.590534] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.590968] <3>[ 17.591067] The buggy address belongs to the physical page: <4>[ 17.591283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.591576] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.591825] page_type: 0xffffefff(slab) <4>[ 17.592005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.592295] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.592560] page dumped because: kasan: bad access detected <3>[ 17.592771] <3>[ 17.592871] Memory state around the buggy address: <3>[ 17.593071] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.593356] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.593621] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.593880] ^ <3>[ 17.594073] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.594352] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.594615] ================================================================== <3>[ 17.594993] ================================================================== <3>[ 17.595310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49e0 <3>[ 17.595580] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.595863] <3>[ 17.595965] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.596336] Hardware name: linux,dummy-virt (DT) <3>[ 17.596521] Call trace: <3>[ 17.596645] dump_backtrace+0x9c/0x128 <3>[ 17.596820] show_stack+0x20/0x38 <3>[ 17.596981] dump_stack_lvl+0x8c/0xd0 <3>[ 17.597152] print_report+0x118/0x5e0 <3>[ 17.597337] kasan_report+0xc8/0x118 <3>[ 17.597516] kasan_check_range+0x100/0x1a8 <3>[ 17.597722] __kasan_check_write+0x20/0x30 <3>[ 17.597993] kasan_atomics_helper+0x15f0/0x49e0 <3>[ 17.598273] kasan_atomics+0x1a0/0x2e8 <3>[ 17.598527] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.598773] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.599091] kthread+0x24c/0x2d0 <3>[ 17.599321] ret_from_fork+0x10/0x20 <3>[ 17.599577] <3>[ 17.599687] Allocated by task 247: <4>[ 17.599870] kasan_save_stack+0x3c/0x68 <4>[ 17.600061] kasan_save_track+0x20/0x40 <4>[ 17.600307] kasan_save_alloc_info+0x40/0x58 <4>[ 17.600516] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.600749] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.600947] kasan_atomics+0xb8/0x2e8 <4>[ 17.601136] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.601398] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.601639] kthread+0x24c/0x2d0 <4>[ 17.601842] ret_from_fork+0x10/0x20 <3>[ 17.602064] <3>[ 17.602195] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.602195] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.602752] The buggy address is located 0 bytes to the right of <3>[ 17.602752] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.603386] <3>[ 17.603526] The buggy address belongs to the physical page: <4>[ 17.603820] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.604167] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.604421] page_type: 0xffffefff(slab) <4>[ 17.604599] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.604918] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.605300] page dumped because: kasan: bad access detected <3>[ 17.605562] <3>[ 17.605714] Memory state around the buggy address: <3>[ 17.605973] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.606261] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.606606] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.606904] ^ <3>[ 17.607155] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.607437] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.607780] ================================================================== <3>[ 17.608243] ================================================================== <3>[ 17.608605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49e0 <3>[ 17.608956] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.609319] <3>[ 17.609462] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.609915] Hardware name: linux,dummy-virt (DT) <3>[ 17.610131] Call trace: <3>[ 17.610298] dump_backtrace+0x9c/0x128 <3>[ 17.610520] show_stack+0x20/0x38 <3>[ 17.610689] dump_stack_lvl+0x8c/0xd0 <3>[ 17.610912] print_report+0x118/0x5e0 <3>[ 17.611141] kasan_report+0xc8/0x118 <3>[ 17.611366] kasan_check_range+0x100/0x1a8 <3>[ 17.611571] __kasan_check_write+0x20/0x30 <3>[ 17.611814] kasan_atomics_helper+0x165c/0x49e0 <3>[ 17.612101] kasan_atomics+0x1a0/0x2e8 <3>[ 17.612358] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.612585] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.612890] kthread+0x24c/0x2d0 <3>[ 17.613094] ret_from_fork+0x10/0x20 <3>[ 17.613317] <3>[ 17.613445] Allocated by task 247: <4>[ 17.613654] kasan_save_stack+0x3c/0x68 <4>[ 17.613896] kasan_save_track+0x20/0x40 <4>[ 17.614132] kasan_save_alloc_info+0x40/0x58 <4>[ 17.614407] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.614621] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.614835] kasan_atomics+0xb8/0x2e8 <4>[ 17.615065] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.615320] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.615600] kthread+0x24c/0x2d0 <4>[ 17.615768] ret_from_fork+0x10/0x20 <3>[ 17.615968] <3>[ 17.616067] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.616067] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.616499] The buggy address is located 0 bytes to the right of <3>[ 17.616499] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.616962] <3>[ 17.617061] The buggy address belongs to the physical page: <4>[ 17.617335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.617727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.618090] page_type: 0xffffefff(slab) <4>[ 17.618369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.618765] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.619102] page dumped because: kasan: bad access detected <3>[ 17.619391] <3>[ 17.619519] Memory state around the buggy address: <3>[ 17.619726] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.620090] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.620446] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.620762] ^ <3>[ 17.621030] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.621357] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.621731] ================================================================== <3>[ 17.622236] ================================================================== <3>[ 17.622549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f30/0x49e0 <3>[ 17.622921] Read of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.623297] <3>[ 17.623427] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.623887] Hardware name: linux,dummy-virt (DT) <3>[ 17.624125] Call trace: <3>[ 17.624306] dump_backtrace+0x9c/0x128 <3>[ 17.624555] show_stack+0x20/0x38 <3>[ 17.624800] dump_stack_lvl+0x8c/0xd0 <3>[ 17.625049] print_report+0x118/0x5e0 <3>[ 17.625311] kasan_report+0xc8/0x118 <3>[ 17.625550] __asan_report_load8_noabort+0x20/0x30 <3>[ 17.625819] kasan_atomics_helper+0x3f30/0x49e0 <3>[ 17.626108] kasan_atomics+0x1a0/0x2e8 <3>[ 17.626306] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.626571] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.626886] kthread+0x24c/0x2d0 <3>[ 17.627073] ret_from_fork+0x10/0x20 <3>[ 17.627310] <3>[ 17.627415] Allocated by task 247: <4>[ 17.627626] kasan_save_stack+0x3c/0x68 <4>[ 17.627874] kasan_save_track+0x20/0x40 <4>[ 17.628100] kasan_save_alloc_info+0x40/0x58 <4>[ 17.628326] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.628528] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.628793] kasan_atomics+0xb8/0x2e8 <4>[ 17.629040] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.629259] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.629532] kthread+0x24c/0x2d0 <4>[ 17.629705] ret_from_fork+0x10/0x20 <3>[ 17.629914] <3>[ 17.630042] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.630042] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.630641] The buggy address is located 0 bytes to the right of <3>[ 17.630641] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.631231] <3>[ 17.631362] The buggy address belongs to the physical page: <4>[ 17.631598] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.631912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.632172] page_type: 0xffffefff(slab) <4>[ 17.632345] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.632634] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.632910] page dumped because: kasan: bad access detected <3>[ 17.633124] <3>[ 17.633224] Memory state around the buggy address: <3>[ 17.633416] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.633678] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.633942] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.634211] ^ <3>[ 17.634406] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.634698] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.634997] ================================================================== <3>[ 17.635536] ================================================================== <3>[ 17.635896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49e0 <3>[ 17.636180] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.636473] <3>[ 17.636597] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.637040] Hardware name: linux,dummy-virt (DT) <3>[ 17.637227] Call trace: <3>[ 17.637368] dump_backtrace+0x9c/0x128 <3>[ 17.637559] show_stack+0x20/0x38 <3>[ 17.637761] dump_stack_lvl+0x8c/0xd0 <3>[ 17.638006] print_report+0x118/0x5e0 <3>[ 17.638259] kasan_report+0xc8/0x118 <3>[ 17.638438] kasan_check_range+0x100/0x1a8 <3>[ 17.638663] __kasan_check_write+0x20/0x30 <3>[ 17.638875] kasan_atomics_helper+0x16f0/0x49e0 <3>[ 17.639100] kasan_atomics+0x1a0/0x2e8 <3>[ 17.639303] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.639523] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.639806] kthread+0x24c/0x2d0 <3>[ 17.640009] ret_from_fork+0x10/0x20 <3>[ 17.640200] <3>[ 17.640307] Allocated by task 247: <4>[ 17.640469] kasan_save_stack+0x3c/0x68 <4>[ 17.640678] kasan_save_track+0x20/0x40 <4>[ 17.640879] kasan_save_alloc_info+0x40/0x58 <4>[ 17.641082] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.641297] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.641492] kasan_atomics+0xb8/0x2e8 <4>[ 17.641668] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.641878] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.642104] kthread+0x24c/0x2d0 <4>[ 17.642298] ret_from_fork+0x10/0x20 <3>[ 17.642528] <3>[ 17.642649] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.642649] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.643155] The buggy address is located 0 bytes to the right of <3>[ 17.643155] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.643677] <3>[ 17.643805] The buggy address belongs to the physical page: <4>[ 17.644091] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.644490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.644829] page_type: 0xffffefff(slab) <4>[ 17.645100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.645520] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.645915] page dumped because: kasan: bad access detected <3>[ 17.646231] <3>[ 17.646374] Memory state around the buggy address: <3>[ 17.646632] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.647011] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.647382] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.647702] ^ <3>[ 17.647954] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.648281] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.648593] ================================================================== <3>[ 17.649052] ================================================================== <3>[ 17.649401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f74/0x49e0 <3>[ 17.649736] Read of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.650103] <3>[ 17.650242] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.650736] Hardware name: linux,dummy-virt (DT) <3>[ 17.651006] Call trace: <3>[ 17.651199] dump_backtrace+0x9c/0x128 <3>[ 17.651442] show_stack+0x20/0x38 <3>[ 17.651648] dump_stack_lvl+0x8c/0xd0 <3>[ 17.651890] print_report+0x118/0x5e0 <3>[ 17.652151] kasan_report+0xc8/0x118 <3>[ 17.652378] __asan_report_load8_noabort+0x20/0x30 <3>[ 17.652652] kasan_atomics_helper+0x3f74/0x49e0 <3>[ 17.652929] kasan_atomics+0x1a0/0x2e8 <3>[ 17.653198] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.653457] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.653792] kthread+0x24c/0x2d0 <3>[ 17.653998] ret_from_fork+0x10/0x20 <3>[ 17.654226] <3>[ 17.654355] Allocated by task 247: <4>[ 17.654574] kasan_save_stack+0x3c/0x68 <4>[ 17.654817] kasan_save_track+0x20/0x40 <4>[ 17.655048] kasan_save_alloc_info+0x40/0x58 <4>[ 17.655298] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.655523] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.655766] kasan_atomics+0xb8/0x2e8 <4>[ 17.655990] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.656225] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.656490] kthread+0x24c/0x2d0 <4>[ 17.656724] ret_from_fork+0x10/0x20 <3>[ 17.656894] <3>[ 17.656996] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.656996] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.657417] The buggy address is located 0 bytes to the right of <3>[ 17.657417] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.657882] <3>[ 17.657983] The buggy address belongs to the physical page: <4>[ 17.658247] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.658613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.658872] page_type: 0xffffefff(slab) <4>[ 17.659066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.659420] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.659736] page dumped because: kasan: bad access detected <3>[ 17.660000] <3>[ 17.660146] Memory state around the buggy address: <3>[ 17.660378] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.660665] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.660929] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.661196] ^ <3>[ 17.661437] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.661790] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.662111] ================================================================== <3>[ 17.662613] ================================================================== <3>[ 17.662965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49e0 <3>[ 17.663322] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.663605] <3>[ 17.663711] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.664137] Hardware name: linux,dummy-virt (DT) <3>[ 17.664330] Call trace: <3>[ 17.664465] dump_backtrace+0x9c/0x128 <3>[ 17.664661] show_stack+0x20/0x38 <3>[ 17.664841] dump_stack_lvl+0x8c/0xd0 <3>[ 17.665045] print_report+0x118/0x5e0 <3>[ 17.665278] kasan_report+0xc8/0x118 <3>[ 17.665518] kasan_check_range+0x100/0x1a8 <3>[ 17.665763] __kasan_check_write+0x20/0x30 <3>[ 17.666032] kasan_atomics_helper+0x1780/0x49e0 <3>[ 17.666330] kasan_atomics+0x1a0/0x2e8 <3>[ 17.666571] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.666839] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.667142] kthread+0x24c/0x2d0 <3>[ 17.667316] ret_from_fork+0x10/0x20 <3>[ 17.667528] <3>[ 17.667657] Allocated by task 247: <4>[ 17.667861] kasan_save_stack+0x3c/0x68 <4>[ 17.668092] kasan_save_track+0x20/0x40 <4>[ 17.668313] kasan_save_alloc_info+0x40/0x58 <4>[ 17.668515] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.668693] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.668935] kasan_atomics+0xb8/0x2e8 <4>[ 17.669128] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.669331] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.669598] kthread+0x24c/0x2d0 <4>[ 17.669783] ret_from_fork+0x10/0x20 <3>[ 17.669975] <3>[ 17.670100] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.670100] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.670631] The buggy address is located 0 bytes to the right of <3>[ 17.670631] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.671170] <3>[ 17.671273] The buggy address belongs to the physical page: <4>[ 17.671539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.671861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.672130] page_type: 0xffffefff(slab) <4>[ 17.672315] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.672657] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.672956] page dumped because: kasan: bad access detected <3>[ 17.673180] <3>[ 17.673278] Memory state around the buggy address: <3>[ 17.673464] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.673805] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.674170] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.674554] ^ <3>[ 17.674778] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.675133] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.675499] ================================================================== <3>[ 17.675927] ================================================================== <3>[ 17.676328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f90/0x49e0 <3>[ 17.676670] Read of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.677004] <3>[ 17.677140] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.677604] Hardware name: linux,dummy-virt (DT) <3>[ 17.677869] Call trace: <3>[ 17.678058] dump_backtrace+0x9c/0x128 <3>[ 17.678310] show_stack+0x20/0x38 <3>[ 17.678535] dump_stack_lvl+0x8c/0xd0 <3>[ 17.678766] print_report+0x118/0x5e0 <3>[ 17.679004] kasan_report+0xc8/0x118 <3>[ 17.679225] __asan_report_load8_noabort+0x20/0x30 <3>[ 17.679510] kasan_atomics_helper+0x3f90/0x49e0 <3>[ 17.679794] kasan_atomics+0x1a0/0x2e8 <3>[ 17.680028] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.680268] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.680559] kthread+0x24c/0x2d0 <3>[ 17.680733] ret_from_fork+0x10/0x20 <3>[ 17.680988] <3>[ 17.681128] Allocated by task 247: <4>[ 17.681350] kasan_save_stack+0x3c/0x68 <4>[ 17.681591] kasan_save_track+0x20/0x40 <4>[ 17.681840] kasan_save_alloc_info+0x40/0x58 <4>[ 17.682104] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.682315] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.682517] kasan_atomics+0xb8/0x2e8 <4>[ 17.682701] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.682884] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.683120] kthread+0x24c/0x2d0 <4>[ 17.683267] ret_from_fork+0x10/0x20 <3>[ 17.683432] <3>[ 17.683529] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.683529] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.683975] The buggy address is located 0 bytes to the right of <3>[ 17.683975] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.684409] <3>[ 17.684505] The buggy address belongs to the physical page: <4>[ 17.684718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.685028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.685316] page_type: 0xffffefff(slab) <4>[ 17.685487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.685771] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.686050] page dumped because: kasan: bad access detected <3>[ 17.686275] <3>[ 17.686377] Memory state around the buggy address: <3>[ 17.686567] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.686848] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.687123] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.687377] ^ <3>[ 17.687595] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.687926] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.688291] ================================================================== <3>[ 17.688855] ================================================================== <3>[ 17.689165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49e0 <3>[ 17.689538] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.689945] <3>[ 17.690081] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.690564] Hardware name: linux,dummy-virt (DT) <3>[ 17.690825] Call trace: <3>[ 17.690987] dump_backtrace+0x9c/0x128 <3>[ 17.691205] show_stack+0x20/0x38 <3>[ 17.691413] dump_stack_lvl+0x8c/0xd0 <3>[ 17.691657] print_report+0x118/0x5e0 <3>[ 17.691883] kasan_report+0xc8/0x118 <3>[ 17.692130] kasan_check_range+0x100/0x1a8 <3>[ 17.692366] __kasan_check_write+0x20/0x30 <3>[ 17.692604] kasan_atomics_helper+0x1810/0x49e0 <3>[ 17.692875] kasan_atomics+0x1a0/0x2e8 <3>[ 17.693138] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.693425] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.693765] kthread+0x24c/0x2d0 <3>[ 17.694008] ret_from_fork+0x10/0x20 <3>[ 17.694247] <3>[ 17.694359] Allocated by task 247: <4>[ 17.694565] kasan_save_stack+0x3c/0x68 <4>[ 17.694822] kasan_save_track+0x20/0x40 <4>[ 17.695056] kasan_save_alloc_info+0x40/0x58 <4>[ 17.695313] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.695530] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.695798] kasan_atomics+0xb8/0x2e8 <4>[ 17.695992] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.696218] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.696537] kthread+0x24c/0x2d0 <4>[ 17.696783] ret_from_fork+0x10/0x20 <3>[ 17.697030] <3>[ 17.697165] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.697165] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.697730] The buggy address is located 0 bytes to the right of <3>[ 17.697730] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.698294] <3>[ 17.698434] The buggy address belongs to the physical page: <4>[ 17.698693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.699029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.699338] page_type: 0xffffefff(slab) <4>[ 17.699572] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.699933] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.700321] page dumped because: kasan: bad access detected <3>[ 17.700609] <3>[ 17.700731] Memory state around the buggy address: <3>[ 17.700987] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.701360] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.701724] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.702073] ^ <3>[ 17.702362] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.702724] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.703073] ================================================================== <3>[ 17.703480] ================================================================== <3>[ 17.703857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fa0/0x49e0 <3>[ 17.704220] Read of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.704514] <3>[ 17.704645] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.705095] Hardware name: linux,dummy-virt (DT) <3>[ 17.705351] Call trace: <3>[ 17.705531] dump_backtrace+0x9c/0x128 <3>[ 17.705777] show_stack+0x20/0x38 <3>[ 17.706009] dump_stack_lvl+0x8c/0xd0 <3>[ 17.706207] print_report+0x118/0x5e0 <3>[ 17.706395] kasan_report+0xc8/0x118 <3>[ 17.706619] __asan_report_load8_noabort+0x20/0x30 <3>[ 17.706826] kasan_atomics_helper+0x3fa0/0x49e0 <3>[ 17.707027] kasan_atomics+0x1a0/0x2e8 <3>[ 17.707207] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.707392] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.707641] kthread+0x24c/0x2d0 <3>[ 17.707855] ret_from_fork+0x10/0x20 <3>[ 17.708079] <3>[ 17.708213] Allocated by task 247: <4>[ 17.708412] kasan_save_stack+0x3c/0x68 <4>[ 17.708640] kasan_save_track+0x20/0x40 <4>[ 17.708872] kasan_save_alloc_info+0x40/0x58 <4>[ 17.709122] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.709340] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.709624] kasan_atomics+0xb8/0x2e8 <4>[ 17.709857] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.710132] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.710431] kthread+0x24c/0x2d0 <4>[ 17.710667] ret_from_fork+0x10/0x20 <3>[ 17.710893] <3>[ 17.711025] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.711025] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.711542] The buggy address is located 0 bytes to the right of <3>[ 17.711542] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.712039] <3>[ 17.712167] The buggy address belongs to the physical page: <4>[ 17.712430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.712825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.713092] page_type: 0xffffefff(slab) <4>[ 17.713288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.713639] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.713940] page dumped because: kasan: bad access detected <3>[ 17.714155] <3>[ 17.714273] Memory state around the buggy address: <3>[ 17.714495] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.714783] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.715050] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.715329] ^ <3>[ 17.715546] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.715811] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.716089] ================================================================== <3>[ 17.716531] ================================================================== <3>[ 17.716965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49e0 <3>[ 17.717318] Write of size 8 at addr fff00000c65d1630 by task kunit_try_catch/247 <3>[ 17.717601] <3>[ 17.717703] CPU: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.718150] Hardware name: linux,dummy-virt (DT) <3>[ 17.718357] Call trace: <3>[ 17.718497] dump_backtrace+0x9c/0x128 <3>[ 17.718721] show_stack+0x20/0x38 <3>[ 17.718888] dump_stack_lvl+0x8c/0xd0 <3>[ 17.719091] print_report+0x118/0x5e0 <3>[ 17.719268] kasan_report+0xc8/0x118 <3>[ 17.719437] kasan_check_range+0x100/0x1a8 <3>[ 17.719621] __kasan_check_write+0x20/0x30 <3>[ 17.719806] kasan_atomics_helper+0x18a4/0x49e0 <3>[ 17.720042] kasan_atomics+0x1a0/0x2e8 <3>[ 17.720235] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.720454] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.720703] kthread+0x24c/0x2d0 <3>[ 17.720882] ret_from_fork+0x10/0x20 <3>[ 17.721083] <3>[ 17.721182] Allocated by task 247: <4>[ 17.721334] kasan_save_stack+0x3c/0x68 <4>[ 17.721525] kasan_save_track+0x20/0x40 <4>[ 17.721731] kasan_save_alloc_info+0x40/0x58 <4>[ 17.721967] __kasan_kmalloc+0xd4/0xd8 <4>[ 17.722159] kmalloc_trace_noprof+0x15c/0x348 <4>[ 17.722365] kasan_atomics+0xb8/0x2e8 <4>[ 17.722547] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.722790] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.723111] kthread+0x24c/0x2d0 <4>[ 17.723329] ret_from_fork+0x10/0x20 <3>[ 17.723557] <3>[ 17.723686] The buggy address belongs to the object at fff00000c65d1600 <3>[ 17.723686] which belongs to the cache kmalloc-64 of size 64 <3>[ 17.724249] The buggy address is located 0 bytes to the right of <3>[ 17.724249] allocated 48-byte region [fff00000c65d1600, fff00000c65d1630) <3>[ 17.724806] <3>[ 17.724918] The buggy address belongs to the physical page: <4>[ 17.725187] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d1 <4>[ 17.725600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.725906] page_type: 0xffffefff(slab) <4>[ 17.726092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 <4>[ 17.726395] raw: 0000000000000000 0000000080200020 00000001ffffefff 0000000000000000 <4>[ 17.726663] page dumped because: kasan: bad access detected <3>[ 17.726870] <3>[ 17.726966] Memory state around the buggy address: <3>[ 17.727157] fff00000c65d1500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.727424] fff00000c65d1580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc <3>[ 17.727685] >fff00000c65d1600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc <3>[ 17.727940] ^ <3>[ 17.728130] fff00000c65d1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.728397] fff00000c65d1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc <3>[ 17.728666] ================================================================== <6>[ 17.731014] ok 63 kasan_atomics <6>[ 17.733530] ok 64 vmalloc_helpers_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n <3>[ 17.736297] ================================================================== <3>[ 17.737854] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x558/0x5a8 <3>[ 17.738671] Read of size 1 at addr ffff8000800eb7f3 by task kunit_try_catch/251 <3>[ 17.739470] <3>[ 17.739810] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.740854] Hardware name: linux,dummy-virt (DT) <3>[ 17.741449] Call trace: <3>[ 17.741853] dump_backtrace+0x9c/0x128 <3>[ 17.742473] show_stack+0x20/0x38 <3>[ 17.742998] dump_stack_lvl+0x8c/0xd0 <3>[ 17.743506] print_report+0x2fc/0x5e0 <3>[ 17.744007] kasan_report+0xc8/0x118 <3>[ 17.744480] __asan_report_load1_noabort+0x20/0x30 <3>[ 17.745096] vmalloc_oob+0x558/0x5a8 <3>[ 17.745592] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.746333] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.747005] kthread+0x24c/0x2d0 <3>[ 17.747470] ret_from_fork+0x10/0x20 <3>[ 17.747979] <3>[ 17.748299] The buggy address belongs to the virtual mapping at <3>[ 17.748299] [ffff8000800eb000, ffff8000800ed000) created by: <3>[ 17.748299] vmalloc_oob+0x98/0x5a8 <3>[ 17.749910] <3>[ 17.750189] The buggy address belongs to the physical page: <4>[ 17.750860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 <4>[ 17.751755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.752555] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 <4>[ 17.753434] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 17.754406] page dumped because: kasan: bad access detected <3>[ 17.755092] <3>[ 17.755357] Memory state around the buggy address: <3>[ 17.755933] ffff8000800eb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 17.756665] ffff8000800eb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 17.757420] >ffff8000800eb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 <3>[ 17.758388] ^ <3>[ 17.759179] ffff8000800eb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 <3>[ 17.759919] ffff8000800eb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 <3>[ 17.760802] ================================================================== <3>[ 17.762173] ================================================================== <3>[ 17.762879] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x504/0x5a8 <3>[ 17.763561] Read of size 1 at addr ffff8000800eb7f8 by task kunit_try_catch/251 <3>[ 17.764356] <3>[ 17.764580] CPU: 1 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.765572] Hardware name: linux,dummy-virt (DT) <3>[ 17.766190] Call trace: <3>[ 17.766613] dump_backtrace+0x9c/0x128 <3>[ 17.767084] show_stack+0x20/0x38 <3>[ 17.767543] dump_stack_lvl+0x8c/0xd0 <3>[ 17.767958] print_report+0x2fc/0x5e0 <3>[ 17.768409] kasan_report+0xc8/0x118 <3>[ 17.768878] __asan_report_load1_noabort+0x20/0x30 <3>[ 17.769489] vmalloc_oob+0x504/0x5a8 <3>[ 17.770001] kunit_try_run_case+0x14c/0x3d0 <3>[ 17.770503] kunit_generic_run_threadfn_adapter+0x88/0x100 <3>[ 17.771129] kthread+0x24c/0x2d0 <3>[ 17.771494] ret_from_fork+0x10/0x20 <3>[ 17.771867] <3>[ 17.772126] The buggy address belongs to the virtual mapping at <3>[ 17.772126] [ffff8000800eb000, ffff8000800ed000) created by: <3>[ 17.772126] vmalloc_oob+0x98/0x5a8 <3>[ 17.773605] <3>[ 17.773975] The buggy address belongs to the physical page: <4>[ 17.774682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106614 <4>[ 17.775568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) <4>[ 17.776330] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 <4>[ 17.777040] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 <4>[ 17.777885] page dumped because: kasan: bad access detected <3>[ 17.778582] <3>[ 17.778836] Memory state around the buggy address: <3>[ 17.779327] ffff8000800eb680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 17.780090] ffff8000800eb700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 <3>[ 17.780883] >ffff8000800eb780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 <3>[ 17.781719] ^ <3>[ 17.782653] ffff8000800eb800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 <3>[ 17.783547] ffff8000800eb880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 <3>[ 17.784433] ================================================================== <6>[ 17.787846] ok 65 vmalloc_oob <6>[ 17.790588] ok 66 vmap_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y <6>[ 17.793205] ok 67 vm_map_ram_tags # SKIP Test requires CONFIG_KASAN_SW_TAGS=y <6>[ 17.796349] ok 68 vmalloc_percpu # SKIP Test requires CONFIG_KASAN_SW_TAGS=y <6>[ 17.799482] ok 69 match_all_not_assigned # SKIP Test requires CONFIG_KASAN_GENERIC=n <6>[ 17.802698] ok 70 match_all_ptr_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n <6>[ 17.805486] ok 71 match_all_mem_tag # SKIP Test requires CONFIG_KASAN_GENERIC=n <6>[ 17.815012] # kasan: pass:59 fail:1 skip:11 total:71 <6>[ 17.815686] # Totals: pass:59 fail:1 skip:11 total:71 <6>[ 17.816211] not ok 6 kasan <6>[ 17.818691] KTAP version 1 <6>[ 17.819100] # Subtest: kfence <6>[ 17.819427] 1..25 <6>[ 17.821147] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=left, cache=0 <3>[ 17.991563] ================================================================== <3>[ 17.991973] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 <3>[ 17.991973] <3>[ 17.992428] Out-of-bounds read at 0x000000003d3899da (1B left of kfence-#64): <4>[ 17.992773] test_out_of_bounds_read+0x114/0x3e0 <4>[ 17.993027] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.993255] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.993495] kthread+0x24c/0x2d0 <4>[ 17.993652] ret_from_fork+0x10/0x20 <3>[ 17.993815] <4>[ 17.993936] kfence-#64: 0x00000000256795e9-0x000000003bb6b119, size=32, cache=kmalloc-32 <4>[ 17.993936] <4>[ 17.994316] allocated by task 265 on cpu 1 at 17.990617s: <4>[ 17.994610] test_alloc+0x298/0x630 <4>[ 17.994805] test_out_of_bounds_read+0xdc/0x3e0 <4>[ 17.995056] kunit_try_run_case+0x14c/0x3d0 <4>[ 17.995276] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 17.995542] kthread+0x24c/0x2d0 <4>[ 17.995747] ret_from_fork+0x10/0x20 <3>[ 17.995962] <3>[ 17.996099] CPU: 1 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 17.996523] Hardware name: linux,dummy-virt (DT) <3>[ 17.996765] ================================================================== <6>[ 17.997731] # test_out_of_bounds_read: test_alloc: size=32, gfp=cc0, policy=right, cache=0 <3>[ 18.094349] ================================================================== <3>[ 18.094721] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 <3>[ 18.094721] <3>[ 18.095209] Out-of-bounds read at 0x00000000d14b6359 (32B right of kfence-#65): <4>[ 18.095519] test_out_of_bounds_read+0x1c8/0x3e0 <4>[ 18.095723] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.095955] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.096234] kthread+0x24c/0x2d0 <4>[ 18.096391] ret_from_fork+0x10/0x20 <3>[ 18.096561] <4>[ 18.096663] kfence-#65: 0x000000000a104e56-0x000000006c90dccf, size=32, cache=kmalloc-32 <4>[ 18.096663] <4>[ 18.097017] allocated by task 265 on cpu 1 at 18.094218s: <4>[ 18.097268] test_alloc+0x298/0x630 <4>[ 18.097472] test_out_of_bounds_read+0x198/0x3e0 <4>[ 18.097724] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.097976] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.098213] kthread+0x24c/0x2d0 <4>[ 18.098421] ret_from_fork+0x10/0x20 <3>[ 18.098667] <3>[ 18.098825] CPU: 1 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 18.099359] Hardware name: linux,dummy-virt (DT) <3>[ 18.099618] ================================================================== <6>[ 18.102943] ok 1 test_out_of_bounds_read <6>[ 18.104782] # test_out_of_bounds_read-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 18.108963] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 <3>[ 18.198184] ================================================================== <3>[ 18.198477] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 <3>[ 18.198477] <3>[ 18.198944] Out-of-bounds read at 0x000000003c9ba1ae (1B left of kfence-#66): <4>[ 18.199339] test_out_of_bounds_read+0x114/0x3e0 <4>[ 18.199576] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.199777] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.200043] kthread+0x24c/0x2d0 <4>[ 18.200221] ret_from_fork+0x10/0x20 <3>[ 18.200442] <4>[ 18.200570] kfence-#66: 0x00000000e51a81dd-0x00000000b98a8dd6, size=32, cache=test <4>[ 18.200570] <4>[ 18.201015] allocated by task 267 on cpu 0 at 18.198127s: <4>[ 18.201349] test_alloc+0x22c/0x630 <4>[ 18.201576] test_out_of_bounds_read+0xdc/0x3e0 <4>[ 18.201840] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.202143] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.202466] kthread+0x24c/0x2d0 <4>[ 18.202700] ret_from_fork+0x10/0x20 <3>[ 18.202927] <3>[ 18.203075] CPU: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 18.203573] Hardware name: linux,dummy-virt (DT) <3>[ 18.203840] ================================================================== <6>[ 18.204392] # test_out_of_bounds_read-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 <3>[ 18.302308] ================================================================== <3>[ 18.302695] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 <3>[ 18.302695] <3>[ 18.303165] Out-of-bounds read at 0x0000000068894fbb (32B right of kfence-#67): <4>[ 18.303548] test_out_of_bounds_read+0x1c8/0x3e0 <4>[ 18.303843] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.304076] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.304358] kthread+0x24c/0x2d0 <4>[ 18.304570] ret_from_fork+0x10/0x20 <3>[ 18.304782] <4>[ 18.304906] kfence-#67: 0x00000000814cd2ec-0x000000008603d905, size=32, cache=test <4>[ 18.304906] <4>[ 18.305339] allocated by task 267 on cpu 0 at 18.302258s: <4>[ 18.305647] test_alloc+0x22c/0x630 <4>[ 18.305912] test_out_of_bounds_read+0x198/0x3e0 <4>[ 18.306178] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.306412] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.306706] kthread+0x24c/0x2d0 <4>[ 18.306934] ret_from_fork+0x10/0x20 <3>[ 18.307105] <3>[ 18.307235] CPU: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 18.307736] Hardware name: linux,dummy-virt (DT) <3>[ 18.308010] ================================================================== <6>[ 18.336358] ok 2 test_out_of_bounds_read-memcache <6>[ 18.337843] # test_out_of_bounds_write: test_alloc: size=32, gfp=cc0, policy=left, cache=0 <3>[ 18.406231] ================================================================== <3>[ 18.406510] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 <3>[ 18.406510] <3>[ 18.406843] Out-of-bounds write at 0x000000000d9d3a62 (1B left of kfence-#68): <4>[ 18.407230] test_out_of_bounds_write+0x100/0x240 <4>[ 18.407511] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.407778] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.408122] kthread+0x24c/0x2d0 <4>[ 18.408374] ret_from_fork+0x10/0x20 <3>[ 18.408554] <4>[ 18.408672] kfence-#68: 0x000000009f7c3a5a-0x000000002ab46212, size=32, cache=kmalloc-32 <4>[ 18.408672] <4>[ 18.409033] allocated by task 269 on cpu 1 at 18.406129s: <4>[ 18.409289] test_alloc+0x298/0x630 <4>[ 18.409483] test_out_of_bounds_write+0xc8/0x240 <4>[ 18.409728] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.409953] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.410206] kthread+0x24c/0x2d0 <4>[ 18.410389] ret_from_fork+0x10/0x20 <3>[ 18.410608] <3>[ 18.410719] CPU: 1 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 18.411121] Hardware name: linux,dummy-virt (DT) <3>[ 18.411337] ================================================================== <6>[ 18.414476] ok 3 test_out_of_bounds_write <6>[ 18.415824] # test_out_of_bounds_write-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 18.419384] # test_out_of_bounds_write-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 <3>[ 18.614329] ================================================================== <3>[ 18.614698] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 <3>[ 18.614698] <3>[ 18.615058] Out-of-bounds write at 0x000000002eb957f2 (1B left of kfence-#70): <4>[ 18.615333] test_out_of_bounds_write+0x100/0x240 <4>[ 18.615562] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.615818] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.616101] kthread+0x24c/0x2d0 <4>[ 18.616273] ret_from_fork+0x10/0x20 <3>[ 18.616477] <4>[ 18.616603] kfence-#70: 0x00000000189a47c0-0x00000000faf454e3, size=32, cache=test <4>[ 18.616603] <4>[ 18.616952] allocated by task 271 on cpu 0 at 18.614281s: <4>[ 18.617228] test_alloc+0x22c/0x630 <4>[ 18.617404] test_out_of_bounds_write+0xc8/0x240 <4>[ 18.617638] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.617895] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.618147] kthread+0x24c/0x2d0 <4>[ 18.618320] ret_from_fork+0x10/0x20 <3>[ 18.618545] <3>[ 18.618677] CPU: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 18.619071] Hardware name: linux,dummy-virt (DT) <3>[ 18.619295] ================================================================== <6>[ 18.645473] ok 4 test_out_of_bounds_write-memcache <6>[ 18.646967] # test_use_after_free_read: test_alloc: size=32, gfp=cc0, policy=any, cache=0 <3>[ 18.718287] ================================================================== <3>[ 18.718585] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 <3>[ 18.718585] <3>[ 18.718922] Use-after-free read at 0x00000000189e49c7 (in kfence-#71): <4>[ 18.719166] test_use_after_free_read+0x114/0x248 <4>[ 18.719366] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.719545] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.719757] kthread+0x24c/0x2d0 <4>[ 18.719912] ret_from_fork+0x10/0x20 <3>[ 18.720078] <4>[ 18.720176] kfence-#71: 0x00000000189e49c7-0x00000000052c9cdc, size=32, cache=kmalloc-32 <4>[ 18.720176] <4>[ 18.720504] allocated by task 273 on cpu 1 at 18.718087s: <4>[ 18.720730] test_alloc+0x298/0x630 <4>[ 18.720894] test_use_after_free_read+0xd0/0x248 <4>[ 18.721086] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.721264] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.721500] kthread+0x24c/0x2d0 <4>[ 18.721676] ret_from_fork+0x10/0x20 <4>[ 18.721886] <4>[ 18.721986] freed by task 273 on cpu 1 at 18.718130s: <4>[ 18.722272] test_use_after_free_read+0x1c0/0x248 <4>[ 18.722552] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.722808] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.723115] kthread+0x24c/0x2d0 <4>[ 18.723314] ret_from_fork+0x10/0x20 <3>[ 18.723534] <3>[ 18.723697] CPU: 1 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 18.724199] Hardware name: linux,dummy-virt (DT) <3>[ 18.724467] ================================================================== <6>[ 18.726718] ok 5 test_use_after_free_read <6>[ 18.728101] # test_use_after_free_read-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 18.731367] # test_use_after_free_read-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <3>[ 18.822348] ================================================================== <3>[ 18.822653] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 <3>[ 18.822653] <3>[ 18.822995] Use-after-free read at 0x000000000418edf4 (in kfence-#72): <4>[ 18.823236] test_use_after_free_read+0x114/0x248 <4>[ 18.823427] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.823614] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.823830] kthread+0x24c/0x2d0 <4>[ 18.824035] ret_from_fork+0x10/0x20 <3>[ 18.824272] <4>[ 18.824393] kfence-#72: 0x000000000418edf4-0x000000008b8b0e02, size=32, cache=test <4>[ 18.824393] <4>[ 18.824717] allocated by task 275 on cpu 0 at 18.822225s: <4>[ 18.824997] test_alloc+0x22c/0x630 <4>[ 18.825206] test_use_after_free_read+0xd0/0x248 <4>[ 18.825432] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.825658] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.825893] kthread+0x24c/0x2d0 <4>[ 18.826083] ret_from_fork+0x10/0x20 <4>[ 18.826267] <4>[ 18.826394] freed by task 275 on cpu 0 at 18.822261s: <4>[ 18.826713] test_use_after_free_read+0xf0/0x248 <4>[ 18.826986] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.827235] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.827520] kthread+0x24c/0x2d0 <4>[ 18.827728] ret_from_fork+0x10/0x20 <3>[ 18.827943] <3>[ 18.828077] CPU: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 18.828503] Hardware name: linux,dummy-virt (DT) <3>[ 18.828748] ================================================================== <6>[ 18.839709] ok 6 test_use_after_free_read-memcache <6>[ 18.841369] # test_double_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 <3>[ 18.926264] ================================================================== <3>[ 18.926586] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 <3>[ 18.926586] <3>[ 18.926905] Invalid free of 0x00000000da526ef5 (in kfence-#73): <4>[ 18.927157] test_double_free+0x1bc/0x238 <4>[ 18.927357] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.927557] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.927808] kthread+0x24c/0x2d0 <4>[ 18.927988] ret_from_fork+0x10/0x20 <3>[ 18.928175] <4>[ 18.928290] kfence-#73: 0x00000000da526ef5-0x0000000020b46f1f, size=32, cache=kmalloc-32 <4>[ 18.928290] <4>[ 18.928668] allocated by task 277 on cpu 1 at 18.926113s: <4>[ 18.928955] test_alloc+0x298/0x630 <4>[ 18.929187] test_double_free+0xd4/0x238 <4>[ 18.929365] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.929556] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.929790] kthread+0x24c/0x2d0 <4>[ 18.929960] ret_from_fork+0x10/0x20 <4>[ 18.930155] <4>[ 18.930259] freed by task 277 on cpu 1 at 18.926151s: <4>[ 18.930471] test_double_free+0x1ac/0x238 <4>[ 18.930644] kunit_try_run_case+0x14c/0x3d0 <4>[ 18.930823] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 18.931039] kthread+0x24c/0x2d0 <4>[ 18.931215] ret_from_fork+0x10/0x20 <3>[ 18.931377] <3>[ 18.931477] CPU: 1 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 18.931847] Hardware name: linux,dummy-virt (DT) <3>[ 18.932033] ================================================================== <6>[ 18.933950] ok 7 test_double_free <6>[ 18.935525] # test_double_free-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 18.937403] # test_double_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <3>[ 19.030294] ================================================================== <3>[ 19.030599] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 <3>[ 19.030599] <3>[ 19.030903] Invalid free of 0x000000001f3914d2 (in kfence-#74): <4>[ 19.031128] test_double_free+0x100/0x238 <4>[ 19.031309] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.031486] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.031697] kthread+0x24c/0x2d0 <4>[ 19.031850] ret_from_fork+0x10/0x20 <3>[ 19.032009] <4>[ 19.032103] kfence-#74: 0x000000001f3914d2-0x0000000096aaf233, size=32, cache=test <4>[ 19.032103] <4>[ 19.032410] allocated by task 279 on cpu 1 at 19.030151s: <4>[ 19.032626] test_alloc+0x22c/0x630 <4>[ 19.032787] test_double_free+0xd4/0x238 <4>[ 19.032956] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.033130] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.033349] kthread+0x24c/0x2d0 <4>[ 19.033504] ret_from_fork+0x10/0x20 <4>[ 19.033665] <4>[ 19.033758] freed by task 279 on cpu 1 at 19.030190s: <4>[ 19.033987] test_double_free+0xf0/0x238 <4>[ 19.034163] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.034358] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.034578] kthread+0x24c/0x2d0 <4>[ 19.034736] ret_from_fork+0x10/0x20 <3>[ 19.034904] <3>[ 19.035008] CPU: 1 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 19.035367] Hardware name: linux,dummy-virt (DT) <3>[ 19.035558] ================================================================== <6>[ 19.047967] ok 8 test_double_free-memcache <6>[ 19.049198] # test_invalid_addr_free: test_alloc: size=32, gfp=cc0, policy=any, cache=0 <3>[ 19.134328] ================================================================== <3>[ 19.134621] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 <3>[ 19.134621] <3>[ 19.134933] Invalid free of 0x0000000006e3d01d (in kfence-#75): <4>[ 19.135160] test_invalid_addr_free+0x1ac/0x238 <4>[ 19.135358] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.135540] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.135759] kthread+0x24c/0x2d0 <4>[ 19.135930] ret_from_fork+0x10/0x20 <3>[ 19.136095] <4>[ 19.136191] kfence-#75: 0x000000001d2b950c-0x00000000346fe6f6, size=32, cache=kmalloc-32 <4>[ 19.136191] <4>[ 19.136515] allocated by task 281 on cpu 1 at 19.134246s: <4>[ 19.136731] test_alloc+0x298/0x630 <4>[ 19.136891] test_invalid_addr_free+0xd4/0x238 <4>[ 19.137075] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.137252] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.137466] kthread+0x24c/0x2d0 <4>[ 19.137615] ret_from_fork+0x10/0x20 <3>[ 19.137775] <3>[ 19.137895] CPU: 1 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 19.138260] Hardware name: linux,dummy-virt (DT) <3>[ 19.138449] ================================================================== <6>[ 19.140162] ok 9 test_invalid_addr_free <6>[ 19.141105] # test_invalid_addr_free-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 19.144390] # test_invalid_addr_free-memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <3>[ 19.238165] ================================================================== <3>[ 19.238437] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 <3>[ 19.238437] <3>[ 19.238731] Invalid free of 0x00000000f6b16faf (in kfence-#76): <4>[ 19.238953] test_invalid_addr_free+0xec/0x238 <4>[ 19.239145] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.239321] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.239535] kthread+0x24c/0x2d0 <4>[ 19.239687] ret_from_fork+0x10/0x20 <3>[ 19.239846] <4>[ 19.239939] kfence-#76: 0x00000000ebea2bc8-0x000000000f135fec, size=32, cache=test <4>[ 19.239939] <4>[ 19.240245] allocated by task 283 on cpu 0 at 19.238108s: <4>[ 19.240460] test_alloc+0x22c/0x630 <4>[ 19.240624] test_invalid_addr_free+0xd4/0x238 <4>[ 19.240811] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.240984] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.241195] kthread+0x24c/0x2d0 <4>[ 19.241344] ret_from_fork+0x10/0x20 <3>[ 19.241505] <3>[ 19.241604] CPU: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 19.241971] Hardware name: linux,dummy-virt (DT) <3>[ 19.242157] ================================================================== <6>[ 19.250371] ok 10 test_invalid_addr_free-memcache <6>[ 19.251760] # test_corruption: test_alloc: size=32, gfp=cc0, policy=left, cache=0 <3>[ 19.550409] ================================================================== <3>[ 19.550735] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 <3>[ 19.550735] <3>[ 19.551033] Corrupted memory at 0x00000000843c6b47 [ ! . . . . . . . . . . . . . . . ] (in kfence-#79): <4>[ 19.551797] test_corruption+0x278/0x378 <4>[ 19.551993] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.552199] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.552426] kthread+0x24c/0x2d0 <4>[ 19.552602] ret_from_fork+0x10/0x20 <3>[ 19.552794] <4>[ 19.552903] kfence-#79: 0x00000000dcc81159-0x00000000a301d0ab, size=32, cache=kmalloc-32 <4>[ 19.552903] <4>[ 19.553241] allocated by task 285 on cpu 1 at 19.550271s: <4>[ 19.553477] test_alloc+0x298/0x630 <4>[ 19.553650] test_corruption+0xdc/0x378 <4>[ 19.553829] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.554033] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.554271] kthread+0x24c/0x2d0 <4>[ 19.554432] ret_from_fork+0x10/0x20 <4>[ 19.554617] <4>[ 19.554720] freed by task 285 on cpu 1 at 19.550348s: <4>[ 19.554950] test_corruption+0x278/0x378 <4>[ 19.555133] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.555327] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.555556] kthread+0x24c/0x2d0 <4>[ 19.555723] ret_from_fork+0x10/0x20 <3>[ 19.555902] <3>[ 19.556023] CPU: 1 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 19.556391] Hardware name: linux,dummy-virt (DT) <3>[ 19.556600] ================================================================== <6>[ 19.557132] # test_corruption: test_alloc: size=32, gfp=cc0, policy=right, cache=0 <3>[ 19.862371] ================================================================== <3>[ 19.862696] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 <3>[ 19.862696] <3>[ 19.863052] Corrupted memory at 0x00000000e644fe9f [ ! ] (in kfence-#82): <4>[ 19.863406] test_corruption+0x284/0x378 <4>[ 19.863599] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.863780] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.864001] kthread+0x24c/0x2d0 <4>[ 19.864165] ret_from_fork+0x10/0x20 <3>[ 19.864333] <4>[ 19.864430] kfence-#82: 0x00000000a3caa95c-0x00000000f2d6b348, size=32, cache=kmalloc-32 <4>[ 19.864430] <4>[ 19.864754] allocated by task 285 on cpu 1 at 19.862160s: <4>[ 19.864968] test_alloc+0x298/0x630 <4>[ 19.865124] test_corruption+0x198/0x378 <4>[ 19.865296] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.865466] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.865678] kthread+0x24c/0x2d0 <4>[ 19.865825] ret_from_fork+0x10/0x20 <4>[ 19.866006] <4>[ 19.866109] freed by task 285 on cpu 1 at 19.862239s: <4>[ 19.866337] test_corruption+0x284/0x378 <4>[ 19.866544] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.866735] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.866960] kthread+0x24c/0x2d0 <4>[ 19.867116] ret_from_fork+0x10/0x20 <3>[ 19.867284] <3>[ 19.867396] CPU: 1 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 19.867772] Hardware name: linux,dummy-virt (DT) <3>[ 19.867963] ================================================================== <6>[ 19.870341] ok 11 test_corruption <6>[ 19.871362] # test_corruption-memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 19.874791] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=left, cache=1 <3>[ 19.966216] ================================================================== <3>[ 19.966606] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 <3>[ 19.966606] <3>[ 19.967022] Corrupted memory at 0x00000000165d6e5c [ ! . . . . . . . . . . . . . . . ] (in kfence-#83): <4>[ 19.967885] test_corruption+0x120/0x378 <4>[ 19.968168] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.968457] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.968791] kthread+0x24c/0x2d0 <4>[ 19.969045] ret_from_fork+0x10/0x20 <3>[ 19.969289] <4>[ 19.969419] kfence-#83: 0x0000000017121343-0x000000004a2bcd1b, size=32, cache=test <4>[ 19.969419] <4>[ 19.969800] allocated by task 287 on cpu 0 at 19.966137s: <4>[ 19.970048] test_alloc+0x22c/0x630 <4>[ 19.970245] test_corruption+0xdc/0x378 <4>[ 19.970420] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.970602] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.970824] kthread+0x24c/0x2d0 <4>[ 19.970978] ret_from_fork+0x10/0x20 <4>[ 19.971142] <4>[ 19.971239] freed by task 287 on cpu 0 at 19.966165s: <4>[ 19.971454] test_corruption+0x120/0x378 <4>[ 19.971640] kunit_try_run_case+0x14c/0x3d0 <4>[ 19.971822] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 19.972038] kthread+0x24c/0x2d0 <4>[ 19.972190] ret_from_fork+0x10/0x20 <3>[ 19.972353] <3>[ 19.972458] CPU: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 19.972883] Hardware name: linux,dummy-virt (DT) <3>[ 19.973112] ================================================================== <6>[ 19.973597] # test_corruption-memcache: test_alloc: size=32, gfp=cc0, policy=right, cache=1 <3>[ 20.174348] ================================================================== <3>[ 20.174656] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 <3>[ 20.174656] <3>[ 20.174944] Corrupted memory at 0x0000000000bc6c74 [ ! ] (in kfence-#85): <4>[ 20.175268] test_corruption+0x1d8/0x378 <4>[ 20.175441] kunit_try_run_case+0x14c/0x3d0 <4>[ 20.175616] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 20.175825] kthread+0x24c/0x2d0 <4>[ 20.175975] ret_from_fork+0x10/0x20 <3>[ 20.176135] <4>[ 20.176230] kfence-#85: 0x000000007a708e81-0x00000000f7da8cbe, size=32, cache=test <4>[ 20.176230] <4>[ 20.176531] allocated by task 287 on cpu 0 at 20.174248s: <4>[ 20.176740] test_alloc+0x22c/0x630 <4>[ 20.176900] test_corruption+0x198/0x378 <4>[ 20.177064] kunit_try_run_case+0x14c/0x3d0 <4>[ 20.177233] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 20.177435] kthread+0x24c/0x2d0 <4>[ 20.177581] ret_from_fork+0x10/0x20 <4>[ 20.177741] <4>[ 20.177830] freed by task 287 on cpu 0 at 20.174288s: <4>[ 20.178065] test_corruption+0x1d8/0x378 <4>[ 20.178254] kunit_try_run_case+0x14c/0x3d0 <4>[ 20.178437] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 20.178651] kthread+0x24c/0x2d0 <4>[ 20.178800] ret_from_fork+0x10/0x20 <3>[ 20.178962] <3>[ 20.179065] CPU: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 20.179411] Hardware name: linux,dummy-virt (DT) <3>[ 20.179605] ================================================================== <6>[ 20.220404] ok 12 test_corruption-memcache <6>[ 20.222650] # test_free_bulk: test_alloc: size=273, gfp=cc0, policy=right, cache=0 <6>[ 20.278194] # test_free_bulk: test_alloc: size=273, gfp=cc0, policy=none, cache=0 <6>[ 20.278654] # test_free_bulk: test_alloc: size=273, gfp=cc0, policy=left, cache=0 <6>[ 20.590300] # test_free_bulk: test_alloc: size=273, gfp=cc0, policy=none, cache=0 <6>[ 20.590806] # test_free_bulk: test_alloc: size=273, gfp=cc0, policy=none, cache=0 <6>[ 20.591400] # test_free_bulk: test_alloc: size=212, gfp=cc0, policy=right, cache=0 <6>[ 21.006234] # test_free_bulk: test_alloc: size=212, gfp=cc0, policy=none, cache=0 <6>[ 21.006705] # test_free_bulk: test_alloc: size=212, gfp=cc0, policy=left, cache=0 <6>[ 21.734548] # test_free_bulk: test_alloc: size=212, gfp=cc0, policy=none, cache=0 <6>[ 21.735054] # test_free_bulk: test_alloc: size=212, gfp=cc0, policy=none, cache=0 <6>[ 21.735519] # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=right, cache=0 <6>[ 22.254194] # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=none, cache=0 <6>[ 22.254744] # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=left, cache=0 <6>[ 22.462194] # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=none, cache=0 <6>[ 22.462748] # test_free_bulk: test_alloc: size=231, gfp=cc0, policy=none, cache=0 <6>[ 22.463303] # test_free_bulk: test_alloc: size=154, gfp=cc0, policy=right, cache=0 <6>[ 22.566534] # test_free_bulk: test_alloc: size=154, gfp=cc0, policy=none, cache=0 <6>[ 22.567053] # test_free_bulk: test_alloc: size=154, gfp=cc0, policy=left, cache=0 <6>[ 22.670391] # test_free_bulk: test_alloc: size=154, gfp=cc0, policy=none, cache=0 <6>[ 22.670918] # test_free_bulk: test_alloc: size=154, gfp=cc0, policy=none, cache=0 <6>[ 22.671412] # test_free_bulk: test_alloc: size=185, gfp=cc0, policy=right, cache=0 <6>[ 22.878382] # test_free_bulk: test_alloc: size=185, gfp=cc0, policy=none, cache=0 <6>[ 22.878950] # test_free_bulk: test_alloc: size=185, gfp=cc0, policy=left, cache=0 <6>[ 22.982183] # test_free_bulk: test_alloc: size=185, gfp=cc0, policy=none, cache=0 <6>[ 22.982589] # test_free_bulk: test_alloc: size=185, gfp=cc0, policy=none, cache=0 <4>[ 22.983117] # test_free_bulk: Test should be marked slow (runtime: 2.761396064s) <6>[ 22.985299] ok 13 test_free_bulk <6>[ 22.987581] # test_free_bulk-memcache: setup_test_cache: size=239, ctor=0x0 <6>[ 22.991045] # test_free_bulk-memcache: test_alloc: size=239, gfp=cc0, policy=right, cache=1 <6>[ 23.190227] # test_free_bulk-memcache: test_alloc: size=239, gfp=cc0, policy=none, cache=1 <6>[ 23.190687] # test_free_bulk-memcache: test_alloc: size=239, gfp=cc0, policy=left, cache=1 <6>[ 23.294380] # test_free_bulk-memcache: test_alloc: size=239, gfp=cc0, policy=none, cache=1 <6>[ 23.294806] # test_free_bulk-memcache: test_alloc: size=239, gfp=cc0, policy=none, cache=1 <6>[ 23.339265] # test_free_bulk-memcache: setup_test_cache: size=177, ctor=ctor_set_x <6>[ 23.340509] # test_free_bulk-memcache: test_alloc: size=177, gfp=cc0, policy=right, cache=1 <6>[ 23.398250] # test_free_bulk-memcache: test_alloc: size=177, gfp=cc0, policy=none, cache=1 <6>[ 23.398738] # test_free_bulk-memcache: test_alloc: size=177, gfp=cc0, policy=left, cache=1 <6>[ 23.502230] # test_free_bulk-memcache: test_alloc: size=177, gfp=cc0, policy=none, cache=1 <6>[ 23.502679] # test_free_bulk-memcache: test_alloc: size=177, gfp=cc0, policy=none, cache=1 <6>[ 23.533055] # test_free_bulk-memcache: setup_test_cache: size=148, ctor=0x0 <6>[ 23.536303] # test_free_bulk-memcache: test_alloc: size=148, gfp=cc0, policy=right, cache=1 <6>[ 24.022171] # test_free_bulk-memcache: test_alloc: size=148, gfp=cc0, policy=none, cache=1 <6>[ 24.022621] # test_free_bulk-memcache: test_alloc: size=148, gfp=cc0, policy=left, cache=1 <6>[ 24.126319] # test_free_bulk-memcache: test_alloc: size=148, gfp=cc0, policy=none, cache=1 <6>[ 24.127285] # test_free_bulk-memcache: test_alloc: size=148, gfp=cc0, policy=none, cache=1 <6>[ 24.209447] # test_free_bulk-memcache: setup_test_cache: size=221, ctor=ctor_set_x <6>[ 24.212875] # test_free_bulk-memcache: test_alloc: size=221, gfp=cc0, policy=right, cache=1 <6>[ 24.334219] # test_free_bulk-memcache: test_alloc: size=221, gfp=cc0, policy=none, cache=1 <6>[ 24.334768] # test_free_bulk-memcache: test_alloc: size=221, gfp=cc0, policy=left, cache=1 <6>[ 24.438188] # test_free_bulk-memcache: test_alloc: size=221, gfp=cc0, policy=none, cache=1 <6>[ 24.438651] # test_free_bulk-memcache: test_alloc: size=221, gfp=cc0, policy=none, cache=1 <6>[ 24.471276] # test_free_bulk-memcache: setup_test_cache: size=304, ctor=0x0 <6>[ 24.472483] # test_free_bulk-memcache: test_alloc: size=304, gfp=cc0, policy=right, cache=1 <6>[ 24.854174] # test_free_bulk-memcache: test_alloc: size=304, gfp=cc0, policy=none, cache=1 <6>[ 24.854658] # test_free_bulk-memcache: test_alloc: size=304, gfp=cc0, policy=left, cache=1 <6>[ 25.166466] # test_free_bulk-memcache: test_alloc: size=304, gfp=cc0, policy=none, cache=1 <6>[ 25.166940] # test_free_bulk-memcache: test_alloc: size=304, gfp=cc0, policy=none, cache=1 <4>[ 25.253782] # test_free_bulk-memcache: Test should be marked slow (runtime: 2.266238192s) <6>[ 25.256666] ok 14 test_free_bulk-memcache <6>[ 25.260649] ok 15 test_init_on_free # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) <6>[ 25.263945] ok 16 test_init_on_free-memcache # SKIP Test requires: IS_ENABLED(CONFIG_INIT_ON_FREE_DEFAULT_ON) <6>[ 25.265641] # test_kmalloc_aligned_oob_read: test_alloc: size=73, gfp=cc0, policy=right, cache=0 <3>[ 25.270453] ================================================================== <3>[ 25.270723] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 <3>[ 25.270723] <3>[ 25.271083] Out-of-bounds read at 0x000000002200d1a3 (81B right of kfence-#134): <4>[ 25.271362] test_kmalloc_aligned_oob_read+0x238/0x468 <4>[ 25.271583] kunit_try_run_case+0x14c/0x3d0 <4>[ 25.271769] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 25.271989] kthread+0x24c/0x2d0 <4>[ 25.272147] ret_from_fork+0x10/0x20 <3>[ 25.272315] <4>[ 25.272411] kfence-#134: 0x000000002ef39b41-0x00000000b8059ae8, size=73, cache=kmalloc-96 <4>[ 25.272411] <4>[ 25.272756] allocated by task 297 on cpu 0 at 25.270305s: <4>[ 25.272987] test_alloc+0x298/0x630 <4>[ 25.273156] test_kmalloc_aligned_oob_read+0x100/0x468 <4>[ 25.273369] kunit_try_run_case+0x14c/0x3d0 <4>[ 25.273552] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 25.273770] kthread+0x24c/0x2d0 <4>[ 25.273983] ret_from_fork+0x10/0x20 <3>[ 25.274185] <3>[ 25.274311] CPU: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 25.274680] Hardware name: linux,dummy-virt (DT) <3>[ 25.274876] ================================================================== <6>[ 25.277073] ok 17 test_kmalloc_aligned_oob_read <6>[ 25.278965] # test_kmalloc_aligned_oob_write: test_alloc: size=73, gfp=cc0, policy=right, cache=0 <3>[ 25.582439] ================================================================== <3>[ 25.582741] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 <3>[ 25.582741] <3>[ 25.583069] Corrupted memory at 0x00000000ee95b2bb [ ! . . . . . . ] (in kfence-#137): <4>[ 25.583569] test_kmalloc_aligned_oob_write+0x214/0x2c0 <4>[ 25.583792] kunit_try_run_case+0x14c/0x3d0 <4>[ 25.583978] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 25.584197] kthread+0x24c/0x2d0 <4>[ 25.584349] ret_from_fork+0x10/0x20 <3>[ 25.584508] <4>[ 25.584614] kfence-#137: 0x00000000236ec343-0x00000000c9538fd2, size=73, cache=kmalloc-96 <4>[ 25.584614] <4>[ 25.584949] allocated by task 299 on cpu 1 at 25.582260s: <4>[ 25.585169] test_alloc+0x298/0x630 <4>[ 25.585327] test_kmalloc_aligned_oob_write+0xbc/0x2c0 <4>[ 25.585527] kunit_try_run_case+0x14c/0x3d0 <4>[ 25.585702] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 25.585958] kthread+0x24c/0x2d0 <4>[ 25.586112] ret_from_fork+0x10/0x20 <4>[ 25.586285] <4>[ 25.586382] freed by task 299 on cpu 1 at 25.582355s: <4>[ 25.586594] test_kmalloc_aligned_oob_write+0x214/0x2c0 <4>[ 25.586802] kunit_try_run_case+0x14c/0x3d0 <4>[ 25.586984] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 25.587199] kthread+0x24c/0x2d0 <4>[ 25.587349] ret_from_fork+0x10/0x20 <3>[ 25.587511] <3>[ 25.587615] CPU: 1 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 25.587960] Hardware name: linux,dummy-virt (DT) <3>[ 25.588140] ================================================================== <6>[ 25.590477] ok 18 test_kmalloc_aligned_oob_write <6>[ 25.591622] # test_shrink_memcache: setup_test_cache: size=32, ctor=0x0 <6>[ 25.595246] # test_shrink_memcache: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <6>[ 25.701159] ok 19 test_shrink_memcache <6>[ 25.702368] # test_memcache_ctor: setup_test_cache: size=32, ctor=ctor_set_x <6>[ 25.703913] # test_memcache_ctor: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <6>[ 25.807891] ok 20 test_memcache_ctor <3>[ 25.809511] ================================================================== <3>[ 25.811034] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 <3>[ 25.811034] <3>[ 25.811754] Invalid read at 0x000000003e242fa5: <4>[ 25.812272] test_invalid_access+0xdc/0x1f0 <4>[ 25.812777] kunit_try_run_case+0x14c/0x3d0 <4>[ 25.813241] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 25.813808] kthread+0x24c/0x2d0 <4>[ 25.814485] ret_from_fork+0x10/0x20 <3>[ 25.815003] <3>[ 25.815275] CPU: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 25.816344] Hardware name: linux,dummy-virt (DT) <3>[ 25.816873] ================================================================== <6>[ 25.819849] ok 21 test_invalid_access <6>[ 25.821439] # test_gfpzero: test_alloc: size=4096, gfp=cc0, policy=any, cache=0 <6>[ 25.897232] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 25.998317] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.103569] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.210868] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.310282] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.414463] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.518471] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.622405] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.726391] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.831347] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 26.934490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.038463] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.142374] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.246520] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.350351] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.454382] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.558392] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.662357] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.766529] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.870296] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 27.974312] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.078360] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.182328] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.286882] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.390338] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.494380] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.598404] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.702865] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.806377] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 28.910418] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.014365] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.118376] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.222632] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.326425] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.430339] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.534360] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.638240] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.742341] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.846469] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 29.950340] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.054358] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.158747] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.262340] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.366530] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.470249] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.574353] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.678385] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.782519] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.886369] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 30.990332] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.094330] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.198260] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.302717] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.406825] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.510357] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.614413] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.718374] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.822526] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 31.926360] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.030490] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.134480] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.238343] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.342340] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.446227] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.550353] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.654388] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.758291] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.862341] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 32.966780] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.070305] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.174292] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.279173] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.382321] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.486272] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.590404] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.694354] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.798451] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 33.902399] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.006277] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.110376] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.214358] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.318371] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.422728] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.526957] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.630359] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.734354] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.838426] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 34.942351] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.046337] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.150497] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.254326] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.358534] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.462382] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.566431] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.670389] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.774406] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.878415] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 35.982548] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.086390] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.190517] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.294365] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.398391] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.502338] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.606396] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.710420] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.814392] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 36.918358] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.022345] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.126380] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.230388] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.334395] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.438399] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.542359] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.646377] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.750385] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.854482] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 37.958374] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.062497] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.166391] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.270384] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.374397] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.478391] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.582366] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.686534] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.790588] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.894413] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 38.998371] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.102365] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.206795] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.310384] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.414402] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.518809] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.622527] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.726382] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.830710] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 39.934380] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.038378] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.142508] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.246419] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.350361] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.454367] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.558408] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.662315] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.766396] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.870721] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 40.974355] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.078359] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.182358] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.286403] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.390386] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.494401] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.598411] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.702439] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.806611] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 41.910360] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.014424] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.118405] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.222365] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.326414] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.430495] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.534440] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.638627] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.742774] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.846514] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 42.950405] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.054422] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.158459] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.262327] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.366385] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.470429] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.574584] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.678930] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.782896] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.886574] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 43.990362] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.095008] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.198998] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.302493] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.406921] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.510406] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.614386] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.718364] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.822893] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 44.926349] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.030382] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.135023] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.238374] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.342398] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.446358] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.550477] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.654311] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.758412] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.862418] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 45.966751] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.070395] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.174432] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.278357] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.382404] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.487049] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.590379] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.694419] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.798334] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 46.902384] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.006365] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.110398] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.214398] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.318381] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.422412] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.526405] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.630389] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.734390] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.838408] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 47.942350] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.046341] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.150349] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.254351] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.358390] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.462383] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.566355] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.670598] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.774376] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.878379] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 48.982403] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <6>[ 49.086425] # test_gfpzero: test_alloc: size=4096, gfp=dc0, policy=any, cache=0 <4>[ 49.190617] # test_gfpzero: Test should be marked slow (runtime: 23.369353376s) <6>[ 49.192686] ok 22 test_gfpzero <6>[ 49.194857] # test_memcache_typesafe_by_rcu: setup_test_cache: size=32, ctor=0x0 <6>[ 49.198645] # test_memcache_typesafe_by_rcu: test_alloc: size=32, gfp=cc0, policy=any, cache=1 <3>[ 49.318370] ================================================================== <3>[ 49.318702] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 <3>[ 49.318702] <3>[ 49.319176] Use-after-free read at 0x000000007e40da88 (in kfence-#141): <4>[ 49.319519] test_memcache_typesafe_by_rcu+0x280/0x560 <4>[ 49.319818] kunit_try_run_case+0x14c/0x3d0 <4>[ 49.320081] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 49.320388] kthread+0x24c/0x2d0 <4>[ 49.320578] ret_from_fork+0x10/0x20 <3>[ 49.320799] <4>[ 49.320943] kfence-#141: 0x000000007e40da88-0x000000009d97ae18, size=32, cache=test <4>[ 49.320943] <4>[ 49.321367] allocated by task 309 on cpu 1 at 49.294416s: <4>[ 49.321670] test_alloc+0x22c/0x630 <4>[ 49.321910] test_memcache_typesafe_by_rcu+0x15c/0x560 <4>[ 49.322188] kunit_try_run_case+0x14c/0x3d0 <4>[ 49.322446] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 49.322694] kthread+0x24c/0x2d0 <4>[ 49.322861] ret_from_fork+0x10/0x20 <4>[ 49.323025] <4>[ 49.323160] freed by task 0 on cpu 1 at 49.318074s: <4>[ 49.323477] rcu_guarded_free+0x3c/0x68 <4>[ 49.323657] rcu_core+0xa84/0x1ea0 <4>[ 49.323833] rcu_core_si+0x18/0x30 <4>[ 49.324001] handle_softirqs+0x370/0xb40 <4>[ 49.324194] __do_softirq+0x1c/0x28 <4>[ 49.324386] ____do_softirq+0x18/0x30 <4>[ 49.324607] call_on_irq_stack+0x24/0x58 <4>[ 49.324851] do_softirq_own_stack+0x24/0x38 <4>[ 49.325101] irq_exit_rcu+0x1c0/0x278 <4>[ 49.325331] el1_interrupt+0x38/0x58 <4>[ 49.325581] el1h_64_irq_handler+0x18/0x28 <4>[ 49.325848] el1h_64_irq+0x64/0x68 <4>[ 49.326063] arch_local_irq_enable+0x4/0x8 <4>[ 49.326319] do_idle+0x394/0x4f8 <4>[ 49.326488] cpu_startup_entry+0x68/0x80 <4>[ 49.326703] secondary_start_kernel+0x298/0x350 <4>[ 49.326901] __secondary_switched+0xb8/0xc0 <3>[ 49.327128] <3>[ 49.327286] CPU: 1 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 49.327783] Hardware name: linux,dummy-virt (DT) <3>[ 49.328063] ================================================================== <6>[ 49.342926] ok 23 test_memcache_typesafe_by_rcu <6>[ 49.343917] # test_krealloc: test_alloc: size=32, gfp=cc0, policy=any, cache=0 <3>[ 49.398709] ================================================================== <3>[ 49.398991] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 <3>[ 49.398991] <3>[ 49.399309] Use-after-free read at 0x0000000057191d9d (in kfence-#142): <4>[ 49.399558] test_krealloc+0x51c/0x830 <4>[ 49.399733] kunit_try_run_case+0x14c/0x3d0 <4>[ 49.399919] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 49.400136] kthread+0x24c/0x2d0 <4>[ 49.400293] ret_from_fork+0x10/0x20 <3>[ 49.400456] <4>[ 49.400557] kfence-#142: 0x0000000057191d9d-0x0000000006a3c096, size=32, cache=kmalloc-32 <4>[ 49.400557] <4>[ 49.400882] allocated by task 311 on cpu 0 at 49.398203s: <4>[ 49.401104] test_alloc+0x298/0x630 <4>[ 49.401267] test_krealloc+0xc0/0x830 <4>[ 49.401430] kunit_try_run_case+0x14c/0x3d0 <4>[ 49.401606] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 49.401819] kthread+0x24c/0x2d0 <4>[ 49.401980] ret_from_fork+0x10/0x20 <4>[ 49.402148] <4>[ 49.402253] freed by task 311 on cpu 0 at 49.398391s: <4>[ 49.402476] krealloc_noprof+0xa8/0x180 <4>[ 49.402658] test_krealloc+0x1dc/0x830 <4>[ 49.402829] kunit_try_run_case+0x14c/0x3d0 <4>[ 49.403009] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 49.403231] kthread+0x24c/0x2d0 <4>[ 49.403389] ret_from_fork+0x10/0x20 <3>[ 49.403558] <3>[ 49.403664] CPU: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <3>[ 49.404017] Hardware name: linux,dummy-virt (DT) <3>[ 49.404210] ================================================================== <6>[ 49.406527] ok 24 test_krealloc <6>[ 49.407978] # test_memcache_alloc_bulk: setup_test_cache: size=32, ctor=0x0 <6>[ 49.517351] ok 25 test_memcache_alloc_bulk <6>[ 49.523218] # kfence: pass:23 fail:0 skip:2 total:25 <6>[ 49.523578] # Totals: pass:23 fail:0 skip:2 total:25 <6>[ 49.523953] ok 7 kfence <6>[ 49.524812] KTAP version 1 <6>[ 49.524995] # Subtest: binfmt_elf <6>[ 49.525291] # module: binfmt_elf <6>[ 49.525403] 1..1 <6>[ 49.529503] ok 1 total_mapping_size_test <6>[ 49.529740] ok 8 binfmt_elf <6>[ 49.532669] KTAP version 1 <6>[ 49.533124] # Subtest: compat_binfmt_elf <6>[ 49.533663] # module: compat_binfmt_elf <6>[ 49.533865] 1..1 <6>[ 49.537847] ok 1 total_mapping_size_test <6>[ 49.538111] ok 9 compat_binfmt_elf <6>[ 49.538886] KTAP version 1 <6>[ 49.539078] # Subtest: ext4_mballoc_test <6>[ 49.539425] # module: ext4 <6>[ 49.539530] 1..7 <6>[ 49.540056] KTAP version 1 <6>[ 49.540389] # Subtest: test_new_blocks_simple <6>[ 49.553505] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.564265] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.571449] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.572064] # test_new_blocks_simple: pass:3 fail:0 skip:0 total:3 <6>[ 49.572250] ok 1 test_new_blocks_simple <6>[ 49.572758] KTAP version 1 <6>[ 49.573228] # Subtest: test_free_blocks_simple <6>[ 49.580519] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.587703] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.595556] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.596671] # test_free_blocks_simple: pass:3 fail:0 skip:0 total:3 <6>[ 49.596859] ok 2 test_free_blocks_simple <6>[ 49.597615] KTAP version 1 <6>[ 49.599054] # Subtest: test_mb_generate_buddy <6>[ 49.611826] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.618653] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.627993] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.628749] # test_mb_generate_buddy: pass:3 fail:0 skip:0 total:3 <6>[ 49.628888] ok 3 test_mb_generate_buddy <6>[ 49.629319] KTAP version 1 <6>[ 49.629822] # Subtest: test_mb_mark_used <6>[ 49.640955] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.648602] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.655331] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.655331] # SKIP blocksize exceeds pagesize <6>[ 49.655453] # test_mb_mark_used: pass:2 fail:0 skip:1 total:3 <6>[ 49.656199] ok 4 test_mb_mark_used <6>[ 49.656617] KTAP version 1 <6>[ 49.657115] # Subtest: test_mb_free_blocks <6>[ 49.662894] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.671866] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.677184] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.677184] # SKIP blocksize exceeds pagesize <6>[ 49.677285] # test_mb_free_blocks: pass:2 fail:0 skip:1 total:3 <6>[ 49.678469] ok 5 test_mb_free_blocks <6>[ 49.678879] KTAP version 1 <6>[ 49.679369] # Subtest: test_mark_diskspace_used <6>[ 49.684265] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.691216] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.696554] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 49.697378] # test_mark_diskspace_used: pass:3 fail:0 skip:0 total:3 <6>[ 49.697517] ok 6 test_mark_diskspace_used <6>[ 49.698293] KTAP version 1 <6>[ 49.698935] # Subtest: test_mb_mark_used_cost <6>[ 66.814261] # test_mb_mark_used_cost: costed jiffies 1258 <6>[ 66.818577] ok 1 block_bits=10 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 84.133826] # test_mb_mark_used_cost: costed jiffies 1285 <6>[ 84.137802] ok 2 block_bits=12 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 84.143421] ok 3 block_bits=16 cluster_bits=3 blocks_per_group=8192 group_count=4 desc_size=64 <6>[ 84.143421] # SKIP blocksize exceeds pagesize <6>[ 84.143681] # test_mb_mark_used_cost.speed: slow <6>[ 84.144803] # test_mb_mark_used_cost: pass:2 fail:0 skip:1 total:3 <6>[ 84.145323] ok 7 test_mb_mark_used_cost <6>[ 84.146189] # ext4_mballoc_test: pass:7 fail:0 skip:0 total:7 <6>[ 84.146711] # Totals: pass:18 fail:0 skip:3 total:21 <6>[ 84.147243] ok 10 ext4_mballoc_test <6>[ 84.148704] KTAP version 1 <6>[ 84.149106] # Subtest: ext4_inode_test <6>[ 84.149512] # module: ext4_inode_test <6>[ 84.149676] 1..1 <6>[ 84.151175] KTAP version 1 <6>[ 84.151600] # Subtest: inode_test_xtimestamp_decoding <6>[ 84.154455] ok 1 1901-12-13 Lower bound of 32bit < 0 timestamp, no extra bits <6>[ 84.157490] ok 2 1969-12-31 Upper bound of 32bit < 0 timestamp, no extra bits <6>[ 84.161021] ok 3 1970-01-01 Lower bound of 32bit >=0 timestamp, no extra bits <6>[ 84.164135] ok 4 2038-01-19 Upper bound of 32bit >=0 timestamp, no extra bits <6>[ 84.167443] ok 5 2038-01-19 Lower bound of 32bit <0 timestamp, lo extra sec bit on <6>[ 84.170359] ok 6 2106-02-07 Upper bound of 32bit <0 timestamp, lo extra sec bit on <6>[ 84.173136] ok 7 2106-02-07 Lower bound of 32bit >=0 timestamp, lo extra sec bit on <6>[ 84.177334] ok 8 2174-02-25 Upper bound of 32bit >=0 timestamp, lo extra sec bit on <6>[ 84.181218] ok 9 2174-02-25 Lower bound of 32bit <0 timestamp, hi extra sec bit on <6>[ 84.186015] ok 10 2242-03-16 Upper bound of 32bit <0 timestamp, hi extra sec bit on <6>[ 84.188264] ok 11 2242-03-16 Lower bound of 32bit >=0 timestamp, hi extra sec bit on <6>[ 84.192729] ok 12 2310-04-04 Upper bound of 32bit >=0 timestamp, hi extra sec bit on <6>[ 84.195765] ok 13 2310-04-04 Upper bound of 32bit>=0 timestamp, hi extra sec bit 1. 1 ns <6>[ 84.199170] ok 14 2378-04-22 Lower bound of 32bit>= timestamp. Extra sec bits 1. Max ns <6>[ 84.202089] ok 15 2378-04-22 Lower bound of 32bit >=0 timestamp. All extra sec bits on <6>[ 84.204941] ok 16 2446-05-10 Upper bound of 32bit >=0 timestamp. All extra sec bits on <6>[ 84.205368] # inode_test_xtimestamp_decoding: pass:16 fail:0 skip:0 total:16 <6>[ 84.205798] ok 1 inode_test_xtimestamp_decoding <6>[ 84.206544] # Totals: pass:16 fail:0 skip:0 total:16 <6>[ 84.206791] ok 11 ext4_inode_test <6>[ 84.207411] KTAP version 1 <6>[ 84.207602] # Subtest: fat_test <6>[ 84.207778] # module: fat_test <6>[ 84.207858] 1..3 <6>[ 84.210900] ok 1 fat_checksum_test <6>[ 84.211209] KTAP version 1 <6>[ 84.211909] # Subtest: fat_time_fat2unix_test <6>[ 84.215165] ok 1 Earliest possible UTC (1980-01-01 00:00:00) <6>[ 84.217792] ok 2 Latest possible UTC (2107-12-31 23:59:58) <6>[ 84.220679] ok 3 Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC) <6>[ 84.224412] ok 4 Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC) <6>[ 84.227592] ok 5 Leap Day / Year (1996-02-29 00:00:00) <6>[ 84.231059] ok 6 Year 2000 is leap year (2000-02-29 00:00:00) <6>[ 84.233620] ok 7 Year 2100 not leap year (2100-03-01 00:00:00) <6>[ 84.236328] ok 8 Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC) <6>[ 84.240498] ok 9 Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC) <6>[ 84.243591] ok 10 VFAT odd-second resolution (1999-12-31 23:59:59) <6>[ 84.247325] ok 11 VFAT 10ms resolution (1980-01-01 00:00:00:0010) <6>[ 84.247957] # fat_time_fat2unix_test: pass:11 fail:0 skip:0 total:11 <6>[ 84.248511] ok 2 fat_time_fat2unix_test <6>[ 84.249005] KTAP version 1 <6>[ 84.249532] # Subtest: fat_time_unix2fat_test <6>[ 84.252099] ok 1 Earliest possible UTC (1980-01-01 00:00:00) <6>[ 84.254549] ok 2 Latest possible UTC (2107-12-31 23:59:58) <6>[ 84.256496] ok 3 Earliest possible (UTC-11) (== 1979-12-31 13:00:00 UTC) <6>[ 84.258568] ok 4 Latest possible (UTC+11) (== 2108-01-01 10:59:58 UTC) <6>[ 84.260606] ok 5 Leap Day / Year (1996-02-29 00:00:00) <6>[ 84.262781] ok 6 Year 2000 is leap year (2000-02-29 00:00:00) <6>[ 84.264719] ok 7 Year 2100 not leap year (2100-03-01 00:00:00) <6>[ 84.266837] ok 8 Leap year + timezone UTC+1 (== 2004-02-29 00:30:00 UTC) <6>[ 84.268754] ok 9 Leap year + timezone UTC-1 (== 2004-02-29 23:30:00 UTC) <6>[ 84.271165] ok 10 VFAT odd-second resolution (1999-12-31 23:59:59) <6>[ 84.273195] ok 11 VFAT 10ms resolution (1980-01-01 00:00:00:0010) <6>[ 84.273533] # fat_time_unix2fat_test: pass:11 fail:0 skip:0 total:11 <6>[ 84.274079] ok 3 fat_time_unix2fat_test <6>[ 84.274410] # fat_test: pass:3 fail:0 skip:0 total:3 <6>[ 84.274652] # Totals: pass:23 fail:0 skip:0 total:23 <6>[ 84.274932] ok 12 fat_test <6>[ 84.275662] KTAP version 1 <6>[ 84.275831] # Subtest: string <6>[ 84.275997] # module: string_kunit <6>[ 84.276078] 1..20 <6>[ 85.162953] ok 1 string_test_memset16 <6>[ 85.642527] ok 2 string_test_memset32 <6>[ 86.108180] ok 3 string_test_memset64 <6>[ 86.111654] ok 4 string_test_strchr <6>[ 86.115194] ok 5 string_test_strnchr <6>[ 86.118324] ok 6 string_test_strspn <6>[ 86.121148] ok 7 string_test_strcmp <6>[ 86.124285] ok 8 string_test_strcmp_long_strings <6>[ 86.126780] ok 9 string_test_strncmp <6>[ 86.129798] ok 10 string_test_strncmp_long_strings <6>[ 86.133042] ok 11 string_test_strcasecmp <6>[ 86.138724] ok 12 string_test_strcasecmp_long_strings <6>[ 86.141761] ok 13 string_test_strncasecmp <6>[ 86.144439] ok 14 string_test_strncasecmp_long_strings <6>[ 86.148147] ok 15 string_test_strscpy <6>[ 86.150952] ok 16 string_test_strcat <6>[ 86.154236] ok 17 string_test_strncat <6>[ 86.157599] ok 18 string_test_strlcat <6>[ 86.161085] ok 19 string_test_strtomem <6>[ 86.164436] ok 20 string_test_memtostr <6>[ 86.164695] # string: pass:20 fail:0 skip:0 total:20 <6>[ 86.164961] # Totals: pass:20 fail:0 skip:0 total:20 <6>[ 86.165200] ok 13 string <6>[ 86.166308] KTAP version 1 <6>[ 86.166476] # Subtest: string_helpers <6>[ 86.166658] # module: string_helpers_kunit <6>[ 86.166738] 1..3 <6>[ 86.170870] ok 1 test_get_size <6>[ 86.175007] ok 2 test_upper_lower <6>[ 86.379726] ok 3 test_unescape <6>[ 86.387025] # string_helpers: pass:3 fail:0 skip:0 total:3 <6>[ 86.387496] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 86.388026] ok 14 string_helpers <6>[ 86.389280] KTAP version 1 <6>[ 86.389621] # Subtest: cpumask <6>[ 86.390214] # module: cpumask_kunit <6>[ 86.390392] 1..6 <6>[ 86.394160] ok 1 test_cpumask_weight <6>[ 86.397063] ok 2 test_cpumask_first <6>[ 86.400536] ok 3 test_cpumask_last <6>[ 86.404133] ok 4 test_cpumask_next <6>[ 86.409206] ok 5 test_cpumask_iterators <6>[ 86.412502] ok 6 test_cpumask_iterators_builtin <6>[ 86.413077] # cpumask: pass:6 fail:0 skip:0 total:6 <6>[ 86.413593] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 86.414957] ok 15 cpumask <6>[ 86.416224] KTAP version 1 <6>[ 86.416565] # Subtest: iov_iter <6>[ 86.416915] # module: kunit_iov_iter <6>[ 86.417081] 1..9 <6>[ 86.458671] ok 1 iov_kunit_copy_to_kvec <6>[ 86.532114] ok 2 iov_kunit_copy_from_kvec <6>[ 86.596611] ok 3 iov_kunit_copy_to_bvec <6>[ 86.662178] ok 4 iov_kunit_copy_from_bvec <6>[ 86.704577] ok 5 iov_kunit_copy_to_xarray <6>[ 86.759434] ok 6 iov_kunit_copy_from_xarray <6>[ 86.765338] ok 7 iov_kunit_extract_pages_kvec <6>[ 86.769716] ok 8 iov_kunit_extract_pages_bvec <6>[ 86.775577] ok 9 iov_kunit_extract_pages_xarray <6>[ 86.775872] # iov_iter: pass:9 fail:0 skip:0 total:9 <6>[ 86.776112] # Totals: pass:9 fail:0 skip:0 total:9 <6>[ 86.776355] ok 16 iov_iter <6>[ 86.777232] KTAP version 1 <6>[ 86.777415] # Subtest: hash <6>[ 86.777580] # module: test_hash <6>[ 86.777660] 1..2 <6>[ 86.785716] ok 1 test_string_or <6>[ 86.823753] ok 2 test_hash_or <6>[ 86.824027] # hash: pass:2 fail:0 skip:0 total:2 <6>[ 86.824253] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 86.824530] ok 17 hash <6>[ 86.825163] KTAP version 1 <6>[ 86.825342] # Subtest: list_sort <6>[ 86.825554] # module: test_list_sort <6>[ 86.825639] 1..1 <6>[ 86.869270] ok 1 list_sort_test <6>[ 86.869412] ok 18 list_sort <6>[ 86.870100] KTAP version 1 <6>[ 86.870287] # Subtest: lib_sort <6>[ 86.870459] # module: test_sort <6>[ 86.870534] 1..1 <6>[ 86.876229] ok 1 test_sort <6>[ 86.876367] ok 19 lib_sort <6>[ 86.876982] KTAP version 1 <6>[ 86.877143] # Subtest: kprobes_test <6>[ 86.877318] # module: test_kprobes <6>[ 86.877395] 1..7 <6>[ 86.885276] ok 1 test_kprobe <6>[ 86.889578] ok 2 test_kprobes <6>[ 86.893370] ok 3 test_kprobe_missed <6>[ 86.899629] ok 4 test_kretprobe <6>[ 86.904315] ok 5 test_kretprobes <6>[ 86.908671] ok 6 test_stacktrace_on_kretprobe <6>[ 86.914775] ok 7 test_stacktrace_on_nested_kretprobe <6>[ 86.915106] # kprobes_test: pass:7 fail:0 skip:0 total:7 <6>[ 86.915389] # Totals: pass:7 fail:0 skip:0 total:7 <6>[ 86.915708] ok 20 kprobes_test <6>[ 86.916660] KTAP version 1 <6>[ 86.916843] # Subtest: kunit_executor_test <6>[ 86.917035] # module: kunit <6>[ 86.917152] 1..8 <6>[ 86.920546] ok 1 parse_filter_test <6>[ 86.923962] ok 2 filter_suites_test <6>[ 86.926871] ok 3 filter_suites_test_glob_test <6>[ 86.929292] ok 4 filter_suites_to_empty_test <6>[ 86.932165] ok 5 parse_filter_attr_test <6>[ 86.935621] ok 6 filter_attr_test <6>[ 86.938662] ok 7 filter_attr_empty_test <6>[ 86.941283] ok 8 filter_attr_skip_test <6>[ 86.941566] # kunit_executor_test: pass:8 fail:0 skip:0 total:8 <6>[ 86.941997] # Totals: pass:8 fail:0 skip:0 total:8 <6>[ 86.942332] ok 21 kunit_executor_test <6>[ 86.942970] KTAP version 1 <6>[ 86.943141] # Subtest: kunit-try-catch-test <6>[ 86.943335] # module: kunit_test <6>[ 86.943414] 1..2 <6>[ 86.947419] ok 1 kunit_test_try_catch_successful_try_no_catch <6>[ 86.950479] ok 2 kunit_test_try_catch_unsuccessful_try_does_catch <6>[ 86.950812] # kunit-try-catch-test: pass:2 fail:0 skip:0 total:2 <6>[ 86.951173] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 86.951507] ok 22 kunit-try-catch-test <6>[ 86.952332] KTAP version 1 <6>[ 86.952501] # Subtest: kunit-resource-test <6>[ 86.952697] # module: kunit_test <6>[ 86.952793] 1..12 <6>[ 86.955931] ok 1 kunit_resource_test_init_resources <6>[ 86.958411] ok 2 kunit_resource_test_alloc_resource <6>[ 86.960711] ok 3 kunit_resource_test_destroy_resource <6>[ 86.963312] ok 4 kunit_resource_test_remove_resource <6>[ 86.965632] ok 5 kunit_resource_test_cleanup_resources <6>[ 86.968304] ok 6 kunit_resource_test_proper_free_ordering <6>[ 86.971118] ok 7 kunit_resource_test_static <6>[ 86.973772] ok 8 kunit_resource_test_named <6>[ 86.976124] ok 9 kunit_resource_test_action <6>[ 86.978829] ok 10 kunit_resource_test_remove_action <6>[ 86.980865] ok 11 kunit_resource_test_release_action <6>[ 86.982250] action_order_2 <6>[ 86.982595] action_order_2 <6>[ 86.982874] action_order_1 <6>[ 86.984177] ok 12 kunit_resource_test_action_ordering <6>[ 86.984419] # kunit-resource-test: pass:12 fail:0 skip:0 total:12 <6>[ 86.984721] # Totals: pass:12 fail:0 skip:0 total:12 <6>[ 86.984985] ok 23 kunit-resource-test <6>[ 86.985553] KTAP version 1 <6>[ 86.985733] # Subtest: kunit-log-test <6>[ 86.986496] # module: kunit_test <6>[ 86.986575] 1..2 <6>[ 86.987683] put this in log. <6>[ 86.987782] this too. <6>[ 86.987994] add to suite log. <6>[ 86.988178] along with this. <6>[ 86.990176] ok 1 kunit_log_test <6>[ 86.991145] # kunit_log_newline_test: Add newline <6>[ 86.992664] ok 2 kunit_log_newline_test <6>[ 86.992796] # kunit-log-test: pass:2 fail:0 skip:0 total:2 <6>[ 86.993026] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 86.993271] ok 24 kunit-log-test <6>[ 86.994466] KTAP version 1 <6>[ 86.994635] # Subtest: kunit_status <6>[ 86.994810] # module: kunit_test <6>[ 86.994884] 1..2 <6>[ 86.996835] ok 1 kunit_status_set_failure_test <6>[ 86.999035] ok 2 kunit_status_mark_skipped_test <6>[ 86.999308] # kunit_status: pass:2 fail:0 skip:0 total:2 <6>[ 86.999548] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 86.999791] ok 25 kunit_status <6>[ 87.000367] KTAP version 1 <6>[ 87.000546] # Subtest: kunit_current <6>[ 87.000749] # module: kunit_test <6>[ 87.000827] 1..2 <6>[ 87.003395] ok 1 kunit_current_test <3>[ 87.004465] # fake test: lib/kunit/kunit-test.c:722: This should make `fake` test fail. <6>[ 87.005999] ok 2 kunit_current_fail_test <6>[ 87.006404] # kunit_current: pass:2 fail:0 skip:0 total:2 <6>[ 87.006650] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 87.006919] ok 26 kunit_current <6>[ 87.007503] KTAP version 1 <6>[ 87.007675] # Subtest: kunit_device <6>[ 87.007857] # module: kunit_test <6>[ 87.007929] 1..3 <6>[ 87.015181] ok 1 kunit_device_test <6>[ 87.020413] ok 2 kunit_device_cleanup_test <6>[ 87.028954] ok 3 kunit_device_driver_test <6>[ 87.029374] # kunit_device: pass:3 fail:0 skip:0 total:3 <6>[ 87.029761] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 87.030256] ok 27 kunit_device <6>[ 87.030858] KTAP version 1 <6>[ 87.031043] # Subtest: kunit_fault <6>[ 87.031241] # module: kunit_test <6>[ 87.031320] 1..1 <1>[ 87.033679] Unable to handle kernel paging request at virtual address dfff800000000000 <1>[ 87.035027] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] <1>[ 87.035332] Mem abort info: <1>[ 87.035497] ESR = 0x0000000096000005 <1>[ 87.035762] EC = 0x25: DABT (current EL), IL = 32 bits <1>[ 87.036006] SET = 0, FnV = 0 <1>[ 87.036203] EA = 0, S1PTW = 0 <1>[ 87.036411] FSC = 0x05: level 1 translation fault <1>[ 87.036643] Data abort info: <1>[ 87.036817] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 <1>[ 87.037094] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 <1>[ 87.037395] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 <1>[ 87.037711] [dfff800000000000] address between user and kernel address ranges <0>[ 87.038665] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP <4>[ 87.039076] Modules linked in: <4>[ 87.039387] CPU: 1 PID: 602 Comm: kunit_try_catch Tainted: G B N 6.10.0-rc7-00076-g9d9a2f29aefd #1 <4>[ 87.039749] Hardware name: linux,dummy-virt (DT) <4>[ 87.040002] pstate: 12400009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) <4>[ 87.040315] pc : kunit_test_null_dereference+0x70/0x170 <4>[ 87.040573] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 87.040840] sp : ffff800080fe7dc0 <4>[ 87.041021] x29: ffff800080fe7e20 x28: 0000000000000000 x27: 0000000000000000 <4>[ 87.041431] x26: 0000000000000000 x25: 0000000000000000 x24: fff00000c65bae00 <4>[ 87.041755] x23: ffff9f5348f391b8 x22: ffff9f5348f413f0 x21: fff00000c65bae08 <4>[ 87.042186] x20: 1ffff000101fcfb8 x19: ffff8000800879f0 x18: 000000004931ae57 <4>[ 87.042585] x17: ffff9f5347fcfde4 x16: ffff9f5347fcfb5c x15: ffff9f5348ef9904 <4>[ 87.042931] x14: ffff9f5348647c40 x13: 6461657268745f68 x12: fffd80001918d8b2 <4>[ 87.043285] x11: 1ffe00001918d8b1 x10: fffd80001918d8b1 x9 : ffff9f5348f39240 <4>[ 87.043708] x8 : ffff800080fe7cb8 x7 : 0000000000000000 x6 : 0000000041b58ab3 <4>[ 87.044074] x5 : ffff7000101fcfb8 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 <4>[ 87.044473] x2 : dfff800000000000 x1 : fff00000c8c6bcc0 x0 : ffff8000800879f0 <4>[ 87.044855] Call trace: <4>[ 87.045037] kunit_test_null_dereference+0x70/0x170 <4>[ 87.045252] kunit_generic_run_threadfn_adapter+0x88/0x100 <4>[ 87.045506] kthread+0x24c/0x2d0 <4>[ 87.045702] ret_from_fork+0x10/0x20 <0>[ 87.046192] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) <4>[ 87.046641] ---[ end trace 0000000000000000 ]--- <3>[ 87.047385] # kunit_test_fault_null_dereference: try faulted: last line seen lib/kunit/kunit-test.c:95 <6>[ 87.048979] ok 1 kunit_test_fault_null_dereference <6>[ 87.049076] ok 28 kunit_fault <6>[ 87.049799] KTAP version 1 <6>[ 87.050089] # Subtest: string-stream-test <6>[ 87.050372] # module: string_stream_test <6>[ 87.050455] 1..12 <6>[ 87.054631] ok 1 string_stream_managed_init_test <6>[ 87.057250] ok 2 string_stream_unmanaged_init_test <6>[ 87.060125] ok 3 string_stream_managed_free_test <6>[ 87.062850] ok 4 string_stream_resource_free_test <6>[ 87.070814] ok 5 string_stream_line_add_test <6>[ 87.077764] ok 6 string_stream_variable_length_line_test <6>[ 87.082762] ok 7 string_stream_append_test <6>[ 87.086445] ok 8 string_stream_append_auto_newline_test <6>[ 87.088808] ok 9 string_stream_append_empty_string_test <6>[ 87.091684] ok 10 string_stream_no_auto_newline_test <6>[ 87.094742] ok 11 string_stream_auto_newline_test <6>[ 87.294836] # string_stream_performance_test: Time elapsed: 189892 us <6>[ 87.295413] # string_stream_performance_test: Total string length: 573890 <6>[ 87.295769] # string_stream_performance_test: Bytes requested: 823930 <6>[ 87.296123] # string_stream_performance_test: Actual bytes allocated: 1048290 <6>[ 87.470083] ok 12 string_stream_performance_test <6>[ 87.472843] # string-stream-test: pass:12 fail:0 skip:0 total:12 <6>[ 87.473203] # Totals: pass:12 fail:0 skip:0 total:12 <6>[ 87.473549] ok 29 string-stream-test <6>[ 87.474913] # example: initializing suite <6>[ 87.475210] KTAP version 1 <6>[ 87.475387] # Subtest: example <6>[ 87.475569] # module: kunit_example_test <6>[ 87.475664] 1..9 <6>[ 87.477507] # example_simple_test: initializing <6>[ 87.479587] # example_simple_test: cleaning up <6>[ 87.480177] ok 1 example_simple_test <6>[ 87.481314] # example_skip_test: initializing <6>[ 87.482646] # example_skip_test: You should not see a line below. <6>[ 87.484117] # example_skip_test: cleaning up <6>[ 87.485388] ok 2 example_skip_test # SKIP this test should be skipped <6>[ 87.486656] # example_mark_skipped_test: initializing <6>[ 87.487730] # example_mark_skipped_test: You should see a line below. <6>[ 87.488050] # example_mark_skipped_test: You should see this line. <6>[ 87.490198] # example_mark_skipped_test: cleaning up <6>[ 87.491526] ok 3 example_mark_skipped_test # SKIP this test should be skipped <6>[ 87.492748] # example_all_expect_macros_test: initializing <6>[ 87.495793] # example_all_expect_macros_test: cleaning up <6>[ 87.496610] ok 4 example_all_expect_macros_test <6>[ 87.497621] # example_static_stub_test: initializing <6>[ 87.501225] # example_static_stub_test: cleaning up <6>[ 87.502904] ok 5 example_static_stub_test <6>[ 87.503636] # example_static_stub_using_fn_ptr_test: initializing <6>[ 87.505990] # example_static_stub_using_fn_ptr_test: cleaning up <6>[ 87.506597] ok 6 example_static_stub_using_fn_ptr_test <6>[ 87.507808] # example_priv_test: initializing <6>[ 87.511264] # example_priv_test: cleaning up <6>[ 87.511877] ok 7 example_priv_test <6>[ 87.512150] KTAP version 1 <6>[ 87.512934] # Subtest: example_params_test <6>[ 87.514382] # example_params_test: initializing <6>[ 87.516093] # example_params_test: cleaning up <6>[ 87.516921] ok 1 example value 3 # SKIP unsupported param value 3 <6>[ 87.518937] # example_params_test: initializing <6>[ 87.520966] # example_params_test: cleaning up <6>[ 87.521564] ok 2 example value 2 <6>[ 87.523039] # example_params_test: initializing <6>[ 87.524692] # example_params_test: cleaning up <6>[ 87.525180] ok 3 example value 1 <6>[ 87.526383] # example_params_test: initializing <6>[ 87.528152] # example_params_test: cleaning up <6>[ 87.528637] ok 4 example value 0 # SKIP unsupported param value 0 <6>[ 87.528819] # example_params_test: pass:2 fail:0 skip:2 total:4 <6>[ 87.529332] ok 8 example_params_test <6>[ 87.531257] # example_slow_test: initializing <6>[ 87.532900] # example_slow_test: cleaning up <6>[ 87.533515] # example_slow_test.speed: slow <6>[ 87.533609] ok 9 example_slow_test <6>[ 87.534096] # example: exiting suite <6>[ 87.534511] # example: pass:7 fail:0 skip:2 total:9 <6>[ 87.534634] # Totals: pass:8 fail:0 skip:4 total:12 <6>[ 87.534890] ok 30 example <6>[ 87.535485] KTAP version 1 <6>[ 87.535664] # Subtest: rational <6>[ 87.535853] # module: rational_test <6>[ 87.535929] 1..1 <6>[ 87.536246] KTAP version 1 <6>[ 87.536454] # Subtest: rational_test <6>[ 87.539464] ok 1 Exceeds bounds, semi-convergent term > 1/2 last term <6>[ 87.542008] ok 2 Exceeds bounds, semi-convergent term < 1/2 last term <6>[ 87.544532] ok 3 Closest to zero <6>[ 87.547599] ok 4 Closest to smallest non-zero <6>[ 87.550431] ok 5 Use convergent <6>[ 87.552873] ok 6 Exact answer <6>[ 87.555491] ok 7 Semiconvergent, numerator limit <6>[ 87.558419] ok 8 Semiconvergent, denominator limit <6>[ 87.558885] # rational_test: pass:8 fail:0 skip:0 total:8 <6>[ 87.559349] ok 1 rational_test <6>[ 87.559845] # Totals: pass:8 fail:0 skip:0 total:8 <6>[ 87.560197] ok 31 rational <6>[ 87.561163] KTAP version 1 <6>[ 87.561417] # Subtest: bitfields <6>[ 87.561703] # module: bitfield_kunit <6>[ 87.562357] 1..2 <6>[ 87.564662] ok 1 test_bitfields_constants <6>[ 87.566664] ok 2 test_bitfields_variables <6>[ 87.566919] # bitfields: pass:2 fail:0 skip:0 total:2 <6>[ 87.567151] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 87.567424] ok 32 bitfields <6>[ 87.568055] KTAP version 1 <6>[ 87.568218] # Subtest: checksum <6>[ 87.568420] # module: checksum_kunit <6>[ 87.568496] 1..5 <6>[ 87.643786] ok 1 test_csum_fixed_random_inputs <6>[ 87.824883] ok 2 test_csum_all_carry_inputs <6>[ 87.974595] ok 3 test_csum_no_carry_inputs <6>[ 87.977732] ok 4 test_ip_fast_csum <6>[ 87.980782] ok 5 test_csum_ipv6_magic <6>[ 87.981184] # checksum: pass:5 fail:0 skip:0 total:5 <6>[ 87.981414] # Totals: pass:5 fail:0 skip:0 total:5 <6>[ 87.981678] ok 33 checksum <6>[ 87.983060] KTAP version 1 <6>[ 87.983238] # Subtest: list-kunit-test <6>[ 87.983438] # module: list_test <6>[ 87.983521] 1..39 <6>[ 87.986704] ok 1 list_test_list_init <6>[ 87.989531] ok 2 list_test_list_add <6>[ 87.992796] ok 3 list_test_list_add_tail <6>[ 87.996314] ok 4 list_test_list_del <6>[ 87.999300] ok 5 list_test_list_replace <6>[ 88.002795] ok 6 list_test_list_replace_init <6>[ 88.005517] ok 7 list_test_list_swap <6>[ 88.009792] ok 8 list_test_list_del_init <6>[ 88.013284] ok 9 list_test_list_del_init_careful <6>[ 88.016384] ok 10 list_test_list_move <6>[ 88.020047] ok 11 list_test_list_move_tail <6>[ 88.023852] ok 12 list_test_list_bulk_move_tail <6>[ 88.026259] ok 13 list_test_list_is_head <6>[ 88.028350] ok 14 list_test_list_is_first <6>[ 88.030420] ok 15 list_test_list_is_last <6>[ 88.032947] ok 16 list_test_list_empty <6>[ 88.036023] ok 17 list_test_list_empty_careful <6>[ 88.038729] ok 18 list_test_list_rotate_left <6>[ 88.040898] ok 19 list_test_list_rotate_to_front <6>[ 88.043044] ok 20 list_test_list_is_singular <6>[ 88.045122] ok 21 list_test_list_cut_position <6>[ 88.047908] ok 22 list_test_list_cut_before <6>[ 88.050401] ok 23 list_test_list_splice <6>[ 88.052418] ok 24 list_test_list_splice_tail <6>[ 88.054831] ok 25 list_test_list_splice_init <6>[ 88.056859] ok 26 list_test_list_splice_tail_init <6>[ 88.058953] ok 27 list_test_list_entry <6>[ 88.060945] ok 28 list_test_list_entry_is_head <6>[ 88.063308] ok 29 list_test_list_first_entry <6>[ 88.065352] ok 30 list_test_list_last_entry <6>[ 88.067553] ok 31 list_test_list_first_entry_or_null <6>[ 88.069560] ok 32 list_test_list_next_entry <6>[ 88.072064] ok 33 list_test_list_prev_entry <6>[ 88.074843] ok 34 list_test_list_for_each <6>[ 88.076812] ok 35 list_test_list_for_each_prev <6>[ 88.079052] ok 36 list_test_list_for_each_safe <6>[ 88.081196] ok 37 list_test_list_for_each_prev_safe <6>[ 88.083841] ok 38 list_test_list_for_each_entry <6>[ 88.086221] ok 39 list_test_list_for_each_entry_reverse <6>[ 88.086492] # list-kunit-test: pass:39 fail:0 skip:0 total:39 <6>[ 88.086774] # Totals: pass:39 fail:0 skip:0 total:39 <6>[ 88.087026] ok 34 list-kunit-test <6>[ 88.087685] KTAP version 1 <6>[ 88.087849] # Subtest: hlist <6>[ 88.088008] # module: list_test <6>[ 88.088082] 1..18 <6>[ 88.090576] ok 1 hlist_test_init <6>[ 88.092479] ok 2 hlist_test_unhashed <6>[ 88.094792] ok 3 hlist_test_unhashed_lockless <6>[ 88.096716] ok 4 hlist_test_del <6>[ 88.099124] ok 5 hlist_test_del_init <6>[ 88.101184] ok 6 hlist_test_add <6>[ 88.103602] ok 7 hlist_test_fake <6>[ 88.105557] ok 8 hlist_test_is_singular_node <6>[ 88.107625] ok 9 hlist_test_empty <6>[ 88.109604] ok 10 hlist_test_move_list <6>[ 88.112367] ok 11 hlist_test_entry <6>[ 88.114860] ok 12 hlist_test_entry_safe <6>[ 88.117014] ok 13 hlist_test_for_each <6>[ 88.119312] ok 14 hlist_test_for_each_safe <6>[ 88.121458] ok 15 hlist_test_for_each_entry <6>[ 88.123870] ok 16 hlist_test_for_each_entry_continue <6>[ 88.126327] ok 17 hlist_test_for_each_entry_from <6>[ 88.129265] ok 18 hlist_test_for_each_entry_safe <6>[ 88.129596] # hlist: pass:18 fail:0 skip:0 total:18 <6>[ 88.130456] # Totals: pass:18 fail:0 skip:0 total:18 <6>[ 88.130751] ok 35 hlist <6>[ 88.131358] KTAP version 1 <6>[ 88.131536] # Subtest: klist <6>[ 88.131708] # module: list_test <6>[ 88.131787] 1..8 <6>[ 88.134473] ok 1 klist_test_add_tail <6>[ 88.136723] ok 2 klist_test_add_head <6>[ 88.139646] ok 3 klist_test_add_behind <6>[ 88.143472] ok 4 klist_test_add_before <6>[ 88.145725] ok 5 klist_test_del_refcount_greater_than_zero <6>[ 88.148223] ok 6 klist_test_del_refcount_zero <6>[ 88.150687] ok 7 klist_test_remove <6>[ 88.152848] ok 8 klist_test_node_attached <6>[ 88.153086] # klist: pass:8 fail:0 skip:0 total:8 <6>[ 88.153311] # Totals: pass:8 fail:0 skip:0 total:8 <6>[ 88.153549] ok 36 klist <6>[ 88.154230] KTAP version 1 <6>[ 88.154423] # Subtest: hashtable <6>[ 88.154594] # module: hashtable_test <6>[ 88.154671] 1..9 <6>[ 88.156882] ok 1 hashtable_test_hash_init <6>[ 88.159225] ok 2 hashtable_test_hash_empty <6>[ 88.161186] ok 3 hashtable_test_hash_hashed <6>[ 88.163832] ok 4 hashtable_test_hash_add <6>[ 88.166175] ok 5 hashtable_test_hash_del <6>[ 88.168658] ok 6 hashtable_test_hash_for_each <6>[ 88.170989] ok 7 hashtable_test_hash_for_each_safe <6>[ 88.173256] ok 8 hashtable_test_hash_for_each_possible <6>[ 88.176044] ok 9 hashtable_test_hash_for_each_possible_safe <6>[ 88.176326] # hashtable: pass:9 fail:0 skip:0 total:9 <6>[ 88.176594] # Totals: pass:9 fail:0 skip:0 total:9 <6>[ 88.176832] ok 37 hashtable <6>[ 88.177459] KTAP version 1 <6>[ 88.177626] # Subtest: bits-test <6>[ 88.177796] # module: test_bits <6>[ 88.178235] 1..3 <6>[ 88.180527] ok 1 genmask_test <6>[ 88.182519] ok 2 genmask_ull_test <6>[ 88.184375] ok 3 genmask_input_check_test <6>[ 88.184614] # bits-test: pass:3 fail:0 skip:0 total:3 <6>[ 88.184844] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 88.185087] ok 38 bits-test <6>[ 88.185658] KTAP version 1 <6>[ 88.185819] # Subtest: cmdline <6>[ 88.186137] # module: cmdline_kunit <6>[ 88.186226] 1..4 <6>[ 88.188739] ok 1 cmdline_test_noint <6>[ 88.191399] ok 2 cmdline_test_lead_int <6>[ 88.193783] ok 3 cmdline_test_tail_int <6>[ 88.196739] ok 4 cmdline_test_range <6>[ 88.196994] # cmdline: pass:4 fail:0 skip:0 total:4 <6>[ 88.197215] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 88.197461] ok 39 cmdline <6>[ 88.198633] KTAP version 1 <6>[ 88.198800] # Subtest: slub_test <6>[ 88.198967] # module: slub_kunit <6>[ 88.199042] 1..3 <6>[ 88.213328] ok 1 test_clobber_zone <6>[ 88.222319] ok 2 test_clobber_redzone_free <6>[ 88.233736] ok 3 test_kmalloc_redzone_access <6>[ 88.234210] # slub_test: pass:3 fail:0 skip:0 total:3 <6>[ 88.234473] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 88.234716] ok 40 slub_test <6>[ 88.235288] KTAP version 1 <6>[ 88.235470] # Subtest: memcpy <6>[ 88.235643] # module: memcpy_kunit <6>[ 88.235724] 1..6 <6>[ 88.237074] # memset_test: ok: memset() direct assignment <6>[ 88.237505] # memset_test: ok: memset() complete overwrite <6>[ 88.238120] # memset_test: ok: memset() middle overwrite <6>[ 88.238502] # memset_test: ok: memset() argument side-effects <6>[ 88.238878] # memset_test: ok: memset() memset_after() <6>[ 88.239234] # memset_test: ok: memset() memset_startat() <6>[ 88.240512] ok 1 memset_test <6>[ 88.241442] # memcpy_test: ok: memcpy() static initializers <6>[ 88.242113] # memcpy_test: ok: memcpy() direct assignment <6>[ 88.242494] # memcpy_test: ok: memcpy() complete overwrite <6>[ 88.242862] # memcpy_test: ok: memcpy() middle overwrite <6>[ 88.243230] # memcpy_test: ok: memcpy() argument side-effects <6>[ 88.244658] ok 2 memcpy_test <6>[ 95.376680] # memcpy_large_test.speed: slow <6>[ 95.377002] ok 3 memcpy_large_test <6>[ 95.378891] # memmove_test: ok: memmove() static initializers <6>[ 95.379449] # memmove_test: ok: memmove() direct assignment <6>[ 95.379814] # memmove_test: ok: memmove() complete overwrite <6>[ 95.380237] # memmove_test: ok: memmove() middle overwrite <6>[ 95.380611] # memmove_test: ok: memmove() argument side-effects <6>[ 95.381009] # memmove_test: ok: memmove() overlapping write <6>[ 95.382901] # memmove_test.speed: slow <6>[ 95.383099] ok 4 memmove_test <6>[ 102.670768] # memmove_large_test.speed: slow <6>[ 102.671317] ok 5 memmove_large_test <6>[ 120.501363] # memmove_overlap_test.speed: slow <6>[ 120.501670] ok 6 memmove_overlap_test <6>[ 120.502074] # memcpy: pass:6 fail:0 skip:0 total:6 <6>[ 120.502336] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 120.502599] ok 41 memcpy <6>[ 120.503188] KTAP version 1 <6>[ 120.503366] # Subtest: is_signed_type <6>[ 120.503572] # module: is_signed_type_kunit <6>[ 120.503655] 1..1 <6>[ 120.506920] ok 1 is_signed_type_test <6>[ 120.507014] ok 42 is_signed_type <6>[ 120.507965] KTAP version 1 <6>[ 120.508155] # Subtest: overflow <6>[ 120.508412] # module: overflow_kunit <6>[ 120.508525] 1..22 <6>[ 120.511362] # u8_u8__u8_overflow_test: 18 u8_u8__u8 arithmetic tests finished <6>[ 120.513392] ok 1 u8_u8__u8_overflow_test <6>[ 120.517226] # s8_s8__s8_overflow_test: 19 s8_s8__s8 arithmetic tests finished <6>[ 120.520027] ok 2 s8_s8__s8_overflow_test <6>[ 120.524094] # u16_u16__u16_overflow_test: 17 u16_u16__u16 arithmetic tests finished <6>[ 120.527245] ok 3 u16_u16__u16_overflow_test <6>[ 120.530989] # s16_s16__s16_overflow_test: 17 s16_s16__s16 arithmetic tests finished <6>[ 120.533756] ok 4 s16_s16__s16_overflow_test <6>[ 120.537551] # u32_u32__u32_overflow_test: 17 u32_u32__u32 arithmetic tests finished <6>[ 120.540644] ok 5 u32_u32__u32_overflow_test <6>[ 120.544845] # s32_s32__s32_overflow_test: 17 s32_s32__s32 arithmetic tests finished <6>[ 120.548552] ok 6 s32_s32__s32_overflow_test <6>[ 120.551971] # u64_u64__u64_overflow_test: 17 u64_u64__u64 arithmetic tests finished <6>[ 120.555718] ok 7 u64_u64__u64_overflow_test <6>[ 120.559198] # s64_s64__s64_overflow_test: 21 s64_s64__s64 arithmetic tests finished <6>[ 120.562064] ok 8 s64_s64__s64_overflow_test <6>[ 120.563850] # u32_u32__int_overflow_test: 2 u32_u32__int arithmetic tests finished <6>[ 120.566562] ok 9 u32_u32__int_overflow_test <6>[ 120.569050] # u32_u32__u8_overflow_test: 3 u32_u32__u8 arithmetic tests finished <6>[ 120.571553] ok 10 u32_u32__u8_overflow_test <6>[ 120.574826] # u8_u8__int_overflow_test: 3 u8_u8__int arithmetic tests finished <6>[ 120.577234] ok 11 u8_u8__int_overflow_test <6>[ 120.579947] # int_int__u8_overflow_test: 3 int_int__u8 arithmetic tests finished <6>[ 120.582956] ok 12 int_int__u8_overflow_test <6>[ 120.583917] # shift_sane_test: 36 sane shift tests finished <6>[ 120.586300] ok 13 shift_sane_test <6>[ 120.587264] # shift_overflow_test: 25 overflow shift tests finished <6>[ 120.589320] ok 14 shift_overflow_test <6>[ 120.590636] # shift_truncate_test: 27 truncate shift tests finished <6>[ 120.592586] ok 15 shift_truncate_test <6>[ 120.593592] # shift_nonsense_test: 25 nonsense shift tests finished <6>[ 120.595841] ok 16 shift_nonsense_test <6>[ 120.605112] # overflow_allocation_test: 11 allocation overflow tests finished <6>[ 120.608142] ok 17 overflow_allocation_test <6>[ 120.609381] # overflow_size_helpers_test: 43 overflow size helper tests finished <6>[ 120.611268] ok 18 overflow_size_helpers_test <6>[ 120.613273] # overflows_type_test: 658 overflows_type() tests finished <6>[ 120.615161] ok 19 overflows_type_test <6>[ 120.617666] # same_type_test: 0 __same_type() tests finished <6>[ 120.619345] ok 20 same_type_test <6>[ 120.620354] # castable_to_type_test: 103 castable_to_type() tests finished <6>[ 120.622242] ok 21 castable_to_type_test <6>[ 120.625343] ok 22 DEFINE_FLEX_test <6>[ 120.625593] # overflow: pass:22 fail:0 skip:0 total:22 <6>[ 120.625810] # Totals: pass:22 fail:0 skip:0 total:22 <6>[ 120.626551] ok 43 overflow <6>[ 120.627476] KTAP version 1 <6>[ 120.627639] # Subtest: stackinit <6>[ 120.627811] # module: stackinit_kunit <6>[ 120.627888] 1..65 <6>[ 120.630407] ok 1 test_u8_zero <6>[ 120.632439] ok 2 test_u16_zero <6>[ 120.634848] ok 3 test_u32_zero <6>[ 120.636980] ok 4 test_u64_zero <6>[ 120.639369] ok 5 test_char_array_zero <6>[ 120.641581] ok 6 test_small_hole_zero <6>[ 120.644226] ok 7 test_big_hole_zero <6>[ 120.646472] ok 8 test_trailing_hole_zero <6>[ 120.648698] ok 9 test_packed_zero <6>[ 120.651533] ok 10 test_small_hole_dynamic_partial <6>[ 120.653755] ok 11 test_big_hole_dynamic_partial <6>[ 120.656298] ok 12 test_trailing_hole_dynamic_partial <6>[ 120.659006] ok 13 test_packed_dynamic_partial <6>[ 120.661319] ok 14 test_small_hole_assigned_dynamic_partial <6>[ 120.663733] ok 15 test_big_hole_assigned_dynamic_partial <6>[ 120.666492] ok 16 test_trailing_hole_assigned_dynamic_partial <6>[ 120.668717] ok 17 test_packed_assigned_dynamic_partial <6>[ 120.670931] ok 18 test_small_hole_static_partial <6>[ 120.673048] ok 19 test_big_hole_static_partial <6>[ 120.675424] ok 20 test_trailing_hole_static_partial <6>[ 120.677545] ok 21 test_packed_static_partial <6>[ 120.680165] ok 22 test_small_hole_static_all <6>[ 120.682889] ok 23 test_big_hole_static_all <6>[ 120.685101] ok 24 test_trailing_hole_static_all <6>[ 120.687658] ok 25 test_packed_static_all <6>[ 120.690410] ok 26 test_small_hole_dynamic_all <6>[ 120.692599] ok 27 test_big_hole_dynamic_all <6>[ 120.694921] ok 28 test_trailing_hole_dynamic_all <6>[ 120.697059] ok 29 test_packed_dynamic_all <6>[ 120.699962] ok 30 test_small_hole_runtime_partial <6>[ 120.702963] ok 31 test_big_hole_runtime_partial <6>[ 120.705167] ok 32 test_trailing_hole_runtime_partial <6>[ 120.707504] ok 33 test_packed_runtime_partial <6>[ 120.709755] ok 34 test_small_hole_runtime_all <6>[ 120.713557] ok 35 test_big_hole_runtime_all <6>[ 120.716052] ok 36 test_trailing_hole_runtime_all <6>[ 120.718559] ok 37 test_packed_runtime_all <6>[ 120.720593] ok 38 test_small_hole_assigned_static_partial <6>[ 120.723176] ok 39 test_big_hole_assigned_static_partial <6>[ 120.725238] ok 40 test_trailing_hole_assigned_static_partial <6>[ 120.727961] ok 41 test_packed_assigned_static_partial <6>[ 120.730696] ok 42 test_small_hole_assigned_static_all <6>[ 120.732834] ok 43 test_big_hole_assigned_static_all <6>[ 120.735771] ok 44 test_trailing_hole_assigned_static_all <6>[ 120.738707] ok 45 test_packed_assigned_static_all <6>[ 120.741497] ok 46 test_small_hole_assigned_dynamic_all <6>[ 120.744105] ok 47 test_big_hole_assigned_dynamic_all <6>[ 120.747596] ok 48 test_trailing_hole_assigned_dynamic_all <6>[ 120.749745] ok 49 test_packed_assigned_dynamic_all <6>[ 120.752565] ok 50 test_small_hole_assigned_copy # SKIP XFAIL uninit bytes: 3 <6>[ 120.755705] ok 51 test_big_hole_assigned_copy # SKIP XFAIL uninit bytes: 124 <6>[ 120.758195] ok 52 test_trailing_hole_assigned_copy # SKIP XFAIL uninit bytes: 7 <6>[ 120.760806] ok 53 test_packed_assigned_copy <6>[ 120.763388] ok 54 test_u8_none <6>[ 120.765789] ok 55 test_u16_none <6>[ 120.768205] ok 56 test_u32_none <6>[ 120.770724] ok 57 test_u64_none <6>[ 120.772824] ok 58 test_char_array_none <6>[ 120.775211] ok 59 test_switch_1_none # SKIP XFAIL uninit bytes: 80 <6>[ 120.777435] ok 60 test_switch_2_none # SKIP XFAIL uninit bytes: 80 <6>[ 120.780086] ok 61 test_small_hole_none <6>[ 120.782313] ok 62 test_big_hole_none <6>[ 120.784512] ok 63 test_trailing_hole_none <6>[ 120.786943] ok 64 test_packed_none <6>[ 120.789053] ok 65 test_user <6>[ 120.789307] # stackinit: pass:60 fail:0 skip:5 total:65 <6>[ 120.789554] # Totals: pass:60 fail:0 skip:5 total:65 <6>[ 120.790021] ok 44 stackinit <6>[ 120.790790] KTAP version 1 <6>[ 120.790959] # Subtest: fortify <6>[ 120.791130] # module: fortify_kunit <6>[ 120.791210] 1..26 <6>[ 120.793458] ok 1 fortify_test_known_sizes # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.796299] ok 2 fortify_test_control_flow_split # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.798901] ok 3 fortify_test_alloc_size_kmalloc_const # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.800909] ok 4 fortify_test_alloc_size_kmalloc_dynamic # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.803241] ok 5 fortify_test_alloc_size_vmalloc_const # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.805180] ok 6 fortify_test_alloc_size_vmalloc_dynamic # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.807622] ok 7 fortify_test_alloc_size_kvmalloc_const # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.809650] ok 8 fortify_test_alloc_size_kvmalloc_dynamic # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.812138] ok 9 fortify_test_alloc_size_devm_kmalloc_const # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.814243] ok 10 fortify_test_alloc_size_devm_kmalloc_dynamic # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.816274] ok 11 fortify_test_realloc_size # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.818546] ok 12 fortify_test_strlen # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.820711] ok 13 fortify_test_strnlen # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.823060] ok 14 fortify_test_strcpy # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.825185] ok 15 fortify_test_strncpy # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.827795] ok 16 fortify_test_strscpy # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.829748] ok 17 fortify_test_strcat # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.832594] ok 18 fortify_test_strncat # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.834885] ok 19 fortify_test_strlcat # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.836789] ok 20 fortify_test_memcpy # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.839586] ok 21 fortify_test_memmove # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.841493] ok 22 fortify_test_memscan # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.843793] ok 23 fortify_test_memchr # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.845718] ok 24 fortify_test_memchr_inv # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.848537] ok 25 fortify_test_memcmp # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.851183] ok 26 fortify_test_kmemdup # SKIP Not built with CONFIG_FORTIFY_SOURCE=y <6>[ 120.851560] # fortify: pass:0 fail:0 skip:26 total:26 <6>[ 120.851924] # Totals: pass:0 fail:0 skip:26 total:26 <6>[ 120.852203] ok 45 fortify # SKIP <6>[ 120.852832] KTAP version 1 <6>[ 120.852995] # Subtest: siphash <6>[ 120.853159] # module: siphash_kunit <6>[ 120.853235] 1..1 <6>[ 120.857501] ok 1 siphash_test <6>[ 120.857592] ok 46 siphash <6>[ 120.858523] KTAP version 1 <6>[ 120.858694] # Subtest: clk-leaf-mux-set-rate-parent <6>[ 120.858920] # module: clk_test <6>[ 120.858996] 1..1 <6>[ 120.859330] KTAP version 1 <6>[ 120.859521] # Subtest: clk_leaf_mux_set_rate_parent_determine_rate_test <6>[ 120.877757] ok 1 clk_leaf_mux_set_rate_parent__clk_determine_rate_proper_parent <6>[ 120.890910] ok 2 clk_leaf_mux_set_rate_parent__clk_mux_determine_rate_proper_parent <6>[ 120.905569] ok 3 clk_leaf_mux_set_rate_parent__clk_mux_determine_rate_closest_proper_parent <6>[ 120.920044] ok 4 clk_leaf_mux_set_rate_parent_clk_hw_determine_rate_no_reparent_proper_parent <6>[ 120.920623] # clk_leaf_mux_set_rate_parent_determine_rate_test: pass:4 fail:0 skip:0 total:4 <6>[ 120.921305] ok 1 clk_leaf_mux_set_rate_parent_determine_rate_test <6>[ 120.921744] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 120.922339] ok 47 clk-leaf-mux-set-rate-parent <6>[ 120.923214] KTAP version 1 <6>[ 120.923415] # Subtest: clk-test <6>[ 120.923607] # module: clk_test <6>[ 120.923685] 1..4 <6>[ 120.928765] ok 1 clk_test_get_rate <6>[ 120.933823] ok 2 clk_test_set_get_rate <6>[ 120.940764] ok 3 clk_test_set_set_get_rate <6>[ 120.945546] ok 4 clk_test_round_set_get_rate <6>[ 120.946134] # clk-test: pass:4 fail:0 skip:0 total:4 <6>[ 120.946432] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 120.946708] ok 48 clk-test <6>[ 120.947291] KTAP version 1 <6>[ 120.947467] # Subtest: clk-multiple-parents-mux-test <6>[ 120.947710] # module: clk_test <6>[ 120.947783] 1..3 <6>[ 120.957579] ok 1 clk_test_multiple_parents_mux_get_parent <6>[ 120.966903] ok 2 clk_test_multiple_parents_mux_has_parent <6>[ 120.975208] ok 3 clk_test_multiple_parents_mux_set_range_set_parent_get_rate # SKIP This needs to be fixed in the core. <6>[ 120.976494] # clk-multiple-parents-mux-test: pass:2 fail:0 skip:1 total:3 <6>[ 120.976937] # Totals: pass:2 fail:0 skip:1 total:3 <6>[ 120.977229] ok 49 clk-multiple-parents-mux-test <6>[ 120.977776] KTAP version 1 <6>[ 120.978126] # Subtest: clk-mux-no-reparent <6>[ 120.978331] # module: clk_test <6>[ 120.978403] 1..2 <6>[ 120.989264] ok 1 clk_mux_no_reparent_round_rate <6>[ 120.998769] ok 2 clk_mux_no_reparent_set_rate <6>[ 120.999041] # clk-mux-no-reparent: pass:2 fail:0 skip:0 total:2 <6>[ 120.999312] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 120.999574] ok 50 clk-mux-no-reparent <6>[ 121.000143] KTAP version 1 <6>[ 121.000298] # Subtest: clk-mux-notifier <6>[ 121.000482] # module: clk_test <6>[ 121.000554] 1..1 <6>[ 121.013265] ok 1 clk_mux_notifier_set_parent_test <6>[ 121.013404] ok 51 clk-mux-notifier <6>[ 121.015815] KTAP version 1 <6>[ 121.015981] # Subtest: clk-orphan-transparent-multiple-parent-mux-test <6>[ 121.016238] # module: clk_test <6>[ 121.016313] 1..9 <6>[ 121.024074] ok 1 clk_test_orphan_transparent_multiple_parent_mux_get_parent <6>[ 121.031066] ok 2 clk_test_orphan_transparent_multiple_parent_mux_set_parent <6>[ 121.039430] ok 3 clk_test_orphan_transparent_multiple_parent_mux_set_parent_drop_range <6>[ 121.047662] ok 4 clk_test_orphan_transparent_multiple_parent_mux_set_parent_get_rate <6>[ 121.054320] ok 5 clk_test_orphan_transparent_multiple_parent_mux_set_parent_put <6>[ 121.061675] ok 6 clk_test_orphan_transparent_multiple_parent_mux_set_parent_set_range_modified <6>[ 121.069037] ok 7 clk_test_orphan_transparent_multiple_parent_mux_set_parent_set_range_untouched <6>[ 121.077813] ok 8 clk_test_orphan_transparent_multiple_parent_mux_set_range_round_rate <6>[ 121.084827] ok 9 clk_test_orphan_transparent_multiple_parent_mux_set_range_set_parent_get_rate # SKIP This needs to be fixed in the core. <6>[ 121.085267] # clk-orphan-transparent-multiple-parent-mux-test: pass:8 fail:0 skip:1 total:9 <6>[ 121.085791] # Totals: pass:8 fail:0 skip:1 total:9 <6>[ 121.086381] ok 52 clk-orphan-transparent-multiple-parent-mux-test <6>[ 121.087203] KTAP version 1 <6>[ 121.087394] # Subtest: clk-orphan-transparent-single-parent-test <6>[ 121.087678] # module: clk_test <6>[ 121.087762] 1..1 <6>[ 121.097233] ok 1 clk_test_orphan_transparent_parent_mux_set_range <6>[ 121.097374] ok 53 clk-orphan-transparent-single-parent-test <6>[ 121.098230] KTAP version 1 <6>[ 121.098401] # Subtest: clk-orphan-two-level-root-last-test <6>[ 121.098647] # module: clk_test <6>[ 121.098722] 1..2 <6>[ 121.109380] ok 1 clk_orphan_two_level_root_last_test_get_rate <6>[ 121.119670] ok 2 clk_orphan_two_level_root_last_test_set_range <6>[ 121.120108] # clk-orphan-two-level-root-last-test: pass:2 fail:0 skip:0 total:2 <6>[ 121.120515] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 121.120845] ok 54 clk-orphan-two-level-root-last-test <6>[ 121.121499] KTAP version 1 <6>[ 121.121666] # Subtest: clk-range-test <6>[ 121.122000] # module: clk_test <6>[ 121.122077] 1..11 <6>[ 121.126420] ok 1 clk_range_test_set_range <3>[ 121.128107] clk_set_rate_range_nolock: clk test_dummy_rate dev (null) con (null): invalid range [142001000, 142000000] <6>[ 121.131293] ok 2 clk_range_test_set_range_invalid <6>[ 121.136061] ok 3 clk_range_test_multiple_disjoints_range <6>[ 121.140874] ok 4 clk_range_test_set_range_round_rate_lower <6>[ 121.146054] ok 5 clk_range_test_set_range_set_rate_lower <6>[ 121.150672] ok 6 clk_range_test_set_range_set_round_rate_consistent_lower <6>[ 121.154939] ok 7 clk_range_test_set_range_round_rate_higher <6>[ 121.159979] ok 8 clk_range_test_set_range_set_rate_higher <6>[ 121.165494] ok 9 clk_range_test_set_range_set_round_rate_consistent_higher <6>[ 121.171460] ok 10 clk_range_test_set_range_get_rate_raised <6>[ 121.176421] ok 11 clk_range_test_set_range_get_rate_lowered <6>[ 121.176750] # clk-range-test: pass:11 fail:0 skip:0 total:11 <6>[ 121.177128] # Totals: pass:11 fail:0 skip:0 total:11 <6>[ 121.177487] ok 55 clk-range-test <6>[ 121.179280] KTAP version 1 <6>[ 121.179448] # Subtest: clk-range-maximize-test <6>[ 121.179644] # module: clk_test <6>[ 121.179720] 1..3 <6>[ 121.184521] ok 1 clk_range_test_set_range_rate_maximized <6>[ 121.190162] ok 2 clk_range_test_multiple_set_range_rate_maximized <6>[ 121.195239] ok 3 clk_range_test_multiple_set_range_rate_put_maximized <6>[ 121.195548] # clk-range-maximize-test: pass:3 fail:0 skip:0 total:3 <6>[ 121.195874] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 121.196173] ok 56 clk-range-maximize-test <6>[ 121.196857] KTAP version 1 <6>[ 121.197024] # Subtest: clk-range-minimize-test <6>[ 121.197230] # module: clk_test <6>[ 121.197348] 1..3 <6>[ 121.203046] ok 1 clk_range_test_set_range_rate_minimized <6>[ 121.207303] ok 2 clk_range_test_multiple_set_range_rate_minimized <6>[ 121.212355] ok 3 clk_range_test_multiple_set_range_rate_put_minimized <6>[ 121.212657] # clk-range-minimize-test: pass:3 fail:0 skip:0 total:3 <6>[ 121.212944] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 121.213200] ok 57 clk-range-minimize-test <6>[ 121.213760] KTAP version 1 <6>[ 121.214084] # Subtest: clk-single-parent-mux-test <6>[ 121.214354] # module: clk_test <6>[ 121.214431] 1..7 <6>[ 121.222006] ok 1 clk_test_single_parent_mux_get_parent <6>[ 121.228916] ok 2 clk_test_single_parent_mux_has_parent <6>[ 121.236539] ok 3 clk_test_single_parent_mux_set_range_disjoint_child_last # SKIP This needs to be fixed in the core. <6>[ 121.243983] ok 4 clk_test_single_parent_mux_set_range_disjoint_parent_last # SKIP This needs to be fixed in the core. <6>[ 121.250935] ok 5 clk_test_single_parent_mux_set_range_round_rate_child_smaller <6>[ 121.259477] ok 6 clk_test_single_parent_mux_set_range_round_rate_parent_only <6>[ 121.266700] ok 7 clk_test_single_parent_mux_set_range_round_rate_parent_smaller <6>[ 121.267088] # clk-single-parent-mux-test: pass:5 fail:0 skip:2 total:7 <6>[ 121.267475] # Totals: pass:5 fail:0 skip:2 total:7 <6>[ 121.267804] ok 58 clk-single-parent-mux-test <6>[ 121.268469] KTAP version 1 <6>[ 121.268646] # Subtest: clk-uncached-test <6>[ 121.268855] # module: clk_test <6>[ 121.268960] 1..3 <6>[ 121.275302] ok 1 clk_test_uncached_get_rate <6>[ 121.280552] ok 2 clk_test_uncached_set_range <6>[ 121.286609] ok 3 clk_test_uncached_updated_rate_set_range <6>[ 121.286894] # clk-uncached-test: pass:3 fail:0 skip:0 total:3 <6>[ 121.287152] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 121.287410] ok 59 clk-uncached-test <6>[ 121.287969] KTAP version 1 <6>[ 121.288130] # Subtest: clk-gate-register-test <6>[ 121.288327] # module: clk_gate_test <6>[ 121.288401] 1..6 <6>[ 121.304377] ok 1 clk_gate_register_test_dev <6>[ 121.317431] ok 2 clk_gate_register_test_parent_names <6>[ 121.325410] ok 3 clk_gate_register_test_parent_data <6>[ 121.334181] ok 4 clk_gate_register_test_parent_data_legacy <6>[ 121.343255] ok 5 clk_gate_register_test_parent_hw <3>[ 121.344270] gate bit exceeds LOWORD field <6>[ 121.345641] ok 6 clk_gate_register_test_hiword_invalid <6>[ 121.345737] # clk-gate-register-test: pass:6 fail:0 skip:0 total:6 <6>[ 121.346175] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 121.346452] ok 60 clk-gate-register-test <6>[ 121.347072] KTAP version 1 <6>[ 121.347239] # Subtest: clk-gate-test <6>[ 121.347428] # module: clk_gate_test <6>[ 121.347502] 1..3 <6>[ 121.355190] ok 1 clk_gate_test_parent_rate <4>[ 121.361623] clk_unregister: unregistering prepared clock: test_gate <4>[ 121.363305] clk_unregister: unregistering prepared clock: test_parent <6>[ 121.363802] ok 2 clk_gate_test_enable <6>[ 121.371848] ok 3 clk_gate_test_disable <6>[ 121.372135] # clk-gate-test: pass:3 fail:0 skip:0 total:3 <6>[ 121.372403] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 121.372695] ok 61 clk-gate-test <6>[ 121.373359] KTAP version 1 <6>[ 121.373553] # Subtest: clk-gate-invert-test <6>[ 121.373792] # module: clk_gate_test <6>[ 121.374067] 1..2 <4>[ 121.380625] clk_unregister: unregistering prepared clock: test_gate <4>[ 121.382382] clk_unregister: unregistering prepared clock: test_parent <6>[ 121.382915] ok 1 clk_gate_test_invert_enable <6>[ 121.390306] ok 2 clk_gate_test_invert_disable <6>[ 121.390728] # clk-gate-invert-test: pass:2 fail:0 skip:0 total:2 <6>[ 121.391116] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 121.391502] ok 62 clk-gate-invert-test <6>[ 121.392243] KTAP version 1 <6>[ 121.392412] # Subtest: clk-gate-hiword-test <6>[ 121.392611] # module: clk_gate_test <6>[ 121.392683] 1..2 <4>[ 121.399338] clk_unregister: unregistering prepared clock: test_gate <4>[ 121.400763] clk_unregister: unregistering prepared clock: test_parent <6>[ 121.401348] ok 1 clk_gate_test_hiword_enable <6>[ 121.408390] ok 2 clk_gate_test_hiword_disable <6>[ 121.408794] # clk-gate-hiword-test: pass:2 fail:0 skip:0 total:2 <6>[ 121.409168] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 121.409471] ok 63 clk-gate-hiword-test <6>[ 121.411073] KTAP version 1 <6>[ 121.411240] # Subtest: clk-gate-is_enabled-test <6>[ 121.411443] # module: clk_gate_test <6>[ 121.411518] 1..4 <6>[ 121.416046] ok 1 clk_gate_test_is_enabled <6>[ 121.421686] ok 2 clk_gate_test_is_disabled <6>[ 121.427782] ok 3 clk_gate_test_is_enabled_inverted <6>[ 121.432982] ok 4 clk_gate_test_is_disabled_inverted <6>[ 121.433336] # clk-gate-is_enabled-test: pass:4 fail:0 skip:0 total:4 <6>[ 121.433632] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 121.435425] ok 64 clk-gate-is_enabled-test <6>[ 121.436054] KTAP version 1 <6>[ 121.436229] # Subtest: clk-fd-approximation <6>[ 121.436442] # module: clk_fractional_divider_test <6>[ 121.436522] 1..4 <6>[ 121.439299] ok 1 clk_fd_test_approximation_max_denominator <6>[ 121.441369] ok 2 clk_fd_test_approximation_max_numerator <6>[ 121.443877] ok 3 clk_fd_test_approximation_max_denominator_zero_based <6>[ 121.446403] ok 4 clk_fd_test_approximation_max_numerator_zero_based <6>[ 121.446744] # clk-fd-approximation: pass:4 fail:0 skip:0 total:4 <6>[ 121.447033] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 121.447295] ok 65 clk-fd-approximation <6>[ 121.447941] KTAP version 1 <6>[ 121.448106] # Subtest: qos-kunit-test <6>[ 121.448289] # module: qos_test <6>[ 121.448366] 1..3 <6>[ 121.451291] ok 1 freq_qos_test_min <6>[ 121.453658] ok 2 freq_qos_test_maxdef <6>[ 121.456173] ok 3 freq_qos_test_readd <6>[ 121.456435] # qos-kunit-test: pass:3 fail:0 skip:0 total:3 <6>[ 121.456670] # Totals: pass:3 fail:0 skip:0 total:3 <6>[ 121.456937] ok 66 qos-kunit-test <6>[ 121.457685] KTAP version 1 <6>[ 121.458541] # Subtest: regmap <6>[ 121.458720] # module: regmap_kunit <6>[ 121.458800] 1..34 <6>[ 121.459164] KTAP version 1 <6>[ 121.459360] # Subtest: basic_read_write <6>[ 121.469031] ok 1 none-default @0x0 <6>[ 121.476736] ok 2 flat-default @0x0 <6>[ 121.482781] ok 3 rbtree-default @0x0 <6>[ 121.488730] ok 4 maple-default @0x0 <6>[ 121.489009] # basic_read_write: pass:4 fail:0 skip:0 total:4 <6>[ 121.489240] ok 1 basic_read_write <6>[ 121.489571] KTAP version 1 <6>[ 121.490036] # Subtest: read_bypassed <6>[ 121.499860] ok 1 flat-default @0x0 <6>[ 121.507611] ok 2 flat-default @0x2001 <6>[ 121.516432] ok 3 flat-default @0x2002 <6>[ 121.524710] ok 4 flat-default @0x2003 <6>[ 121.532407] ok 5 flat-default @0x2004 <6>[ 121.539544] ok 6 rbtree-default @0x0 <6>[ 121.545138] ok 7 rbtree-default @0x2001 <6>[ 121.551733] ok 8 rbtree-default @0x2002 <6>[ 121.557946] ok 9 rbtree-default @0x2003 <6>[ 121.564334] ok 10 rbtree-default @0x2004 <6>[ 121.570882] ok 11 maple-default @0x0 <6>[ 121.577027] ok 12 maple-default @0x2001 <6>[ 121.582589] ok 13 maple-default @0x2002 <6>[ 121.588036] ok 14 maple-default @0x2003 <6>[ 121.594335] ok 15 maple-default @0x2004 <6>[ 121.594687] # read_bypassed: pass:15 fail:0 skip:0 total:15 <6>[ 121.594934] ok 2 read_bypassed <6>[ 121.595214] KTAP version 1 <6>[ 121.595531] # Subtest: read_bypassed_volatile <6>[ 121.603804] ok 1 flat-default @0x0 <6>[ 121.611910] ok 2 flat-default @0x2001 <6>[ 121.619775] ok 3 flat-default @0x2002 <6>[ 121.628137] ok 4 flat-default @0x2003 <6>[ 121.636036] ok 5 flat-default @0x2004 <6>[ 121.641286] ok 6 rbtree-default @0x0 <6>[ 121.647747] ok 7 rbtree-default @0x2001 <6>[ 121.653487] ok 8 rbtree-default @0x2002 <6>[ 121.660825] ok 9 rbtree-default @0x2003 <6>[ 121.667221] ok 10 rbtree-default @0x2004 <6>[ 121.672031] ok 11 maple-default @0x0 <6>[ 121.678091] ok 12 maple-default @0x2001 <6>[ 121.683902] ok 13 maple-default @0x2002 <6>[ 121.689299] ok 14 maple-default @0x2003 <6>[ 121.695636] ok 15 maple-default @0x2004 <6>[ 121.695947] # read_bypassed_volatile: pass:15 fail:0 skip:0 total:15 <6>[ 121.696234] ok 3 read_bypassed_volatile <6>[ 121.696604] KTAP version 1 <6>[ 121.697001] # Subtest: bulk_write <6>[ 121.704402] ok 1 none-default @0x0 <6>[ 121.710910] ok 2 flat-default @0x0 <6>[ 121.716580] ok 3 rbtree-default @0x0 <6>[ 121.721589] ok 4 maple-default @0x0 <6>[ 121.722071] # bulk_write: pass:4 fail:0 skip:0 total:4 <6>[ 121.723156] ok 4 bulk_write <6>[ 121.723460] KTAP version 1 <6>[ 121.723831] # Subtest: bulk_read <6>[ 121.731585] ok 1 none-default @0x0 <6>[ 121.738544] ok 2 flat-default @0x0 <6>[ 121.744232] ok 3 rbtree-default @0x0 <6>[ 121.749344] ok 4 maple-default @0x0 <6>[ 121.749645] # bulk_read: pass:4 fail:0 skip:0 total:4 <6>[ 121.750103] ok 5 bulk_read <6>[ 121.750440] KTAP version 1 <6>[ 121.750757] # Subtest: write_readonly <4>[ 121.753152] regmap_test write_readonly.regmap_test: No cache used with register defaults set! <6>[ 121.758080] ok 1 none-default @0x0 <6>[ 121.765710] ok 2 flat-default @0x0 <6>[ 121.771639] ok 3 rbtree-default @0x0 <6>[ 121.777426] ok 4 maple-default @0x0 <6>[ 121.777803] # write_readonly: pass:4 fail:0 skip:0 total:4 <6>[ 121.778857] ok 6 write_readonly <6>[ 121.779130] KTAP version 1 <6>[ 121.779448] # Subtest: read_writeonly <6>[ 121.785523] ok 1 none-default @0x0 <6>[ 121.792552] ok 2 flat-default @0x0 <6>[ 121.798008] ok 3 rbtree-default @0x0 <6>[ 121.803643] ok 4 maple-default @0x0 <6>[ 121.803932] # read_writeonly: pass:4 fail:0 skip:0 total:4 <6>[ 121.804229] ok 7 read_writeonly <6>[ 121.804635] KTAP version 1 <6>[ 121.805038] # Subtest: reg_defaults <4>[ 121.807255] regmap_test reg_defaults.regmap_test: No cache used with register defaults set! <6>[ 121.811639] ok 1 none-default @0x0 <6>[ 121.817514] ok 2 flat-default @0x0 <6>[ 121.823273] ok 3 rbtree-default @0x0 <6>[ 121.828332] ok 4 maple-default @0x0 <6>[ 121.828627] # reg_defaults: pass:4 fail:0 skip:0 total:4 <6>[ 121.828859] ok 8 reg_defaults <6>[ 121.829163] KTAP version 1 <6>[ 121.829482] # Subtest: reg_defaults_read_dev <4>[ 121.832735] regmap_test reg_defaults_read_dev.regmap_test: No cache used with register defaults set! <6>[ 121.836966] ok 1 none-default @0x0 <4>[ 121.839550] regmap_test reg_defaults_read_dev.regmap_test: No cache defaults, reading back from HW <6>[ 121.844454] ok 2 flat-default @0x0 <4>[ 121.847040] regmap_test reg_defaults_read_dev.regmap_test: No cache defaults, reading back from HW <6>[ 121.850261] ok 3 rbtree-default @0x0 <4>[ 121.852390] regmap_test reg_defaults_read_dev.regmap_test: No cache defaults, reading back from HW <6>[ 121.855768] ok 4 maple-default @0x0 <6>[ 121.855865] # reg_defaults_read_dev: pass:4 fail:0 skip:0 total:4 <6>[ 121.856125] ok 9 reg_defaults_read_dev <6>[ 121.856597] KTAP version 1 <6>[ 121.857097] # Subtest: register_patch <4>[ 121.859385] regmap_test register_patch.regmap_test: No cache used with register defaults set! <6>[ 121.863632] ok 1 none-default @0x0 <6>[ 121.869497] ok 2 flat-default @0x0 <6>[ 121.876030] ok 3 rbtree-default @0x0 <6>[ 121.880830] ok 4 maple-default @0x0 <6>[ 121.881095] # register_patch: pass:4 fail:0 skip:0 total:4 <6>[ 121.881424] ok 10 register_patch <6>[ 121.882765] KTAP version 1 <6>[ 121.883081] # Subtest: stride <4>[ 121.885349] regmap_test stride.regmap_test: No cache used with register defaults set! <6>[ 121.889575] ok 1 none-default @0x0 <6>[ 121.895902] ok 2 flat-default @0x0 <6>[ 121.900689] ok 3 rbtree-default @0x0 <6>[ 121.905691] ok 4 maple-default @0x0 <6>[ 121.906113] # stride: pass:4 fail:0 skip:0 total:4 <6>[ 121.906348] ok 11 stride <6>[ 121.906663] KTAP version 1 <6>[ 121.906969] # Subtest: basic_ranges <6>[ 121.913788] ok 1 none-default @0x0 <6>[ 121.920604] ok 2 flat-default @0x0 <6>[ 121.925282] ok 3 rbtree-default @0x0 <6>[ 121.931290] ok 4 maple-default @0x0 <6>[ 121.931550] # basic_ranges: pass:4 fail:0 skip:0 total:4 <6>[ 121.931772] ok 12 basic_ranges <6>[ 121.932040] KTAP version 1 <6>[ 121.932344] # Subtest: stress_insert <6>[ 121.947714] ok 1 none-default @0x0 <6>[ 121.962888] ok 2 flat-default @0x0 <6>[ 121.971276] ok 3 rbtree-default @0x0 <6>[ 121.997721] ok 4 maple-default @0x0 <6>[ 121.998148] # stress_insert: pass:4 fail:0 skip:0 total:4 <6>[ 121.998424] ok 13 stress_insert <6>[ 121.998745] KTAP version 1 <6>[ 121.999071] # Subtest: cache_bypass <6>[ 122.007523] ok 1 flat-default @0x0 <6>[ 122.015178] ok 2 flat-default @0x2001 <6>[ 122.022159] ok 3 flat-default @0x2002 <6>[ 122.029439] ok 4 flat-default @0x2003 <6>[ 122.036858] ok 5 flat-default @0x2004 <6>[ 122.041772] ok 6 rbtree-default @0x0 <6>[ 122.047208] ok 7 rbtree-default @0x2001 <6>[ 122.053116] ok 8 rbtree-default @0x2002 <6>[ 122.060160] ok 9 rbtree-default @0x2003 <6>[ 122.065313] ok 10 rbtree-default @0x2004 <6>[ 122.071146] ok 11 maple-default @0x0 <6>[ 122.076896] ok 12 maple-default @0x2001 <6>[ 122.082770] ok 13 maple-default @0x2002 <6>[ 122.087879] ok 14 maple-default @0x2003 <6>[ 122.094258] ok 15 maple-default @0x2004 <6>[ 122.094524] # cache_bypass: pass:15 fail:0 skip:0 total:15 <6>[ 122.094761] ok 14 cache_bypass <6>[ 122.095036] KTAP version 1 <6>[ 122.095334] # Subtest: cache_sync_marked_dirty <6>[ 122.102846] ok 1 flat-default @0x0 <6>[ 122.124762] ok 2 flat-default @0x2001 <6>[ 122.147231] ok 3 flat-default @0x2002 <6>[ 122.175721] ok 4 flat-default @0x2003 <6>[ 122.198122] ok 5 flat-default @0x2004 <6>[ 122.207167] ok 6 rbtree-default @0x0 <6>[ 122.214475] ok 7 rbtree-default @0x2001 <6>[ 122.223571] ok 8 rbtree-default @0x2002 <6>[ 122.230737] ok 9 rbtree-default @0x2003 <6>[ 122.238300] ok 10 rbtree-default @0x2004 <6>[ 122.244463] ok 11 maple-default @0x0 <6>[ 122.250354] ok 12 maple-default @0x2001 <6>[ 122.256587] ok 13 maple-default @0x2002 <6>[ 122.262958] ok 14 maple-default @0x2003 <6>[ 122.269416] ok 15 maple-default @0x2004 <6>[ 122.269681] # cache_sync_marked_dirty: pass:15 fail:0 skip:0 total:15 <6>[ 122.270082] ok 15 cache_sync_marked_dirty <6>[ 122.270431] KTAP version 1 <6>[ 122.270789] # Subtest: cache_sync_after_cache_only <6>[ 122.277809] ok 1 flat-default @0x0 <6>[ 122.296778] ok 2 flat-default @0x2001 <6>[ 122.318660] ok 3 flat-default @0x2002 <6>[ 122.336962] ok 4 flat-default @0x2003 <6>[ 122.358941] ok 5 flat-default @0x2004 <6>[ 122.363850] ok 6 rbtree-default @0x0 <6>[ 122.369184] ok 7 rbtree-default @0x2001 <6>[ 122.375589] ok 8 rbtree-default @0x2002 <6>[ 122.381359] ok 9 rbtree-default @0x2003 <6>[ 122.387399] ok 10 rbtree-default @0x2004 <6>[ 122.392251] ok 11 maple-default @0x0 <6>[ 122.399077] ok 12 maple-default @0x2001 <6>[ 122.404971] ok 13 maple-default @0x2002 <6>[ 122.411126] ok 14 maple-default @0x2003 <6>[ 122.416537] ok 15 maple-default @0x2004 <6>[ 122.416868] # cache_sync_after_cache_only: pass:15 fail:0 skip:0 total:15 <6>[ 122.417155] ok 16 cache_sync_after_cache_only <6>[ 122.417565] KTAP version 1 <6>[ 122.418604] # Subtest: cache_sync_defaults_marked_dirty <6>[ 122.426619] ok 1 flat-default @0x0 <6>[ 122.463448] ok 2 flat-default @0x2001 <6>[ 122.503880] ok 3 flat-default @0x2002 <6>[ 122.544452] ok 4 flat-default @0x2003 <6>[ 122.584486] ok 5 flat-default @0x2004 <6>[ 122.592372] ok 6 rbtree-default @0x0 <6>[ 122.601558] ok 7 rbtree-default @0x2001 <6>[ 122.610546] ok 8 rbtree-default @0x2002 <6>[ 122.622500] ok 9 rbtree-default @0x2003 <6>[ 122.632915] ok 10 rbtree-default @0x2004 <6>[ 122.640150] ok 11 maple-default @0x0 <6>[ 122.646365] ok 12 maple-default @0x2001 <6>[ 122.655206] ok 13 maple-default @0x2002 <6>[ 122.661745] ok 14 maple-default @0x2003 <6>[ 122.669399] ok 15 maple-default @0x2004 <6>[ 122.669798] # cache_sync_defaults_marked_dirty: pass:15 fail:0 skip:0 total:15 <6>[ 122.670369] ok 17 cache_sync_defaults_marked_dirty <6>[ 122.670756] KTAP version 1 <6>[ 122.671100] # Subtest: cache_sync_default_after_cache_only <6>[ 122.680874] ok 1 flat-default @0x0 <6>[ 122.713092] ok 2 flat-default @0x2001 <6>[ 122.745337] ok 3 flat-default @0x2002 <6>[ 122.778805] ok 4 flat-default @0x2003 <6>[ 122.810072] ok 5 flat-default @0x2004 <6>[ 122.816280] ok 6 rbtree-default @0x0 <6>[ 122.821721] ok 7 rbtree-default @0x2001 <6>[ 122.828452] ok 8 rbtree-default @0x2002 <6>[ 122.833687] ok 9 rbtree-default @0x2003 <6>[ 122.840654] ok 10 rbtree-default @0x2004 <6>[ 122.846753] ok 11 maple-default @0x0 <6>[ 122.854829] ok 12 maple-default @0x2001 <6>[ 122.860308] ok 13 maple-default @0x2002 <6>[ 122.865614] ok 14 maple-default @0x2003 <6>[ 122.871874] ok 15 maple-default @0x2004 <6>[ 122.872264] # cache_sync_default_after_cache_only: pass:15 fail:0 skip:0 total:15 <6>[ 122.872615] ok 18 cache_sync_default_after_cache_only <6>[ 122.873049] KTAP version 1 <6>[ 122.873419] # Subtest: cache_sync_readonly <6>[ 122.880519] ok 1 flat-default @0x0 <6>[ 122.902417] ok 2 flat-default @0x2001 <6>[ 122.925378] ok 3 flat-default @0x2002 <6>[ 122.947559] ok 4 flat-default @0x2003 <6>[ 122.970479] ok 5 flat-default @0x2004 <6>[ 122.977415] ok 6 rbtree-default @0x0 <6>[ 122.984622] ok 7 rbtree-default @0x2001 <6>[ 122.990438] ok 8 rbtree-default @0x2002 <6>[ 122.996028] ok 9 rbtree-default @0x2003 <6>[ 123.001573] ok 10 rbtree-default @0x2004 <6>[ 123.006925] ok 11 maple-default @0x0 <6>[ 123.012574] ok 12 maple-default @0x2001 <6>[ 123.019060] ok 13 maple-default @0x2002 <6>[ 123.024958] ok 14 maple-default @0x2003 <6>[ 123.030859] ok 15 maple-default @0x2004 <6>[ 123.031131] # cache_sync_readonly: pass:15 fail:0 skip:0 total:15 <6>[ 123.031366] ok 19 cache_sync_readonly <6>[ 123.031655] KTAP version 1 <6>[ 123.031967] # Subtest: cache_sync_patch <6>[ 123.039838] ok 1 flat-default @0x0 <6>[ 123.062972] ok 2 flat-default @0x2001 <6>[ 123.086446] ok 3 flat-default @0x2002 <6>[ 123.109716] ok 4 flat-default @0x2003 <6>[ 123.132780] ok 5 flat-default @0x2004 <6>[ 123.140784] ok 6 rbtree-default @0x0 <6>[ 123.147938] ok 7 rbtree-default @0x2001 <6>[ 123.157653] ok 8 rbtree-default @0x2002 <6>[ 123.165850] ok 9 rbtree-default @0x2003 <6>[ 123.176904] ok 10 rbtree-default @0x2004 <6>[ 123.183533] ok 11 maple-default @0x0 <6>[ 123.188944] ok 12 maple-default @0x2001 <6>[ 123.195326] ok 13 maple-default @0x2002 <6>[ 123.200682] ok 14 maple-default @0x2003 <6>[ 123.206176] ok 15 maple-default @0x2004 <6>[ 123.206451] # cache_sync_patch: pass:15 fail:0 skip:0 total:15 <6>[ 123.206689] ok 20 cache_sync_patch <6>[ 123.207032] KTAP version 1 <6>[ 123.207351] # Subtest: cache_drop <6>[ 123.212876] ok 1 rbtree-default @0x0 <6>[ 123.218631] ok 2 rbtree-default @0x2001 <6>[ 123.224269] ok 3 rbtree-default @0x2002 <6>[ 123.230695] ok 4 rbtree-default @0x2003 <6>[ 123.236222] ok 5 rbtree-default @0x2004 <6>[ 123.243348] ok 6 maple-default @0x0 <6>[ 123.249225] ok 7 maple-default @0x2001 <6>[ 123.255252] ok 8 maple-default @0x2002 <6>[ 123.261285] ok 9 maple-default @0x2003 <6>[ 123.267069] ok 10 maple-default @0x2004 <6>[ 123.267436] # cache_drop: pass:10 fail:0 skip:0 total:10 <6>[ 123.267768] ok 21 cache_drop <6>[ 123.268144] KTAP version 1 <6>[ 123.268544] # Subtest: cache_drop_with_non_contiguous_ranges <6>[ 123.275814] ok 1 rbtree-default @0x0 <6>[ 123.282494] ok 2 rbtree-default @0x2001 <6>[ 123.288663] ok 3 rbtree-default @0x2002 <6>[ 123.295234] ok 4 rbtree-default @0x2003 <6>[ 123.301210] ok 5 rbtree-default @0x2004 <6>[ 123.307953] ok 6 maple-default @0x0 <6>[ 123.316666] ok 7 maple-default @0x2001 <6>[ 123.323869] ok 8 maple-default @0x2002 <6>[ 123.331484] ok 9 maple-default @0x2003 <6>[ 123.339275] ok 10 maple-default @0x2004 <6>[ 123.339765] # cache_drop_with_non_contiguous_ranges: pass:10 fail:0 skip:0 total:10 <6>[ 123.340075] ok 22 cache_drop_with_non_contiguous_ranges <6>[ 123.340466] KTAP version 1 <6>[ 123.340927] # Subtest: cache_drop_all_and_sync_marked_dirty <6>[ 123.347451] ok 1 rbtree-default @0x0 <6>[ 123.355934] ok 2 rbtree-default @0x2001 <6>[ 123.361482] ok 3 rbtree-default @0x2002 <6>[ 123.368592] ok 4 rbtree-default @0x2003 <6>[ 123.374488] ok 5 rbtree-default @0x2004 <6>[ 123.379302] ok 6 maple-default @0x0 <6>[ 123.384752] ok 7 maple-default @0x2001 <6>[ 123.391036] ok 8 maple-default @0x2002 <6>[ 123.396847] ok 9 maple-default @0x2003 <6>[ 123.402553] ok 10 maple-default @0x2004 <6>[ 123.402892] # cache_drop_all_and_sync_marked_dirty: pass:10 fail:0 skip:0 total:10 <6>[ 123.403173] ok 23 cache_drop_all_and_sync_marked_dirty <6>[ 123.403601] KTAP version 1 <6>[ 123.404100] # Subtest: cache_drop_all_and_sync_no_defaults <6>[ 123.410384] ok 1 rbtree-default @0x0 <6>[ 123.416735] ok 2 rbtree-default @0x2001 <6>[ 123.422423] ok 3 rbtree-default @0x2002 <6>[ 123.429008] ok 4 rbtree-default @0x2003 <6>[ 123.435509] ok 5 rbtree-default @0x2004 <6>[ 123.440790] ok 6 maple-default @0x0 <6>[ 123.446894] ok 7 maple-default @0x2001 <6>[ 123.452801] ok 8 maple-default @0x2002 <6>[ 123.459242] ok 9 maple-default @0x2003 <6>[ 123.464813] ok 10 maple-default @0x2004 <6>[ 123.465231] # cache_drop_all_and_sync_no_defaults: pass:10 fail:0 skip:0 total:10 <6>[ 123.465652] ok 24 cache_drop_all_and_sync_no_defaults <6>[ 123.466508] KTAP version 1 <6>[ 123.467001] # Subtest: cache_drop_all_and_sync_has_defaults <6>[ 123.472381] ok 1 rbtree-default @0x0 <6>[ 123.478648] ok 2 rbtree-default @0x2001 <6>[ 123.484571] ok 3 rbtree-default @0x2002 <6>[ 123.491240] ok 4 rbtree-default @0x2003 <6>[ 123.497024] ok 5 rbtree-default @0x2004 <6>[ 123.502702] ok 6 maple-default @0x0 <6>[ 123.508282] ok 7 maple-default @0x2001 <6>[ 123.513446] ok 8 maple-default @0x2002 <6>[ 123.519983] ok 9 maple-default @0x2003 <6>[ 123.528142] ok 10 maple-default @0x2004 <6>[ 123.528585] # cache_drop_all_and_sync_has_defaults: pass:10 fail:0 skip:0 total:10 <6>[ 123.529032] ok 25 cache_drop_all_and_sync_has_defaults <6>[ 123.529539] KTAP version 1 <6>[ 123.530424] # Subtest: cache_present <6>[ 123.535697] ok 1 rbtree-default @0x0 <6>[ 123.540830] ok 2 rbtree-default @0x2001 <6>[ 123.546645] ok 3 rbtree-default @0x2002 <6>[ 123.551878] ok 4 rbtree-default @0x2003 <6>[ 123.557368] ok 5 rbtree-default @0x2004 <6>[ 123.562884] ok 6 maple-default @0x0 <6>[ 123.568728] ok 7 maple-default @0x2001 <6>[ 123.574643] ok 8 maple-default @0x2002 <6>[ 123.581390] ok 9 maple-default @0x2003 <6>[ 123.587262] ok 10 maple-default @0x2004 <6>[ 123.587532] # cache_present: pass:10 fail:0 skip:0 total:10 <6>[ 123.587755] ok 26 cache_present <6>[ 123.588088] KTAP version 1 <6>[ 123.588399] # Subtest: cache_range_window_reg <6>[ 123.595780] ok 1 flat-default @0x0 <6>[ 123.601219] ok 2 rbtree-default @0x0 <6>[ 123.607169] ok 3 maple-default @0x0 <6>[ 123.607485] # cache_range_window_reg: pass:3 fail:0 skip:0 total:3 <6>[ 123.607814] ok 27 cache_range_window_reg <6>[ 123.608352] KTAP version 1 <6>[ 123.608675] # Subtest: raw_read_defaults_single <4>[ 123.613564] regmap_test raw_read_defaults_single.regmap_test: No cache used with register defaults set! <6>[ 123.619268] ok 1 none-little @0x0 <4>[ 123.621407] regmap_test raw_read_defaults_single.regmap_test: No cache used with register defaults set! <6>[ 123.625264] ok 2 none-big @0x0 <6>[ 123.632761] ok 3 flat-little @0x0 <6>[ 123.639854] ok 4 flat-big @0x0 <6>[ 123.644930] ok 5 rbtree-little @0x0 <6>[ 123.649720] ok 6 rbtree-big @0x0 <6>[ 123.656231] ok 7 maple-little @0x0 <6>[ 123.661141] ok 8 maple-big @0x0 <6>[ 123.661482] # raw_read_defaults_single: pass:8 fail:0 skip:0 total:8 <6>[ 123.662656] ok 28 raw_read_defaults_single <6>[ 123.663066] KTAP version 1 <6>[ 123.663510] # Subtest: raw_read_defaults <4>[ 123.665615] regmap_test raw_read_defaults.regmap_test: No cache used with register defaults set! <6>[ 123.671048] ok 1 none-little @0x0 <4>[ 123.673363] regmap_test raw_read_defaults.regmap_test: No cache used with register defaults set! <6>[ 123.677434] ok 2 none-big @0x0 <6>[ 123.685081] ok 3 flat-little @0x0 <6>[ 123.692875] ok 4 flat-big @0x0 <6>[ 123.698483] ok 5 rbtree-little @0x0 <6>[ 123.703222] ok 6 rbtree-big @0x0 <6>[ 123.708309] ok 7 maple-little @0x0 <6>[ 123.713508] ok 8 maple-big @0x0 <6>[ 123.714692] # raw_read_defaults: pass:8 fail:0 skip:0 total:8 <6>[ 123.714986] ok 29 raw_read_defaults <6>[ 123.715439] KTAP version 1 <6>[ 123.715886] # Subtest: raw_write_read_single <4>[ 123.718349] regmap_test raw_write_read_single.regmap_test: No cache used with register defaults set! <6>[ 123.723527] ok 1 none-little @0x0 <4>[ 123.725753] regmap_test raw_write_read_single.regmap_test: No cache used with register defaults set! <6>[ 123.729844] ok 2 none-big @0x0 <6>[ 123.737644] ok 3 flat-little @0x0 <6>[ 123.744517] ok 4 flat-big @0x0 <6>[ 123.750653] ok 5 rbtree-little @0x0 <6>[ 123.755668] ok 6 rbtree-big @0x0 <6>[ 123.761212] ok 7 maple-little @0x0 <6>[ 123.766161] ok 8 maple-big @0x0 <6>[ 123.766453] # raw_write_read_single: pass:8 fail:0 skip:0 total:8 <6>[ 123.766710] ok 30 raw_write_read_single <6>[ 123.767073] KTAP version 1 <6>[ 123.767445] # Subtest: raw_write <4>[ 123.770104] regmap_test raw_write.regmap_test: No cache used with register defaults set! <6>[ 123.774971] ok 1 none-little @0x0 <4>[ 123.777079] regmap_test raw_write.regmap_test: No cache used with register defaults set! <6>[ 123.781002] ok 2 none-big @0x0 <6>[ 123.787040] ok 3 flat-little @0x0 <6>[ 123.793351] ok 4 flat-big @0x0 <6>[ 123.799493] ok 5 rbtree-little @0x0 <6>[ 123.804862] ok 6 rbtree-big @0x0 <6>[ 123.809705] ok 7 maple-little @0x0 <6>[ 123.815360] ok 8 maple-big @0x0 <6>[ 123.815647] # raw_write: pass:8 fail:0 skip:0 total:8 <6>[ 123.815939] ok 31 raw_write <6>[ 123.816260] KTAP version 1 <6>[ 123.816628] # Subtest: raw_noinc_write <4>[ 123.819047] regmap_test raw_noinc_write.regmap_test: No cache used with register defaults set! <6>[ 123.823674] ok 1 none-little @0x0 <4>[ 123.827773] regmap_test raw_noinc_write.regmap_test: No cache used with register defaults set! <6>[ 123.831865] ok 2 none-big @0x0 <6>[ 123.838533] ok 3 flat-little @0x0 <6>[ 123.845760] ok 4 flat-big @0x0 <6>[ 123.851075] ok 5 rbtree-little @0x0 <6>[ 123.856424] ok 6 rbtree-big @0x0 <6>[ 123.862518] ok 7 maple-little @0x0 <6>[ 123.867625] ok 8 maple-big @0x0 <6>[ 123.867892] # raw_noinc_write: pass:8 fail:0 skip:0 total:8 <6>[ 123.868134] ok 32 raw_noinc_write <6>[ 123.868490] KTAP version 1 <6>[ 123.868869] # Subtest: raw_sync <6>[ 123.876008] ok 1 flat-little @0x0 <6>[ 123.882988] ok 2 flat-big @0x0 <6>[ 123.888683] ok 3 rbtree-little @0x0 <6>[ 123.894093] ok 4 rbtree-big @0x0 <6>[ 123.899621] ok 5 maple-little @0x0 <6>[ 123.904526] ok 6 maple-big @0x0 <6>[ 123.904845] # raw_sync: pass:6 fail:0 skip:0 total:6 <6>[ 123.905096] ok 33 raw_sync <6>[ 123.905401] KTAP version 1 <6>[ 123.905732] # Subtest: raw_ranges <6>[ 123.914671] ok 1 flat-little @0x0 <6>[ 123.921413] ok 2 flat-big @0x0 <6>[ 123.927456] ok 3 rbtree-little @0x0 <6>[ 123.932661] ok 4 rbtree-big @0x0 <6>[ 123.938466] ok 5 maple-little @0x0 <6>[ 123.944173] ok 6 maple-big @0x0 <6>[ 123.944497] # raw_ranges: pass:6 fail:0 skip:0 total:6 <6>[ 123.944752] ok 34 raw_ranges <6>[ 123.945069] # regmap: pass:34 fail:0 skip:0 total:34 <6>[ 123.945304] # Totals: pass:294 fail:0 skip:0 total:294 <6>[ 123.945604] ok 67 regmap <6>[ 123.946553] KTAP version 1 <6>[ 123.946740] # Subtest: property-entry <6>[ 123.946974] # module: property_entry_test <6>[ 123.947056] 1..7 <6>[ 123.952104] ok 1 pe_test_uints <6>[ 123.956310] ok 2 pe_test_uint_arrays <6>[ 123.960613] ok 3 pe_test_strings <6>[ 123.964207] ok 4 pe_test_bool <6>[ 123.966777] ok 5 pe_test_move_inline_u8 <6>[ 123.969215] ok 6 pe_test_move_inline_str <6>[ 123.974232] ok 7 pe_test_reference <6>[ 123.974474] # property-entry: pass:7 fail:0 skip:0 total:7 <6>[ 123.974684] # Totals: pass:7 fail:0 skip:0 total:7 <6>[ 123.974942] ok 68 property-entry <6>[ 123.975675] KTAP version 1 <6>[ 123.975905] # Subtest: scsi_lib <6>[ 123.976145] # module: scsi_mod <6>[ 123.976259] 1..1 <6>[ 123.980973] ok 1 scsi_lib_test_check_passthough <6>[ 123.981103] ok 69 scsi_lib <6>[ 123.981754] KTAP version 1 <6>[ 123.982170] # Subtest: scsi_proto <6>[ 123.982413] # module: scsi_proto_test <6>[ 123.982493] 1..1 <6>[ 123.984846] ok 1 test_scsi_proto <6>[ 123.985048] ok 70 scsi_proto <6>[ 123.985800] KTAP version 1 <6>[ 123.986505] # Subtest: input_core <6>[ 123.986732] # module: input_test <6>[ 123.986835] 1..4 <6>[ 123.990252] input: Test input device as /devices/virtual/input/input1 <6>[ 124.000843] ok 1 input_test_polling <6>[ 124.004182] input: Test input device as /devices/virtual/input/input2 <6>[ 124.010212] ok 2 input_test_timestamp <6>[ 124.012247] input: Test input device as /devices/virtual/input/input3 <6>[ 124.018911] ok 3 input_test_match_device_id <6>[ 124.020860] input: Test input device as /devices/virtual/input/input4 <6>[ 124.027623] ok 4 input_test_grab <6>[ 124.027713] # input_core: pass:4 fail:0 skip:0 total:4 <6>[ 124.028006] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 124.028363] ok 71 input_core <6>[ 124.029027] KTAP version 1 <6>[ 124.029245] # Subtest: rtc_lib_test_cases <6>[ 124.029497] # module: lib_test <6>[ 124.029585] 1..2 <6>[ 124.102994] ok 1 rtc_time64_to_tm_test_date_range_1000 <6>[ 138.202933] # rtc_time64_to_tm_test_date_range_160000.speed: slow <6>[ 138.203384] ok 2 rtc_time64_to_tm_test_date_range_160000 <6>[ 138.203784] # rtc_lib_test_cases: pass:2 fail:0 skip:0 total:2 <6>[ 138.204151] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 138.204486] ok 72 rtc_lib_test_cases <6>[ 138.205335] KTAP version 1 <6>[ 138.205556] # Subtest: of_dtb <6>[ 138.205769] # module: of_test <6>[ 138.205988] 1..2 <6>[ 138.208359] ok 1 of_dtb_root_node_found_by_path <6>[ 138.210456] ok 2 of_dtb_root_node_populates_of_root <6>[ 138.210759] # of_dtb: pass:2 fail:0 skip:0 total:2 <6>[ 138.211028] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 138.211264] ok 73 of_dtb <6>[ 138.212100] KTAP version 1 <6>[ 138.212306] # Subtest: cros_ec_proto_test <6>[ 138.212545] # module: cros_kunit_proto_test <6>[ 138.212627] 1..54 <6>[ 138.216166] ok 1 cros_ec_proto_test_prepare_tx_legacy_normal <6>[ 138.218406] ok 2 cros_ec_proto_test_prepare_tx_legacy_bad_msg_outsize <6>[ 138.221333] ok 3 cros_ec_proto_test_prepare_tx_normal <6>[ 138.224368] ok 4 cros_ec_proto_test_prepare_tx_bad_msg_outsize <6>[ 138.226777] ok 5 cros_ec_proto_test_check_result <6>[ 138.232915] ok 6 cros_ec_proto_test_query_all_normal <3>[ 138.235039] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.236995] ok 7 cros_ec_proto_test_query_all_no_pd_return_error <3>[ 138.238990] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.240997] ok 8 cros_ec_proto_test_query_all_no_pd_return0 <3>[ 138.242783] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.245211] ok 9 cros_ec_proto_test_query_all_legacy_normal_v3_return_error <3>[ 138.246961] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.249199] ok 10 cros_ec_proto_test_query_all_legacy_normal_v3_return0 <6>[ 138.252055] ok 11 cros_ec_proto_test_query_all_legacy_xfer_error <3>[ 138.253775] cros_ec_proto_test: EC responded to v2 hello with error: 1 <6>[ 138.256476] ok 12 cros_ec_proto_test_query_all_legacy_return_error <3>[ 138.257723] cros_ec_proto_test: EC responded to v2 hello with bad result: 3203383231 <6>[ 138.260058] ok 13 cros_ec_proto_test_query_all_legacy_data_error <6>[ 138.263803] ok 14 cros_ec_proto_test_query_all_legacy_return0 <3>[ 138.265685] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.268264] ok 15 cros_ec_proto_test_query_all_no_mkbp <3>[ 138.269795] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.272201] ok 16 cros_ec_proto_test_query_all_no_mkbp_return_error <3>[ 138.273702] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.276213] ok 17 cros_ec_proto_test_query_all_no_mkbp_return0 <3>[ 138.278606] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.281057] ok 18 cros_ec_proto_test_query_all_no_host_sleep <3>[ 138.282919] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.285318] ok 19 cros_ec_proto_test_query_all_no_host_sleep_return0 <6>[ 138.290330] ok 20 cros_ec_proto_test_query_all_default_wake_mask_return_error <3>[ 138.292642] cros_ec_proto_test: failed to retrieve wake mask: -71 <6>[ 138.295566] ok 21 cros_ec_proto_test_query_all_default_wake_mask_return0 <6>[ 138.298294] ok 22 cros_ec_proto_test_cmd_xfer_normal <6>[ 138.300875] ok 23 cros_ec_proto_test_cmd_xfer_excess_msg_insize <3>[ 138.302539] cros_ec_proto_test: request of size 256 is too big (max: 255) <6>[ 138.304176] ok 24 cros_ec_proto_test_cmd_xfer_excess_msg_outsize_without_passthru <3>[ 138.305306] cros_ec_proto_test: passthru rq of size 222 is too big (max: 221) <6>[ 138.307449] ok 25 cros_ec_proto_test_cmd_xfer_excess_msg_outsize_with_passthru <6>[ 138.309593] ok 26 cros_ec_proto_test_cmd_xfer_protocol_v3_normal <3>[ 138.311187] cros_ec_proto_test: missing EC transfer API, cannot send command <6>[ 138.312698] ok 27 cros_ec_proto_test_cmd_xfer_protocol_v3_no_op <6>[ 138.314993] ok 28 cros_ec_proto_test_cmd_xfer_protocol_v2_normal <6>[ 138.317180] ok 29 cros_ec_proto_test_cmd_xfer_protocol_v2_no_op <6>[ 138.331766] ok 30 cros_ec_proto_test_cmd_xfer_in_progress_normal <6>[ 138.899458] ok 31 cros_ec_proto_test_cmd_xfer_in_progress_retries_eagain <6>[ 139.485660] ok 32 cros_ec_proto_test_cmd_xfer_in_progress_retries_status_processing <6>[ 139.503931] ok 33 cros_ec_proto_test_cmd_xfer_in_progress_xfer_error <6>[ 139.523994] ok 34 cros_ec_proto_test_cmd_xfer_in_progress_return_error <6>[ 139.541282] ok 35 cros_ec_proto_test_cmd_xfer_in_progress_return0 <6>[ 139.547068] ok 36 cros_ec_proto_test_cmd_xfer_status_normal <6>[ 139.552253] ok 37 cros_ec_proto_test_cmd_xfer_status_xfer_error <6>[ 139.572294] ok 38 cros_ec_proto_test_cmd_xfer_status_return_error <6>[ 139.579280] ok 39 cros_ec_proto_test_get_next_event_no_mkbp_event <6>[ 139.584399] ok 40 cros_ec_proto_test_get_next_event_mkbp_event_ec_suspended <6>[ 139.591102] ok 41 cros_ec_proto_test_get_next_event_mkbp_event_version0 <6>[ 139.597045] ok 42 cros_ec_proto_test_get_next_event_mkbp_event_version2 <6>[ 139.603467] ok 43 cros_ec_proto_test_get_next_event_mkbp_event_host_event_rtc <6>[ 139.610402] ok 44 cros_ec_proto_test_get_next_event_mkbp_event_host_event_masked <6>[ 139.615312] ok 45 cros_ec_proto_test_get_host_event_no_mkbp_event <6>[ 139.620424] ok 46 cros_ec_proto_test_get_host_event_not_host_event <4>[ 139.622960] cros_ec_proto_test: Invalid host event size <6>[ 139.625782] ok 47 cros_ec_proto_test_get_host_event_wrong_event_size <6>[ 139.628880] ok 48 cros_ec_proto_test_get_host_event_normal <6>[ 139.632307] ok 49 cros_ec_proto_test_check_features_cached <6>[ 139.635324] ok 50 cros_ec_proto_test_check_features_not_cached <6>[ 139.638225] ok 51 cros_ec_proto_test_get_sensor_count_normal <6>[ 139.640805] ok 52 cros_ec_proto_test_get_sensor_count_xfer_error <6>[ 139.643838] ok 53 cros_ec_proto_test_get_sensor_count_legacy <6>[ 139.646935] ok 54 cros_ec_proto_test_ec_cmd <6>[ 139.647241] # cros_ec_proto_test: pass:54 fail:0 skip:0 total:54 <6>[ 139.647492] # Totals: pass:54 fail:0 skip:0 total:54 <6>[ 139.647754] ok 74 cros_ec_proto_test <6>[ 139.648467] KTAP version 1 <6>[ 139.648634] # Subtest: iio-format <6>[ 139.648797] # module: iio_test_format <6>[ 139.648897] 1..6 <6>[ 139.651684] ok 1 iio_test_iio_format_value_integer <6>[ 139.655014] ok 2 iio_test_iio_format_value_fixedpoint <6>[ 139.657454] ok 3 iio_test_iio_format_value_fractional <6>[ 139.660009] ok 4 iio_test_iio_format_value_fractional_log2 <6>[ 139.662566] ok 5 iio_test_iio_format_value_multiple <6>[ 139.665078] ok 6 iio_test_iio_format_value_integer_64 <6>[ 139.665347] # iio-format: pass:6 fail:0 skip:0 total:6 <6>[ 139.665601] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 139.666026] ok 75 iio-format <6>[ 139.666681] KTAP version 1 <6>[ 139.666850] # Subtest: iio-gain-time-scale <6>[ 139.667060] # module: iio_test_gts <6>[ 139.667155] 1..6 <6>[ 139.673691] ok 1 test_init_iio_gts_invalid <6>[ 139.680899] ok 2 test_iio_gts_find_gain_for_scale_using_time <6>[ 139.686915] ok 3 test_iio_gts_find_new_gain_sel_by_old_gain_time <6>[ 139.695860] ok 4 test_iio_find_closest_gain_low <6>[ 139.702299] ok 5 test_iio_gts_total_gain_to_scale <6>[ 139.708006] ok 6 test_iio_gts_avail_test <6>[ 139.708292] # iio-gain-time-scale: pass:6 fail:0 skip:0 total:6 <6>[ 139.708530] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 139.708795] ok 76 iio-gain-time-scale <6>[ 139.709435] KTAP version 1 <6>[ 139.709598] # Subtest: sound-core-test <6>[ 139.709778] # module: sound_kunit <6>[ 139.710014] 1..10 <6>[ 139.712408] ok 1 test_phys_format_size <6>[ 139.714535] ok 2 test_format_width <6>[ 139.716928] ok 3 test_format_endianness <6>[ 139.719397] ok 4 test_format_signed <6>[ 139.723983] ok 5 test_format_fill_silence <6>[ 139.726545] ok 6 test_playback_avail <6>[ 139.728840] ok 7 test_capture_avail <6>[ 139.730951] # test_card_set_id: Testname <6>[ 139.732282] ok 8 test_card_set_id <6>[ 139.734564] ok 9 test_pcm_format_name <6>[ 139.736651] ok 10 test_card_add_component <6>[ 139.736900] # sound-core-test: pass:10 fail:0 skip:0 total:10 <6>[ 139.737120] # Totals: pass:10 fail:0 skip:0 total:10 <6>[ 139.737370] ok 77 sound-core-test <6>[ 139.738273] KTAP version 1 <6>[ 139.738442] # Subtest: snd_soc_tplg_test <6>[ 139.738627] # module: soc_topology_test <6>[ 139.738703] 1..11 <6>[ 139.745418] ok 1 snd_soc_tplg_test_load_with_null_comp <6>[ 139.750459] ok 2 snd_soc_tplg_test_load_with_null_ops <6>[ 139.755372] ok 3 snd_soc_tplg_test_load_with_null_fw <6>[ 139.760463] ok 4 snd_soc_tplg_test_load_empty_tplg <6>[ 139.765285] ok 5 snd_soc_tplg_test_load_empty_tplg_bad_magic <6>[ 139.770681] ok 6 snd_soc_tplg_test_load_empty_tplg_bad_abi <6>[ 139.775345] ok 7 snd_soc_tplg_test_load_empty_tplg_bad_size <6>[ 139.781500] ok 8 snd_soc_tplg_test_load_empty_tplg_bad_payload_size <6>[ 139.788227] ok 9 snd_soc_tplg_test_load_pcm_tplg <6>[ 139.795002] ok 10 snd_soc_tplg_test_load_pcm_tplg_reload_comp <6>[ 139.800493] ok 11 snd_soc_tplg_test_load_pcm_tplg_reload_card <6>[ 139.800801] # snd_soc_tplg_test: pass:11 fail:0 skip:0 total:11 <6>[ 139.801070] # Totals: pass:11 fail:0 skip:0 total:11 <6>[ 139.801332] ok 78 snd_soc_tplg_test <6>[ 139.802139] KTAP version 1 <6>[ 139.802378] # Subtest: soc-card <6>[ 139.802572] # module: soc_card_test <6>[ 139.802650] 1..2 <6>[ 139.822963] ok 1 test_snd_soc_card_get_kcontrol <6>[ 139.834405] ok 2 test_snd_soc_card_get_kcontrol_locked <6>[ 139.834794] # soc-card: pass:2 fail:0 skip:0 total:2 <6>[ 139.835185] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 139.835441] ok 79 soc-card <6>[ 139.836055] KTAP version 1 <6>[ 139.836236] # Subtest: soc-utils <6>[ 139.836411] # module: soc_utils_test <6>[ 139.836489] 1..2 <6>[ 139.839800] ok 1 test_tdm_params_to_bclk <6>[ 139.842492] ok 2 test_snd_soc_params_to_bclk <6>[ 139.842737] # soc-utils: pass:2 fail:0 skip:0 total:2 <6>[ 139.842962] # Totals: pass:2 fail:0 skip:0 total:2 <6>[ 139.843229] ok 80 soc-utils <6>[ 139.843891] KTAP version 1 <6>[ 139.844053] # Subtest: snd-soc-cs-amp-lib-test <6>[ 139.844278] # module: snd_soc_cs_amp_lib_test <6>[ 139.844356] 1..14 <3>[ 139.857342] platform cs_amp_lib_test_drv: EFI cal variable truncated <6>[ 139.860633] ok 1 cs_amp_lib_test_cal_data_too_short_test <3>[ 139.874140] platform cs_amp_lib_test_drv: EFI cal variable truncated <3>[ 139.875267] platform cs_amp_lib_test_drv: Failed to read calibration data from EFI: -75 <6>[ 139.879381] ok 2 cs_amp_lib_test_cal_count_too_big_test <6>[ 139.892113] ok 3 cs_amp_lib_test_no_cal_data_test <4>[ 139.904201] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xbadca100babababa <6>[ 139.906745] ok 4 cs_amp_lib_test_get_efi_cal_uid_not_found_noindex_test <4>[ 139.917806] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xbadca100babababa <6>[ 139.920569] ok 5 cs_amp_lib_test_get_efi_cal_uid_not_found_index_not_found_test <4>[ 139.931384] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x0 <6>[ 139.934405] ok 6 cs_amp_lib_test_get_efi_cal_no_uid_index_not_found_test <4>[ 139.945261] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x0 <6>[ 139.947791] ok 7 cs_amp_lib_test_get_efi_cal_no_uid_no_index_test <4>[ 139.959818] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x0 <6>[ 139.962950] ok 8 cs_amp_lib_test_get_efi_cal_zero_not_matched_test <6>[ 139.963081] KTAP version 1 <6>[ 139.963474] # Subtest: cs_amp_lib_test_get_efi_cal_by_uid_test <6>[ 139.977452] ok 1 num_amps:2 amp_index:0 <6>[ 139.990523] ok 2 num_amps:2 amp_index:1 <6>[ 140.003580] ok 3 num_amps:3 amp_index:0 <6>[ 140.015965] ok 4 num_amps:3 amp_index:1 <6>[ 140.030227] ok 5 num_amps:3 amp_index:2 <6>[ 140.043313] ok 6 num_amps:4 amp_index:0 <6>[ 140.056083] ok 7 num_amps:4 amp_index:1 <6>[ 140.068538] ok 8 num_amps:4 amp_index:2 <6>[ 140.081282] ok 9 num_amps:4 amp_index:3 <6>[ 140.094866] ok 10 num_amps:5 amp_index:0 <6>[ 140.107991] ok 11 num_amps:5 amp_index:1 <6>[ 140.121178] ok 12 num_amps:5 amp_index:2 <6>[ 140.134243] ok 13 num_amps:5 amp_index:3 <6>[ 140.147145] ok 14 num_amps:5 amp_index:4 <6>[ 140.160364] ok 15 num_amps:6 amp_index:0 <6>[ 140.172878] ok 16 num_amps:6 amp_index:1 <6>[ 140.186552] ok 17 num_amps:6 amp_index:2 <6>[ 140.199724] ok 18 num_amps:6 amp_index:3 <6>[ 140.213795] ok 19 num_amps:6 amp_index:4 <6>[ 140.227434] ok 20 num_amps:6 amp_index:5 <6>[ 140.245668] ok 21 num_amps:8 amp_index:0 <6>[ 140.258686] ok 22 num_amps:8 amp_index:1 <6>[ 140.271369] ok 23 num_amps:8 amp_index:2 <6>[ 140.284199] ok 24 num_amps:8 amp_index:3 <6>[ 140.296807] ok 25 num_amps:8 amp_index:4 <6>[ 140.310175] ok 26 num_amps:8 amp_index:5 <6>[ 140.323276] ok 27 num_amps:8 amp_index:6 <6>[ 140.336047] ok 28 num_amps:8 amp_index:7 <6>[ 140.336431] # cs_amp_lib_test_get_efi_cal_by_uid_test: pass:28 fail:0 skip:0 total:28 <6>[ 140.336731] ok 9 cs_amp_lib_test_get_efi_cal_by_uid_test <6>[ 140.337159] KTAP version 1 <6>[ 140.337657] # Subtest: cs_amp_lib_test_get_efi_cal_by_index_unchecked_test <6>[ 140.351367] ok 1 num_amps:2 amp_index:0 <6>[ 140.364192] ok 2 num_amps:2 amp_index:1 <6>[ 140.376886] ok 3 num_amps:3 amp_index:0 <6>[ 140.389487] ok 4 num_amps:3 amp_index:1 <6>[ 140.403014] ok 5 num_amps:3 amp_index:2 <6>[ 140.415517] ok 6 num_amps:4 amp_index:0 <6>[ 140.428147] ok 7 num_amps:4 amp_index:1 <6>[ 140.440605] ok 8 num_amps:4 amp_index:2 <6>[ 140.453554] ok 9 num_amps:4 amp_index:3 <6>[ 140.466648] ok 10 num_amps:5 amp_index:0 <6>[ 140.479580] ok 11 num_amps:5 amp_index:1 <6>[ 140.492007] ok 12 num_amps:5 amp_index:2 <6>[ 140.505648] ok 13 num_amps:5 amp_index:3 <6>[ 140.519036] ok 14 num_amps:5 amp_index:4 <6>[ 140.531800] ok 15 num_amps:6 amp_index:0 <6>[ 140.544522] ok 16 num_amps:6 amp_index:1 <6>[ 140.557317] ok 17 num_amps:6 amp_index:2 <6>[ 140.571011] ok 18 num_amps:6 amp_index:3 <6>[ 140.583829] ok 19 num_amps:6 amp_index:4 <6>[ 140.596467] ok 20 num_amps:6 amp_index:5 <6>[ 140.609543] ok 21 num_amps:8 amp_index:0 <6>[ 140.622719] ok 22 num_amps:8 amp_index:1 <6>[ 140.635853] ok 23 num_amps:8 amp_index:2 <6>[ 140.648681] ok 24 num_amps:8 amp_index:3 <6>[ 140.661667] ok 25 num_amps:8 amp_index:4 <6>[ 140.675596] ok 26 num_amps:8 amp_index:5 <6>[ 140.688061] ok 27 num_amps:8 amp_index:6 <6>[ 140.700720] ok 28 num_amps:8 amp_index:7 <6>[ 140.701014] # cs_amp_lib_test_get_efi_cal_by_index_unchecked_test: pass:28 fail:0 skip:0 total:28 <6>[ 140.701269] ok 10 cs_amp_lib_test_get_efi_cal_by_index_unchecked_test <6>[ 140.701665] KTAP version 1 <6>[ 140.702231] # Subtest: cs_amp_lib_test_get_efi_cal_by_index_checked_test <6>[ 140.715860] ok 1 num_amps:2 amp_index:0 <6>[ 140.728506] ok 2 num_amps:2 amp_index:1 <6>[ 140.742287] ok 3 num_amps:3 amp_index:0 <6>[ 140.755638] ok 4 num_amps:3 amp_index:1 <6>[ 140.768321] ok 5 num_amps:3 amp_index:2 <6>[ 140.780971] ok 6 num_amps:4 amp_index:0 <6>[ 140.794649] ok 7 num_amps:4 amp_index:1 <6>[ 140.808524] ok 8 num_amps:4 amp_index:2 <6>[ 140.821313] ok 9 num_amps:4 amp_index:3 <6>[ 140.834272] ok 10 num_amps:5 amp_index:0 <6>[ 140.847530] ok 11 num_amps:5 amp_index:1 <6>[ 140.860573] ok 12 num_amps:5 amp_index:2 <6>[ 140.874514] ok 13 num_amps:5 amp_index:3 <6>[ 140.887616] ok 14 num_amps:5 amp_index:4 <6>[ 140.900746] ok 15 num_amps:6 amp_index:0 <6>[ 140.913459] ok 16 num_amps:6 amp_index:1 <6>[ 140.927018] ok 17 num_amps:6 amp_index:2 <6>[ 140.940315] ok 18 num_amps:6 amp_index:3 <6>[ 140.953079] ok 19 num_amps:6 amp_index:4 <6>[ 140.966593] ok 20 num_amps:6 amp_index:5 <6>[ 140.979743] ok 21 num_amps:8 amp_index:0 <6>[ 140.993030] ok 22 num_amps:8 amp_index:1 <6>[ 141.006374] ok 23 num_amps:8 amp_index:2 <6>[ 141.019461] ok 24 num_amps:8 amp_index:3 <6>[ 141.031945] ok 25 num_amps:8 amp_index:4 <6>[ 141.044804] ok 26 num_amps:8 amp_index:5 <6>[ 141.058270] ok 27 num_amps:8 amp_index:6 <6>[ 141.071480] ok 28 num_amps:8 amp_index:7 <6>[ 141.071802] # cs_amp_lib_test_get_efi_cal_by_index_checked_test: pass:28 fail:0 skip:0 total:28 <6>[ 141.072043] ok 11 cs_amp_lib_test_get_efi_cal_by_index_checked_test <6>[ 141.072469] KTAP version 1 <6>[ 141.072917] # Subtest: cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test <4>[ 141.084198] platform cs_amp_lib_test_drv: Calibration entry 0 does not match silicon ID <4>[ 141.084773] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x131285e43a28e108 <6>[ 141.087376] ok 1 num_amps:2 amp_index:0 <4>[ 141.098348] platform cs_amp_lib_test_drv: Calibration entry 1 does not match silicon ID <4>[ 141.098922] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x8266d890f7d64e4e <6>[ 141.101097] ok 2 num_amps:2 amp_index:1 <4>[ 141.112306] platform cs_amp_lib_test_drv: Calibration entry 0 does not match silicon ID <4>[ 141.112910] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x3cfcb8ab8a63c210 <6>[ 141.115528] ok 3 num_amps:3 amp_index:0 <4>[ 141.133470] platform cs_amp_lib_test_drv: Calibration entry 1 does not match silicon ID <4>[ 141.134431] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x9e01ea83d57214eb <6>[ 141.137254] ok 4 num_amps:3 amp_index:1 <4>[ 141.149490] platform cs_amp_lib_test_drv: Calibration entry 2 does not match silicon ID <4>[ 141.150189] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x8d7efb174612e788 <6>[ 141.152496] ok 5 num_amps:3 amp_index:2 <4>[ 141.163780] platform cs_amp_lib_test_drv: Calibration entry 0 does not match silicon ID <4>[ 141.164285] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x6644cdfc3f6d8d50 <6>[ 141.166485] ok 6 num_amps:4 amp_index:0 <4>[ 141.177732] platform cs_amp_lib_test_drv: Calibration entry 1 does not match silicon ID <4>[ 141.178639] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xa698a1d4264ba231 <6>[ 141.181629] ok 7 num_amps:4 amp_index:1 <4>[ 141.197655] platform cs_amp_lib_test_drv: Calibration entry 2 does not match silicon ID <4>[ 141.198262] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x4b8406c78f49df1c <6>[ 141.200687] ok 8 num_amps:4 amp_index:2 <4>[ 141.211769] platform cs_amp_lib_test_drv: Calibration entry 3 does not match silicon ID <4>[ 141.212272] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xee177508aaff1789 <6>[ 141.214768] ok 9 num_amps:4 amp_index:3 <4>[ 141.225691] platform cs_amp_lib_test_drv: Calibration entry 0 does not match silicon ID <4>[ 141.226388] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xe7bdb6e5ed9cc4c7 <6>[ 141.228493] ok 10 num_amps:5 amp_index:0 <4>[ 141.238957] platform cs_amp_lib_test_drv: Calibration entry 1 does not match silicon ID <4>[ 141.239431] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xe7b6d4fa181a6e9a <6>[ 141.241700] ok 11 num_amps:5 amp_index:1 <4>[ 141.253433] platform cs_amp_lib_test_drv: Calibration entry 2 does not match silicon ID <4>[ 141.254099] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xda65272a597b1cf4 <6>[ 141.256385] ok 12 num_amps:5 amp_index:2 <4>[ 141.267606] platform cs_amp_lib_test_drv: Calibration entry 3 does not match silicon ID <4>[ 141.268131] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x26dfab747dbe492c <6>[ 141.270504] ok 13 num_amps:5 amp_index:3 <4>[ 141.281110] platform cs_amp_lib_test_drv: Calibration entry 4 does not match silicon ID <4>[ 141.281598] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x753c8ef400f9d1d0 <6>[ 141.283909] ok 14 num_amps:5 amp_index:4 <4>[ 141.295309] platform cs_amp_lib_test_drv: Calibration entry 0 does not match silicon ID <4>[ 141.295802] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xe5bc3611f43bb5a2 <6>[ 141.298984] ok 15 num_amps:6 amp_index:0 <4>[ 141.314808] platform cs_amp_lib_test_drv: Calibration entry 1 does not match silicon ID <4>[ 141.315445] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x92b0d72928bdd746 <6>[ 141.317764] ok 16 num_amps:6 amp_index:1 <4>[ 141.328417] platform cs_amp_lib_test_drv: Calibration entry 2 does not match silicon ID <4>[ 141.328871] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x3a742660cd4617a9 <6>[ 141.331283] ok 17 num_amps:6 amp_index:2 <4>[ 141.342698] platform cs_amp_lib_test_drv: Calibration entry 3 does not match silicon ID <4>[ 141.343284] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x10ef07658b6b1dda <6>[ 141.345372] ok 18 num_amps:6 amp_index:3 <4>[ 141.356411] platform cs_amp_lib_test_drv: Calibration entry 4 does not match silicon ID <4>[ 141.356880] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xb6a33640d58fe5ea <6>[ 141.359170] ok 19 num_amps:6 amp_index:4 <4>[ 141.370409] platform cs_amp_lib_test_drv: Calibration entry 5 does not match silicon ID <4>[ 141.370869] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x451deb0ceb2ca604 <6>[ 141.372805] ok 20 num_amps:6 amp_index:5 <4>[ 141.383695] platform cs_amp_lib_test_drv: Calibration entry 0 does not match silicon ID <4>[ 141.384152] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xfddbf83cdabe1d60 <6>[ 141.386437] ok 21 num_amps:8 amp_index:0 <4>[ 141.397364] platform cs_amp_lib_test_drv: Calibration entry 1 does not match silicon ID <4>[ 141.398022] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xbcb02344cb328bc8 <6>[ 141.400292] ok 22 num_amps:8 amp_index:1 <4>[ 141.411156] platform cs_amp_lib_test_drv: Calibration entry 2 does not match silicon ID <4>[ 141.411615] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x9289765efb5470e2 <6>[ 141.414285] ok 23 num_amps:8 amp_index:2 <4>[ 141.424854] platform cs_amp_lib_test_drv: Calibration entry 3 does not match silicon ID <4>[ 141.425308] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x7c23aadb6efe8135 <6>[ 141.427518] ok 24 num_amps:8 amp_index:3 <4>[ 141.438147] platform cs_amp_lib_test_drv: Calibration entry 4 does not match silicon ID <4>[ 141.438674] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xabb51804d94a365c <6>[ 141.440637] ok 25 num_amps:8 amp_index:4 <4>[ 141.451638] platform cs_amp_lib_test_drv: Calibration entry 5 does not match silicon ID <4>[ 141.452089] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xf608e48c48e365fb <6>[ 141.454753] ok 26 num_amps:8 amp_index:5 <4>[ 141.468721] platform cs_amp_lib_test_drv: Calibration entry 6 does not match silicon ID <4>[ 141.469179] platform cs_amp_lib_test_drv: No calibration for silicon ID 0x991c1daf21b088e2 <6>[ 141.472454] ok 27 num_amps:8 amp_index:6 <4>[ 141.482954] platform cs_amp_lib_test_drv: Calibration entry 7 does not match silicon ID <4>[ 141.483413] platform cs_amp_lib_test_drv: No calibration for silicon ID 0xfdb95d58b8b6cc5d <6>[ 141.485329] ok 28 num_amps:8 amp_index:7 <6>[ 141.485424] # cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test: pass:28 fail:0 skip:0 total:28 <6>[ 141.485670] ok 12 cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test <6>[ 141.486240] KTAP version 1 <6>[ 141.486633] # Subtest: cs_amp_lib_test_get_efi_cal_by_index_fallback_test <6>[ 141.499650] ok 1 num_amps:2 amp_index:0 <6>[ 141.512224] ok 2 num_amps:2 amp_index:1 <6>[ 141.526449] ok 3 num_amps:3 amp_index:0 <6>[ 141.539675] ok 4 num_amps:3 amp_index:1 <6>[ 141.552400] ok 5 num_amps:3 amp_index:2 <6>[ 141.565460] ok 6 num_amps:4 amp_index:0 <6>[ 141.579884] ok 7 num_amps:4 amp_index:1 <6>[ 141.593712] ok 8 num_amps:4 amp_index:2 <6>[ 141.608165] ok 9 num_amps:4 amp_index:3 <6>[ 141.621248] ok 10 num_amps:5 amp_index:0 <6>[ 141.639447] ok 11 num_amps:5 amp_index:1 <6>[ 141.652827] ok 12 num_amps:5 amp_index:2 <6>[ 141.666739] ok 13 num_amps:5 amp_index:3 <6>[ 141.687623] ok 14 num_amps:5 amp_index:4 <6>[ 141.701145] ok 15 num_amps:6 amp_index:0 <6>[ 141.715187] ok 16 num_amps:6 amp_index:1 <6>[ 141.735928] ok 17 num_amps:6 amp_index:2 <6>[ 141.749656] ok 18 num_amps:6 amp_index:3 <6>[ 141.764420] ok 19 num_amps:6 amp_index:4 <6>[ 141.784860] ok 20 num_amps:6 amp_index:5 <6>[ 141.798588] ok 21 num_amps:8 amp_index:0 <6>[ 141.817011] ok 22 num_amps:8 amp_index:1 <6>[ 141.830876] ok 23 num_amps:8 amp_index:2 <6>[ 141.847896] ok 24 num_amps:8 amp_index:3 <6>[ 141.860683] ok 25 num_amps:8 amp_index:4 <6>[ 141.878655] ok 26 num_amps:8 amp_index:5 <6>[ 141.891385] ok 27 num_amps:8 amp_index:6 <6>[ 141.907262] ok 28 num_amps:8 amp_index:7 <6>[ 141.907579] # cs_amp_lib_test_get_efi_cal_by_index_fallback_test: pass:28 fail:0 skip:0 total:28 <6>[ 141.907986] ok 13 cs_amp_lib_test_get_efi_cal_by_index_fallback_test <6>[ 141.922385] ok 14 cs_amp_lib_test_write_cal_data_test <6>[ 141.922788] # snd-soc-cs-amp-lib-test: pass:14 fail:0 skip:0 total:14 <6>[ 141.923018] # Totals: pass:149 fail:0 skip:0 total:149 <6>[ 141.923256] ok 81 snd-soc-cs-amp-lib-test <6>[ 141.924085] KTAP version 1 <6>[ 141.924265] # Subtest: dev-addr-list-test <6>[ 141.924482] # module: dev_addr_lists_test <6>[ 141.924565] 1..6 <6>[ 141.976329] ok 1 dev_addr_test_basic <6>[ 142.026999] ok 2 dev_addr_test_sync_one <6>[ 142.083900] ok 3 dev_addr_test_add_del <6>[ 142.132701] ok 4 dev_addr_test_del_main <6>[ 142.193362] ok 5 dev_addr_test_add_set <6>[ 142.248340] ok 6 dev_addr_test_add_excl <6>[ 142.249113] # dev-addr-list-test: pass:6 fail:0 skip:0 total:6 <6>[ 142.249708] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 142.250782] ok 82 dev-addr-list-test <6>[ 142.252508] KTAP version 1 <6>[ 142.252967] # Subtest: net_core <6>[ 142.253369] # module: net_test <6>[ 142.253541] 1..2 <6>[ 142.254762] KTAP version 1 <6>[ 142.255237] # Subtest: gso_test_func <6>[ 142.268465] ok 1 no_gso <6>[ 142.273597] ok 2 linear <6>[ 142.280184] ok 3 frags <6>[ 142.284726] ok 4 frags_pure <6>[ 142.290518] ok 5 gso_partial <6>[ 142.298575] ok 6 frag_list <6>[ 142.303713] ok 7 frag_list_pure <6>[ 142.309219] ok 8 frag_list_non_uniform <6>[ 142.318629] ok 9 gso_by_frags <6>[ 142.319170] # gso_test_func: pass:9 fail:0 skip:0 total:9 <6>[ 142.319673] ok 1 gso_test_func <6>[ 142.320388] KTAP version 1 <6>[ 142.321139] # Subtest: ip_tunnel_flags_test_run <6>[ 142.325560] ok 1 compat <6>[ 142.330587] ok 2 conflict <6>[ 142.335209] ok 3 new <6>[ 142.335869] # ip_tunnel_flags_test_run: pass:3 fail:0 skip:0 total:3 <6>[ 142.336520] ok 2 ip_tunnel_flags_test_run <6>[ 142.337519] # net_core: pass:2 fail:0 skip:0 total:2 <6>[ 142.338763] # Totals: pass:12 fail:0 skip:0 total:12 <6>[ 142.339458] ok 83 net_core <6>[ 142.340916] KTAP version 1 <6>[ 142.341190] # Subtest: RFC 3961 tests <6>[ 142.341505] 1..1 <6>[ 142.342633] KTAP version 1 <6>[ 142.342897] # Subtest: RFC 3961 n-fold <6>[ 142.346333] ok 1 64-fold("012345") <6>[ 142.349138] ok 2 56-fold("password") <6>[ 142.352344] ok 3 64-fold("Rough Consensus, and Running Code") <6>[ 142.355621] ok 4 168-fold("password") <6>[ 142.359054] ok 5 192-fold("MASSACHVSETTS INSTITVTE OF TECHNOLOGY") <6>[ 142.361612] ok 6 168-fold("Q") <6>[ 142.364462] ok 7 168-fold("ba") <6>[ 142.368635] ok 8 64-fold("kerberos") <6>[ 142.371679] ok 9 128-fold("kerberos") <6>[ 142.374826] ok 10 168-fold("kerberos") <6>[ 142.377552] ok 11 256-fold("kerberos") <6>[ 142.378193] # RFC 3961 n-fold: pass:11 fail:0 skip:0 total:11 <6>[ 142.378487] ok 1 RFC 3961 n-fold <6>[ 142.378978] # Totals: pass:11 fail:0 skip:0 total:11 <6>[ 142.379249] ok 84 RFC 3961 tests <6>[ 142.380020] KTAP version 1 <6>[ 142.380198] # Subtest: RFC 3962 suite <6>[ 142.380476] 1..1 <6>[ 142.380688] KTAP version 1 <6>[ 142.381033] # Subtest: RFC 3962 encryption <6>[ 142.387602] ok 1 Encrypt with aes128-cts-hmac-sha1-96 case 1 <6>[ 142.390852] ok 2 Encrypt with aes128-cts-hmac-sha1-96 case 2 <6>[ 142.393686] ok 3 Encrypt with aes128-cts-hmac-sha1-96 case 3 <6>[ 142.398384] ok 4 Encrypt with aes128-cts-hmac-sha1-96 case 4 <6>[ 142.401396] ok 5 Encrypt with aes128-cts-hmac-sha1-96 case 5 <6>[ 142.404991] ok 6 Encrypt with aes128-cts-hmac-sha1-96 case 6 <6>[ 142.405514] # RFC 3962 encryption: pass:6 fail:0 skip:0 total:6 <6>[ 142.406157] ok 1 RFC 3962 encryption <6>[ 142.406411] # Totals: pass:6 fail:0 skip:0 total:6 <6>[ 142.406594] ok 85 RFC 3962 suite <6>[ 142.407124] KTAP version 1 <6>[ 142.407292] # Subtest: RFC 6803 suite <6>[ 142.407464] 1..3 <6>[ 142.407627] KTAP version 1 <6>[ 142.407813] # Subtest: RFC 6803 key derivation <6>[ 142.410335] ok 1 Derive Kc subkey for camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.412286] ok 2 Derive Ke subkey for camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.414519] ok 3 Derive Ki subkey for camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.416722] ok 4 Derive Kc subkey for camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.419266] ok 5 Derive Ke subkey for camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.421362] ok 6 Derive Ki subkey for camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.422039] # RFC 6803 key derivation: pass:0 fail:0 skip:6 total:6 <6>[ 142.422540] ok 1 RFC 6803 key derivation # SKIP <6>[ 142.422974] KTAP version 1 <6>[ 142.423521] # Subtest: RFC 6803 checksum <6>[ 142.425348] ok 1 camellia128-cts-cmac checksum test 1 # SKIP Encryption type is not available <6>[ 142.427432] ok 2 camellia128-cts-cmac checksum test 2 # SKIP Encryption type is not available <6>[ 142.429530] ok 3 camellia256-cts-cmac checksum test 3 # SKIP Encryption type is not available <6>[ 142.432335] ok 4 camellia256-cts-cmac checksum test 4 # SKIP Encryption type is not available <6>[ 142.432743] # RFC 6803 checksum: pass:0 fail:0 skip:4 total:4 <6>[ 142.433109] ok 2 RFC 6803 checksum # SKIP <6>[ 142.433426] KTAP version 1 <6>[ 142.433771] # Subtest: RFC 6803 encryption <6>[ 142.436312] ok 1 Encrypt empty plaintext with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.438659] ok 2 Encrypt 1 byte with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.440956] ok 3 Encrypt 9 bytes with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.443668] ok 4 Encrypt 13 bytes with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.446051] ok 5 Encrypt 30 bytes with camellia128-cts-cmac # SKIP Encryption type is not available <6>[ 142.448194] ok 6 Encrypt empty plaintext with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.450895] ok 7 Encrypt 1 byte with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.453025] ok 8 Encrypt 9 bytes with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.455653] ok 9 Encrypt 13 bytes with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.457688] ok 10 Encrypt 30 bytes with camellia256-cts-cmac # SKIP Encryption type is not available <6>[ 142.458424] # RFC 6803 encryption: pass:0 fail:0 skip:10 total:10 <6>[ 142.458891] ok 3 RFC 6803 encryption # SKIP <6>[ 142.459182] # RFC 6803 suite: pass:0 fail:0 skip:3 total:3 <6>[ 142.459477] # Totals: pass:0 fail:0 skip:20 total:20 <6>[ 142.459726] ok 86 RFC 6803 suite # SKIP <6>[ 142.460370] KTAP version 1 <6>[ 142.460532] # Subtest: RFC 8009 suite <6>[ 142.460771] 1..3 <6>[ 142.460971] KTAP version 1 <6>[ 142.461172] # Subtest: RFC 8009 key derivation <6>[ 142.463386] ok 1 Derive Kc subkey for aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.465349] ok 2 Derive Ke subkey for aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.467930] ok 3 Derive Ki subkey for aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.470665] ok 4 Derive Kc subkey for aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.472553] ok 5 Derive Ke subkey for aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.475078] ok 6 Derive Ki subkey for aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.475497] # RFC 8009 key derivation: pass:0 fail:0 skip:6 total:6 <6>[ 142.475852] ok 1 RFC 8009 key derivation # SKIP <6>[ 142.476160] KTAP version 1 <6>[ 142.476512] # Subtest: RFC 8009 checksum <6>[ 142.478720] ok 1 Checksum with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.480746] ok 2 Checksum with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.481290] # RFC 8009 checksum: pass:0 fail:0 skip:2 total:2 <6>[ 142.481783] ok 2 RFC 8009 checksum # SKIP <6>[ 142.482373] KTAP version 1 <6>[ 142.482822] # Subtest: RFC 8009 encryption <6>[ 142.484724] ok 1 Encrypt empty plaintext with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.487264] ok 2 Encrypt short plaintext with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.489545] ok 3 Encrypt block plaintext with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.492355] ok 4 Encrypt long plaintext with aes128-cts-hmac-sha256-128 # SKIP Encryption type is not available <6>[ 142.494894] ok 5 Encrypt empty plaintext with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.496962] ok 6 Encrypt short plaintext with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.499448] ok 7 Encrypt block plaintext with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.501558] ok 8 Encrypt long plaintext with aes256-cts-hmac-sha384-192 # SKIP Encryption type is not available <6>[ 142.502414] # RFC 8009 encryption: pass:0 fail:0 skip:8 total:8 <6>[ 142.502974] ok 3 RFC 8009 encryption # SKIP <6>[ 142.503327] # RFC 8009 suite: pass:0 fail:0 skip:3 total:3 <6>[ 142.503642] # Totals: pass:0 fail:0 skip:16 total:16 <6>[ 142.503954] ok 87 RFC 8009 suite # SKIP <6>[ 142.504585] KTAP version 1 <6>[ 142.504756] # Subtest: Encryption test suite <6>[ 142.504981] 1..1 <6>[ 142.505176] KTAP version 1 <6>[ 142.505377] # Subtest: Encryption self-tests <6>[ 142.509766] ok 1 aes128-cts-hmac-sha1-96 encryption self-test <6>[ 142.512234] ok 2 aes256-cts-hmac-sha1-96 encryption self-test <6>[ 142.514623] ok 3 camellia128-cts-cmac encryption self-test # SKIP Encryption type is not available <6>[ 142.516731] ok 4 camellia256-cts-cmac encryption self-test # SKIP Encryption type is not available <6>[ 142.519435] ok 5 aes128-cts-hmac-sha256-128 encryption self-test # SKIP Encryption type is not available <6>[ 142.521502] ok 6 aes256-cts-hmac-sha384-192 encryption self-test # SKIP Encryption type is not available <6>[ 142.522224] # Encryption self-tests: pass:2 fail:0 skip:4 total:6 <6>[ 142.522600] ok 1 Encryption self-tests <6>[ 142.522888] # Totals: pass:2 fail:0 skip:4 total:6 <6>[ 142.523110] ok 88 Encryption test suite <6>[ 142.523725] KTAP version 1 <6>[ 142.523938] # Subtest: mptcp-crypto <6>[ 142.524166] # module: mptcp_crypto_test <6>[ 142.524247] 1..1 <6>[ 142.528144] ok 1 mptcp_crypto_test_basic <6>[ 142.528237] ok 89 mptcp-crypto <6>[ 142.528832] KTAP version 1 <6>[ 142.528996] # Subtest: mptcp-token <6>[ 142.529169] # module: mptcp_token_test <6>[ 142.529244] 1..4 <6>[ 142.532506] ok 1 mptcp_token_test_req_basic <6>[ 142.535786] ok 2 mptcp_token_test_msk_basic <6>[ 142.538484] ok 3 mptcp_token_test_accept <6>[ 142.540981] ok 4 mptcp_token_test_destroyed <6>[ 142.541289] # mptcp-token: pass:4 fail:0 skip:0 total:4 <6>[ 142.541560] # Totals: pass:4 fail:0 skip:0 total:4 <6>[ 142.541807] ok 90 mptcp-token <6>[ 142.542678] KTAP version 1 <6>[ 142.542835] # Subtest: Handshake API tests <6>[ 142.543039] 1..11 <6>[ 142.543272] KTAP version 1 <6>[ 142.543588] # Subtest: req_alloc API fuzzing <6>[ 142.545596] ok 1 handshake_req_alloc NULL proto <6>[ 142.547834] ok 2 handshake_req_alloc CLASS_NONE <6>[ 142.549656] ok 3 handshake_req_alloc CLASS_MAX <6>[ 142.552376] ok 4 handshake_req_alloc no callbacks <6>[ 142.554770] ok 5 handshake_req_alloc no done callback <6>[ 142.556679] ok 6 handshake_req_alloc excessive privsize <6>[ 142.558879] ok 7 handshake_req_alloc all good <6>[ 142.559195] # req_alloc API fuzzing: pass:7 fail:0 skip:0 total:7 <6>[ 142.559443] ok 1 req_alloc API fuzzing <6>[ 142.565246] ok 2 req_submit NULL req arg <6>[ 142.567588] ok 3 req_submit NULL sock arg <6>[ 142.570266] ok 4 req_submit NULL sock->file <6>[ 142.574443] ok 5 req_lookup works <6>[ 142.576963] ok 6 req_submit max pending <6>[ 142.579781] ok 7 req_submit multiple <6>[ 142.582728] ok 8 req_cancel before accept <6>[ 142.585345] ok 9 req_cancel after accept <6>[ 142.589409] ok 10 req_cancel after done <6>[ 142.592677] ok 11 req_destroy works <6>[ 142.592975] # Handshake API tests: pass:11 fail:0 skip:0 total:11 <6>[ 142.593214] # Totals: pass:17 fail:0 skip:0 total:17 <6>[ 142.593507] ok 91 Handshake API tests <6>[ 142.667287] EXT4-fs (vda): mounted filesystem 1ecb727a-90fb-448f-8f58-3a043743613e r/w with ordered data mode. Quota mode: none. <6>[ 142.668620] VFS: Mounted root (ext4 filesystem) on device 254:0. <6>[ 142.672930] devtmpfs: mounted <6>[ 143.020065] Freeing unused kernel memory: 41280K <6>[ 143.022334] Run /sbin/init as init process <7>[ 143.022729] with arguments: <7>[ 143.022939] /sbin/init <7>[ 143.023126] verbose <7>[ 143.023291] with environment: <7>[ 143.023496] HOME=/ <7>[ 143.023692] TERM=linux c[!p]104[?7h Welcome to [1mDebian GNU/Linux trixie/sid[0m! [[0;32m OK [0m] Created slice [0;1;39msystem-getty.slice[0m - Slice /system/getty. [[0;32m OK [0m] Created slice [0;1;39msystem-modprobe.slice[0m - Slice /system/modprobe. [[0;32m OK [0m] Created slice [0;1;39msystem-serial\x2dget…slice[0m - Slice /system/serial-getty. [[0;32m OK [0m] Created slice [0;1;39muser.slice[0m - User and Session Slice. [[0;32m OK [0m] Started [0;1;39msystemd-ask-password-conso…[0mequests to Console Directory Watch. [[0;32m OK [0m] Started [0;1;39msystemd-ask-password-wall.…[0md Requests to Wall Directory Watch. Expecting device [0;1;39mdev-ttyAMA0.device[0m - /dev/ttyAMA0... [[0;32m OK [0m] Reached target [0;1;39mcryptsetup.target[0m - Local Encrypted Volumes. [[0;32m OK [0m] Reached target [0;1;39mintegritysetup.targ…[0m Local Integrity Protected Volumes. [[0;32m OK [0m] Reached target [0;1;39mpaths.target[0m - Path Units. [[0;32m OK [0m] Reached target [0;1;39mremote-fs.target[0m - Remote File Systems. [[0;32m OK [0m] Reached target [0;1;39mslices.target[0m - Slice Units. [[0;32m OK [0m] Reached target [0;1;39mswap.target[0m - Swaps. [[0;32m OK [0m] Reached target [0;1;39mveritysetup.target[0m - Local Verity Protected Volumes. [[0;32m OK [0m] Listening on [0;1;39msystemd-creds.socket[0m - Credential Encryption/Decryption. [[0;32m OK [0m] Listening on [0;1;39msystemd-initctl.socke…[0m- initctl Compatibility Named Pipe. [[0;32m OK [0m] Listening on [0;1;39msystemd-journald-dev-…socket[0m - Journal Socket (/dev/log). [[0;32m OK [0m] Listening on [0;1;39msystemd-journald.socket[0m - Journal Sockets. [[0;32m OK [0m] Listening on [0;1;39msystemd-udevd-control.socket[0m - udev Control Socket. [[0;32m OK [0m] Listening on [0;1;39msystemd-udevd-kernel.socket[0m - udev Kernel Socket. Mounting [0;1;39mdev-hugepages.mount[0m - Huge Pages File System... Mounting [0;1;39mdev-mqueue.mount[0m - POSIX Message Queue File System... Mounting [0;1;39mrun-lock.mount[0m - Legacy Locks Directory /run/lock... Mounting [0;1;39msys-kernel-debug.mount[0m - Kernel Debug File System... Mounting [0;1;39msys-kernel-tracing.mount[0m - Kernel Trace File System... Mounting [0;1;39mtmp.mount[0m - Temporary Directory /tmp... Starting [0;1;39mkmod-static-nodes.service[0m…eate List of Static Device Nodes... Starting [0;1;39mmodprobe@configfs.service[0m - Load Kernel Module configfs... Starting [0;1;39mmodprobe@dm_mod.service[0m - Load Kernel Module dm_mod... Starting [0;1;39mmodprobe@drm.service[0m - Load Kernel Module drm... Starting [0;1;39mmodprobe@efi_pstore.servi…[0m - Load Kernel Module efi_pstore... Starting [0;1;39mmodprobe@fuse.service[0m - Load Kernel Module fuse... Starting [0;1;39mmodprobe@loop.service[0m - Load Kernel Module loop... <6>[ 151.438945] device-mapper: ioctl: 4.48.0-ioctl (2023-03-01) initialised: dm-devel@lists.linux.dev Starting [0;1;39msystemd-journald.service[0m - Journal Service... Starting [0;1;39msystemd-modules-load.service[0m - Load Kernel Modules... Starting [0;1;39msystemd-remount-fs.servic…[0munt Root and Kernel File Systems... <6>[ 152.040080] fuse: init (API version 7.40) Starting [0;1;39msystemd-udev-load-credent…[0mLoad udev Rules from Credentials... Starting [0;1;39msystemd-udev-trigger.service[0m - Coldplug All udev Devices... [[0;32m OK [0m] Mounted [0;1;39mdev-hugepages.mount[0m - Huge Pages File System. [[0;32m OK [0m] Mounted [0;1;39mdev-mqueue.mount[0m - POSIX Message Queue File System. [[0;32m OK [0m] Mounted [0;1;39mrun-lock.mount[0m - Legacy Locks Directory /run/lock. [[0;32m OK [0m] Mounted [0;1;39msys-kernel-debug.mount[0m - Kernel Debug File System. [[0;32m OK [0m] Mounted [0;1;39msys-kernel-tracing.mount[0m - Kernel Trace File System. [[0;32m OK [0m] Mounted [0;1;39mtmp.mount[0m - Temporary Directory /tmp. [[0;32m OK [0m] Finished [0;1;39mkmod-static-nodes.service[0m…Create List of Static Device Nodes. [[0;32m OK [0m] Finished [0;1;39mmodprobe@configfs.service[0m - Load Kernel Module configfs. [[0;32m OK [0m] Finished [0;1;39mmodprobe@dm_mod.service[0m - Load Kernel Module dm_mod. [[0;32m OK [0m] Finished [0;1;39mmodprobe@drm.service[0m - Load Kernel Module drm. [[0;32m OK [0m] Finished [0;1;39mmodprobe@efi_pstore.service[0m - Load Kernel Module efi_pstore. [[0;32m OK [0m] Finished [0;1;39mmodprobe@fuse.service[0m - Load Kernel Module fuse. [[0;32m OK [0m] Finished [0;1;39mmodprobe@loop.service[0m - Load Kernel Module loop. [[0;32m OK [0m] Finished [0;1;39msystemd-modules-load.service[0m - Load Kernel Modules. [[0;32m OK [0m] Finished [0;1;39msystemd-remount-fs.servic…[0mmount Root and Kernel File Systems. [[0;32m OK [0m] Finished [0;1;39msystemd-udev-load-credent…[0m- Load udev Rules from Credentials. Mounting [0;1;39msys-fs-fuse-connections.mount[0m - FUSE Control File System... Mounting [0;1;39msys-kernel-config.mount[0m - Kernel Configuration File System... Starting [0;1;39msystemd-random-seed.service[0m - Load/Save OS Random Seed... Starting [0;1;39msystemd-sysctl.service[0m - Apply Kernel Variables... Starting [0;1;39msystemd-tmpfiles-setup-de…[0m Device Nodes in /dev gracefully... [[0;32m OK [0m] Started [0;1;39msystemd-journald.service[0m - Journal Service. [[0;32m OK [0m] Mounted [0;1;39msys-fs-fuse-connections.mount[0m - FUSE Control File System. [[0;32m OK [0m] Mounted [0;1;39msys-kernel-config.mount[0m - Kernel Configuration File System. [[0;32m OK [0m] Finished [0;1;39msystemd-random-seed.service[0m - Load/Save OS Random Seed. [[0;32m OK [0m] Finished [0;1;39msystemd-sysctl.service[0m - Apply Kernel Variables. [[0;32m OK [0m] Finished [0;1;39msystemd-tmpfiles-setup-de…[0mic Device Nodes in /dev gracefully. Starting [0;1;39msystemd-journal-flush.ser…[0msh Journal to Persistent Storage... Starting [0;1;39msystemd-sysusers.service[0m - Create System Users... [[0;32m OK [0m] Finished [0;1;39msystemd-sysusers.service[0m - Create System Users. Starting [0;1;39msystemd-tmpfiles-setup-de…[0meate Static Device Nodes in /dev... [[0;32m OK [0m] Finished [0;1;39msystemd-journal-flush.ser…[0mlush Journal to Persistent Storage. [[0;32m OK [0m] Finished [0;1;39msystemd-tmpfiles-setup-de…[0mCreate Static Device Nodes in /dev. [[0;32m OK [0m] Reached target [0;1;39mlocal-fs-pre.target[0m…Preparation for Local File Systems. [[0;32m OK [0m] Reached target [0;1;39mlocal-fs.target[0m - Local File Systems. [[0;32m OK [0m] Listening on [0;1;39msystemd-sysext.socket[0m… System Extension Image Management. Starting [0;1;39mldconfig.service[0m - Rebuild Dynamic Linker Cache... Starting [0;1;39msystemd-tmpfiles-setup.se…[0me Volatile Files and Directories... Starting [0;1;39msystemd-udevd.service[0m - R…ager for Device Events and Files... [[0;32m OK [0m] Finished [0;1;39msystemd-tmpfiles-setup.se…[0mate Volatile Files and Directories. [[0;32m OK [0m] Started [0;1;39msystemd-udevd.service[0m - Ru…anager for Device Events and Files. Starting [0;1;39msystemd-journal-catalog-u…ervice[0m - Rebuild Journal Catalog... Starting [0;1;39msystemd-update-utmp.servi…[0mord System Boot/Shutdown in UTMP... [[0;32m OK [0m] Finished [0;1;39mldconfig.service[0m - Rebuild Dynamic Linker Cache. [[0;32m OK [0m] Finished [0;1;39msystemd-update-utmp.servi…[0mecord System Boot/Shutdown in UTMP. [[0;32m OK [0m] Finished [0;1;39msystemd-journal-catalog-u….service[0m - Rebuild Journal Catalog. Starting [0;1;39msystemd-update-done.service[0m - Update is Completed... [[0;32m OK [0m] Finished [0;1;39msystemd-update-done.service[0m - Update is Completed. [[0m[0;31m* [0m] (1 of 2) Job systemd-udev-trigger.s…ice/start running (14s / no limit) M [K[[0;1;31m*[0m[0;31m* [0m] (1 of 2) Job systemd-udev-trigger.s…ice/start running (15s / no limit) M [K[[0;31m*[0;1;31m*[0m[0;31m* [0m] (1 of 2) Job systemd-udev-trigger.s…ice/start running (15s / no limit) M [K[ [0;31m*[0;1;31m*[0m[0;31m* [0m] (2 of 2) Job dev-ttyAMA0.device/start running (16s / 13min 30s) M [K[ [0;31m*[0;1;31m*[0m[0;31m* [0m] (2 of 2) Job dev-ttyAMA0.device/start running (16s / 13min 30s) M [K[ [0;31m*[0;1;31m*[0m[0;31m*[0m] (2 of 2) Job dev-ttyAMA0.device/start running (17s / 13min 30s) M [K[ [0;31m*[0;1;31m*[0m] (1 of 2) Job systemd-udev-trigger.s…ice/start running (17s / no limit) M [K[[0;32m OK [0m] Finished [0;1;39msystemd-udev-trigger.service[0m - Coldplug All udev Devices. [K[[0;32m OK [0m] Reached target [0;1;39msysinit.target[0m - System Initialization. [[0;32m OK [0m] Started [0;1;39mapt-daily.timer[0m - Daily apt download activities. [[0;32m OK [0m] Started [0;1;39mapt-daily-upgrade.timer[0m - …y apt upgrade and clean activities. [[0;32m OK [0m] Started [0;1;39mdpkg-db-backup.timer[0m - Daily dpkg database backup timer. [[0;32m OK [0m] Started [0;1;39me2scrub_all.timer[0m - Period…Metadata Check for All Filesystems. [[0;32m OK [0m] Started [0;1;39mfstrim.timer[0m - Discard unused filesystem blocks once a week. [[0;32m OK [0m] Started [0;1;39mlogrotate.timer[0m - Daily rotation of log files. [[0;32m OK [0m] Started [0;1;39msystemd-tmpfiles-clean.tim…[0my Cleanup of Temporary Directories. [[0;32m OK [0m] Reached target [0;1;39mtimers.target[0m - Timer Units. [[0;32m OK [0m] Listening on [0;1;39mdbus.socket[0m - D-Bus System Message Bus Socket. [[0;32m OK [0m] Listening on [0;1;39msystemd-hostnamed.socket[0m - Hostname Service Socket. [[0;32m OK [0m] Reached target [0;1;39msockets.target[0m - Socket Units. [[0;32m OK [0m] Reached target [0;1;39mbasic.target[0m - Basic System. [[0;32m OK [0m] Started [0;1;39mcron.service[0m - Regular background program processing daemon. Starting [0;1;39mdbus.service[0m - D-Bus System Message Bus... Starting [0;1;39me2scrub_reap.service[0m - Re…ne ext4 Metadata Check Snapshots... Starting [0;1;39msystemd-logind.service[0m - User Login Management... Starting [0;1;39msystemd-user-sessions.service[0m - Permit User Sessions... [[0;32m OK [0m] Started [0;1;39mdbus.service[0m - D-Bus System Message Bus. [[0;32m OK [0m] Found device [0;1;39mdev-ttyAMA0.device[0m - /dev/ttyAMA0. [[0;32m OK [0m] Finished [0;1;39msystemd-user-sessions.service[0m - Permit User Sessions. [[0;32m OK [0m] Finished [0;1;39me2scrub_reap.service[0m - Re…line ext4 Metadata Check Snapshots. [[0;32m OK [0m] Started [0;1;39mgetty@tty1.service[0m - Getty on tty1. [[0;32m OK [0m] Started [0;1;39mserial-getty@ttyAMA0.service[0m - Serial Getty on ttyAMA0. [[0;32m OK [0m] Reached target [0;1;39mgetty.target[0m - Login Prompts. [[0;32m OK [0m] Started [0;1;39msystemd-logind.service[0m - User Login Management. [[0;32m OK [0m] Reached target [0;1;39mmulti-user.target[0m - Multi-User System. [[0;32m OK [0m] Reached target [0;1;39mgraphical.target[0m - Graphical Interface. Starting [0;1;39msystemd-update-utmp-runle…[0m- Record Runlevel Change in UTMP... [[0;32m OK [0m] Finished [0;1;39msystemd-update-utmp-runle…e[0m - Record Runlevel Change in UTMP. Debian GNU/Linux trixie/sid runner-vwmj3eza-project-40964107-concurrent-2 ttyAMA0 runner-vwmj3eza-project-40964107-concurrent-2 login: root Linux runner-vwmj3eza-project-40964107-concurrent-2 6.10.0-rc7-00076-g9d9a2f29aefd #1 SMP PREEMPT @1720648781 aarch64 The programs included with the Debian GNU/Linux system are free software; the exact distribution terms for each program are described in the individual files in /usr/share/doc/*/copyright. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law. [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# [?2004l [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# # [?2004l [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# export SHELL=/bin/sh [?2004l [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# . /lava-1/environment [?2004l [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# /lava-1/bin/lava-test-runner /lava-1/0 [?2004l + export TESTRUN_ID=0_kunit + cd /lava-1/0/tests/0_kunit + cat uuid + UUID=1_1.1.3.1 + set +x <8>[ 181.728044] + cd ./automated/linux/kunit/ + ./kunit.sh -m kunit-test.ko INFO: Kernel config CONFIG_KUNIT_TEST=y not enabled dmesg pass _test_gfpzero pass _test_memcache_typesafe_by_rcu pass _test_krealloc pass _test_memcache_alloc_bulk pass _kfence pass binfmt_elf_total_mapping_size_test pass binfmt_elf_binfmt_elf pass compat_binfmt_elf_total_mapping_size_test pass compat_binfmt_elf_compat_binfmt_elf pass test_new_blocks_simple_block_bits10cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_new_blocks_simple_block_bits12cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_new_blocks_simple_block_bits16cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_new_blocks_simple_test_new_blocks_simple pass test_free_blocks_simple_block_bits10cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_free_blocks_simple_block_bits12cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_free_blocks_simple_block_bits16cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_free_blocks_simple_test_free_blocks_simple pass test_mb_generate_buddy_block_bits10cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_generate_buddy_block_bits12cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_generate_buddy_block_bits16cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_generate_buddy_test_mb_generate_buddy pass test_mb_mark_used_block_bits10cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_mark_used_block_bits12cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_mark_used_block_bits16cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_mark_used_test_mb_mark_used pass test_mb_free_blocks_block_bits10cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_free_blocks_block_bits12cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_free_blocks_block_bits16cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_free_blocks_test_mb_free_blocks pass test_mark_diskspace_used_block_bits10cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mark_diskspace_used_block_bits12cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mark_diskspace_used_block_bits16cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mark_diskspace_used_test_mark_diskspace_used pass test_mb_mark_used_cost_block_bits10cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_mark_used_cost_block_bits12cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_mark_used_cost_block_bits16cluster_bits3blocks_per_group8192group_count4desc_size64 pass test_mb_mark_used_cost_test_mb_mark_used_cost pass test_mb_mark_used_cost_ext4_mballoc_test pass inode_test_xtimestamp_decoding_1901-12-13Lowerboundof32bit0timestampnoextrabits pass inode_test_xtimestamp_decoding_1969-12-31Upperboundof32bit0timestampnoextrabits pass inode_test_xtimestamp_decoding_1970-01-01Lowerboundof32bit0timestampnoextrabits pass inode_test_xtimestamp_decoding_2038-01-19Upperboundof32bit0timestampnoextrabits pass inode_test_xtimestamp_decoding_2038-01-19Lowerboundof32bit0timestamploextrasecbiton pass inode_test_xtimestamp_decoding_2106-02-07Upperboundof32bit0timestamploextrasecbiton pass inode_test_xtimestamp_decoding_2106-02-07Lowerboundof32bit0timestamploextrasecbiton pass inode_test_xtimestamp_decoding_2174-02-25Upperboundof32bit0timestamploextrasecbiton pass inode_test_xtimestamp_decoding_2174-02-25Lowerboundof32bit0timestamphiextrasecbiton pass inode_test_xtimestamp_decoding_2242-03-16Upperboundof32bit0timestamphiextrasecbiton pass inode_test_xtimestamp_decoding_2242-03-16Lowerboundof32bit0timestamphiextrasecbiton pass inode_test_xtimestamp_decoding_2310-04-04Upperboundof32bit0timestamphiextrasecbiton pass inode_test_xtimestamp_decoding_2310-04-04Upperboundof32bit0timestamphiextrasecbit11ns pass inode_test_xtimestamp_decoding_2378-04-22Lowerboundof32bittimestampExtrasecbits1Maxns pass inode_test_xtimestamp_decoding_2378-04-22Lowerboundof32bit0timestampAllextrasecbitson pass inode_test_xtimestamp_decoding_2446-05-10Upperboundof32bit0timestampAllextrasecbitson pass inode_test_xtimestamp_decoding_inode_test_xtimestamp_decoding pass inode_test_xtimestamp_decoding_ext4_inode_test pass fat_test_fat_checksum_test pass fat_time_fat2unix_test_EarliestpossibleUTC1980-01-01000000 pass fat_time_fat2unix_test_LatestpossibleUTC2107-12-31235958 pass fat_time_fat2unix_test_EarliestpossibleUTC-111979-12-31130000UTC pass fat_time_fat2unix_test_LatestpossibleUTC112108-01-01105958UTC pass fat_time_fat2unix_test_LeapDayYear1996-02-29000000 pass fat_time_fat2unix_test_Year2000isleapyear2000-02-29000000 pass fat_time_fat2unix_test_Year2100notleapyear2100-03-01000000 pass fat_time_fat2unix_test_LeapyeartimezoneUTC12004-02-29003000UTC pass fat_time_fat2unix_test_LeapyeartimezoneUTC-12004-02-29233000UTC pass fat_time_fat2unix_test_VFATodd-secondresolution1999-12-31235959 pass fat_time_fat2unix_test_VFAT10msresolution1980-01-010000000010 pass fat_time_fat2unix_test_fat_time_fat2unix_test pass fat_time_unix2fat_test_EarliestpossibleUTC1980-01-01000000 pass fat_time_unix2fat_test_LatestpossibleUTC2107-12-31235958 pass fat_time_unix2fat_test_EarliestpossibleUTC-111979-12-31130000UTC pass fat_time_unix2fat_test_LatestpossibleUTC112108-01-01105958UTC pass fat_time_unix2fat_test_LeapDayYear1996-02-29000000 pass fat_time_unix2fat_test_Year2000isleapyear2000-02-29000000 pass fat_time_unix2fat_test_Year2100notleapyear2100-03-01000000 pass fat_time_unix2fat_test_LeapyeartimezoneUTC12004-02-29003000UTC pass fat_time_unix2fat_test_LeapyeartimezoneUTC-12004-02-29233000UTC pass fat_time_unix2fat_test_VFATodd-secondresolution1999-12-31235959 pass fat_time_unix2fat_test_VFAT10msresolution1980-01-010000000010 pass fat_time_unix2fat_test_fat_time_unix2fat_test pass fat_time_unix2fat_test_fat_test pass string_string_test_memset16 pass string_string_test_memset32 pass string_string_test_memset64 pass string_string_test_strchr pass string_string_test_strnchr pass string_string_test_strspn pass string_string_test_strcmp pass string_string_test_strcmp_long_strings pass string_string_test_strncmp pass string_string_test_strncmp_long_strings pass string_string_test_strcasecmp pass string_string_test_strcasecmp_long_strings pass string_string_test_strncasecmp pass string_string_test_strncasecmp_long_strings pass string_string_test_strscpy pass string_string_test_strcat pass string_string_test_strncat pass string_string_test_strlcat pass string_string_test_strtomem pass string_string_test_memtostr pass string_string pass string_helpers_test_get_size pass string_helpers_test_upper_lower pass string_helpers_test_unescape pass string_helpers_string_helpers pass cpumask_test_cpumask_weight pass cpumask_test_cpumask_first pass cpumask_test_cpumask_last pass cpumask_test_cpumask_next pass cpumask_test_cpumask_iterators pass cpumask_test_cpumask_iterators_builtin pass cpumask_cpumask pass iov_iter_iov_kunit_copy_to_kvec pass iov_iter_iov_kunit_copy_from_kvec pass iov_iter_iov_kunit_copy_to_bvec pass iov_iter_iov_kunit_copy_from_bvec pass iov_iter_iov_kunit_copy_to_xarray pass iov_iter_iov_kunit_copy_from_xarray pass iov_iter_iov_kunit_extract_pages_kvec pass iov_iter_iov_kunit_extract_pages_bvec pass iov_iter_iov_kunit_extract_pages_xarray pass iov_iter_iov_iter pass hash_test_string_or pass hash_test_hash_or pass hash_hash pass list_sort_list_sort_test pass list_sort_list_sort pass lib_sort_test_sort pass lib_sort_lib_sort pass kprobes_test_test_kprobe pass kprobes_test_test_kprobes pass kprobes_test_test_kprobe_missed pass kprobes_test_test_kretprobe pass kprobes_test_test_kretprobes pass kprobes_test_test_stacktrace_on_kretprobe pass kprobes_test_test_stacktrace_on_nested_kretprobe pass kprobes_test_kprobes_test pass kunit_executor_test_parse_filter_test pass kunit_executor_test_filter_suites_test pass kunit_executor_test_filter_suites_test_glob_test pass kunit_executor_test_filter_suites_to_empty_test pass kunit_executor_test_parse_filter_attr_test pass kunit_executor_test_filter_attr_test pass kunit_executor_test_filter_attr_empty_test pass kunit_executor_test_filter_attr_skip_test pass kunit_executor_test_kunit_executor_test pass kunit-try-catch-test_kunit_test_try_catch_successful_try_no_catch pass kunit-try-catch-test_kunit_test_try_catch_unsuccessful_try_does_catch pass kunit-try-catch-test_kunit-try-catch-test pass kunit-resource-test_kunit_resource_test_init_resources pass kunit-resource-test_kunit_resource_test_alloc_resource pass kunit-resource-test_kunit_resource_test_destroy_resource pass kunit-resource-test_kunit_resource_test_remove_resource pass kunit-resource-test_kunit_resource_test_cleanup_resources pass kunit-resource-test_kunit_resource_test_proper_free_ordering pass kunit-resource-test_kunit_resource_test_static pass kunit-resource-test_kunit_resource_test_named pass kunit-resource-test_kunit_resource_test_action pass kunit-resource-test_kunit_resource_test_remove_action pass kunit-resource-test_kunit_resource_test_release_action pass kunit-resource-test_kunit_resource_test_action_ordering pass kunit-resource-test_kunit-resource-test pass kunit-log-test_kunit_log_test pass kunit-log-test_kunit_log_newline_test pass kunit-log-test_kunit-log-test pass kunit_status_kunit_status_set_failure_test pass kunit_status_kunit_status_mark_skipped_test pass kunit_status_kunit_status pass kunit_current_kunit_current_test pass kunit_current_kunit_current_fail_test pass kunit_current_kunit_current pass kunit_device_kunit_device_test pass kunit_device_kunit_device_cleanup_test pass kunit_device_kunit_device_driver_test pass kunit_device_kunit_device pass kunit_fault_kunit_test_fault_null_dereference pass kunit_fault_kunit_fault pass string-stream-test_string_stream_managed_init_test pass string-stream-test_string_stream_unmanaged_init_test pass string-stream-test_string_stream_managed_free_test pass string-stream-test_string_stream_resource_free_test pass string-stream-test_string_stream_line_add_test pass string-stream-test_string_stream_variable_length_line_test pass string-stream-test_string_stream_append_test pass string-stream-test_string_stream_append_auto_newline_test pass string-stream-test_string_stream_append_empty_string_test pass string-stream-test_string_stream_no_auto_newline_test pass string-stream-test_string_stream_auto_newline_test pass string-stream-test_string_stream_performance_test pass string-stream-test_string-stream-test pass example_example_simple_test pass example_example_skip_test skip example_example_mark_skipped_test skip example_example_all_expect_macros_test pass example_example_static_stub_test pass example_example_static_stub_using_fn_ptr_test pass example_example_priv_test pass example_params_test_examplevalue3 skip example_params_test_examplevalue2 pass example_params_test_examplevalue1 pass example_params_test_examplevalue0 skip example_params_test_example_params_test pass example_params_test_example_slow_test pass example_params_test_example pass rational_test_Exceedsboundssemi-convergentterm12lastterm pass rational_test_Exceedsboundssemi-convergentterm12lastterm pass rational_test_Closesttozero pass rational_test_Closesttosmallestnon-zero pass rational_test_Useconvergent pass rational_test_Exactanswer pass rational_test_Semiconvergentnumeratorlimit pass rational_test_Semiconvergentdenominatorlimit pass rational_test_rational_test pass rational_test_rational pass bitfields_test_bitfields_constants pass bitfields_test_bitfields_variables pass bitfields_bitfields pass checksum_test_csum_fixed_random_inputs pass checksum_test_csum_all_carry_inputs pass checksum_test_csum_no_carry_inputs pass checksum_test_ip_fast_csum pass checksum_test_csum_ipv6_magic pass checksum_checksum pass list-kunit-test_list_test_list_init pass list-kunit-test_list_test_list_add pass list-kunit-test_list_test_list_add_tail pass list-kunit-test_list_test_list_del pass list-kunit-test_list_test_list_replace pass list-kunit-test_list_test_list_replace_init pass list-kunit-test_list_test_list_swap pass list-kunit-test_list_test_list_del_init pass list-kunit-test_list_test_list_del_init_careful pass list-kunit-test_list_test_list_move pass list-kunit-test_list_test_list_move_tail pass list-kunit-test_list_test_list_bulk_move_tail pass list-kunit-test_list_test_list_is_head pass list-kunit-test_list_test_list_is_first pass list-kunit-test_list_test_list_is_last pass list-kunit-test_list_test_list_empty pass list-kunit-test_list_test_list_empty_careful pass list-kunit-test_list_test_list_rotate_left pass list-kunit-test_list_test_list_rotate_to_front pass list-kunit-test_list_test_list_is_singular pass list-kunit-test_list_test_list_cut_position pass list-kunit-test_list_test_list_cut_before pass list-kunit-test_list_test_list_splice pass list-kunit-test_list_test_list_splice_tail pass list-kunit-test_list_test_list_splice_init pass list-kunit-test_list_test_list_splice_tail_init pass list-kunit-test_list_test_list_entry pass list-kunit-test_list_test_list_entry_is_head pass list-kunit-test_list_test_list_first_entry pass list-kunit-test_list_test_list_last_entry pass list-kunit-test_list_test_list_first_entry_or_null pass list-kunit-test_list_test_list_next_entry pass list-kunit-test_list_test_list_prev_entry pass list-kunit-test_list_test_list_for_each pass list-kunit-test_list_test_list_for_each_prev pass list-kunit-test_list_test_list_for_each_safe pass list-kunit-test_list_test_list_for_each_prev_safe pass list-kunit-test_list_test_list_for_each_entry pass list-kunit-test_list_test_list_for_each_entry_reverse pass list-kunit-test_list-kunit-test pass hlist_hlist_test_init pass hlist_hlist_test_unhashed pass hlist_hlist_test_unhashed_lockless pass hlist_hlist_test_del pass hlist_hlist_test_del_init pass hlist_hlist_test_add pass hlist_hlist_test_fake pass hlist_hlist_test_is_singular_node pass hlist_hlist_test_empty pass hlist_hlist_test_move_list pass hlist_hlist_test_entry pass hlist_hlist_test_entry_safe pass hlist_hlist_test_for_each pass hlist_hlist_test_for_each_safe pass hlist_hlist_test_for_each_entry pass hlist_hlist_test_for_each_entry_continue pass hlist_hlist_test_for_each_entry_from pass hlist_hlist_test_for_each_entry_safe pass hlist_hlist pass klist_klist_test_add_tail pass klist_klist_test_add_head pass klist_klist_test_add_behind pass klist_klist_test_add_before pass klist_klist_test_del_refcount_greater_than_zero pass klist_klist_test_del_refcount_zero pass klist_klist_test_remove pass klist_klist_test_node_attached pass klist_klist pass hashtable_hashtable_test_hash_init pass hashtable_hashtable_test_hash_empty pass hashtable_hashtable_test_hash_hashed pass hashtable_hashtable_test_hash_add pass hashtable_hashtable_test_hash_del pass hashtable_hashtable_test_hash_for_each pass hashtable_hashtable_test_hash_for_each_safe pass hashtable_hashtable_test_hash_for_each_possible pass hashtable_hashtable_test_hash_for_each_possible_safe pass hashtable_hashtable pass bits-test_genmask_test pass bits-test_genmask_ull_test pass bits-test_genmask_input_check_test pass bits-test_bits-test pass cmdline_cmdline_test_noint pass cmdline_cmdline_test_lead_int pass cmdline_cmdline_test_tail_int pass cmdline_cmdline_test_range pass cmdline_cmdline pass slub_test_test_clobber_zone pass slub_test_test_clobber_redzone_free pass slub_test_test_kmalloc_redzone_access pass slub_test_slub_test pass memcpy_memset_test pass memcpy_memcpy_test pass memcpy_memcpy_large_test pass memcpy_memmove_test pass memcpy_memmove_large_test pass memcpy_memmove_overlap_test pass memcpy_memcpy pass is_signed_type_is_signed_type_test pass is_signed_type_is_signed_type pass overflow_u8_u8__u8_overflow_test pass overflow_s8_s8__s8_overflow_test pass overflow_u16_u16__u16_overflow_test pass overflow_s16_s16__s16_overflow_test pass overflow_u32_u32__u32_overflow_test pass overflow_s32_s32__s32_overflow_test pass overflow_u64_u64__u64_overflow_test pass overflow_s64_s64__s64_overflow_test pass overflow_u32_u32__int_overflow_test pass overflow_u32_u32__u8_overflow_test pass overflow_u8_u8__int_overflow_test pass overflow_int_int__u8_overflow_test pass overflow_shift_sane_test pass overflow_shift_overflow_test pass overflow_shift_truncate_test pass overflow_shift_nonsense_test pass overflow_overflow_allocation_test pass overflow_overflow_size_helpers_test pass overflow_overflows_type_test pass overflow_same_type_test pass overflow_castable_to_type_test pass overflow_DEFINE_FLEX_test pass overflow_overflow pass stackinit_test_u8_zero pass stackinit_test_u16_zero pass stackinit_test_u32_zero pass stackinit_test_u64_zero pass stackinit_test_char_array_zero pass stackinit_test_small_hole_zero pass stackinit_test_big_hole_zero pass stackinit_test_trailing_hole_zero pass stackinit_test_packed_zero pass stackinit_test_small_hole_dynamic_partial pass stackinit_test_big_hole_dynamic_partial pass stackinit_test_trailing_hole_dynamic_partial pass stackinit_test_packed_dynamic_partial pass stackinit_test_small_hole_assigned_dynamic_partial pass stackinit_test_big_hole_assigned_dynamic_partial pass stackinit_test_trailing_hole_assigned_dynamic_partial pass stackinit_test_packed_assigned_dynamic_partial pass stackinit_test_small_hole_static_partial pass stackinit_test_big_hole_static_partial pass stackinit_test_trailing_hole_static_partial pass stackinit_test_packed_static_partial pass stackinit_test_small_hole_static_all pass stackinit_test_big_hole_static_all pass stackinit_test_trailing_hole_static_all pass stackinit_test_packed_static_all pass stackinit_test_small_hole_dynamic_all pass stackinit_test_big_hole_dynamic_all pass stackinit_test_trailing_hole_dynamic_all pass stackinit_test_packed_dynamic_all pass stackinit_test_small_hole_runtime_partial pass stackinit_test_big_hole_runtime_partial pass stackinit_test_trailing_hole_runtime_partial pass stackinit_test_packed_runtime_partial pass stackinit_test_small_hole_runtime_all pass stackinit_test_big_hole_runtime_all pass stackinit_test_trailing_hole_runtime_all pass stackinit_test_packed_runtime_all pass stackinit_test_small_hole_assigned_static_partial pass stackinit_test_big_hole_assigned_static_partial pass stackinit_test_trailing_hole_assigned_static_partial pass stackinit_test_packed_assigned_static_partial pass stackinit_test_small_hole_assigned_static_all pass stackinit_test_big_hole_assigned_static_all pass stackinit_test_trailing_hole_assigned_static_all pass stackinit_test_packed_assigned_static_all pass stackinit_test_small_hole_assigned_dynamic_all pass stackinit_test_big_hole_assigned_dynamic_all pass stackinit_test_trailing_hole_assigned_dynamic_all pass stackinit_test_packed_assigned_dynamic_all pass stackinit_test_small_hole_assigned_copy skip stackinit_test_big_hole_assigned_copy skip stackinit_test_trailing_hole_assigned_copy skip stackinit_test_packed_assigned_copy pass stackinit_test_u8_none pass stackinit_test_u16_none pass stackinit_test_u32_none pass stackinit_test_u64_none pass stackinit_test_char_array_none pass stackinit_test_switch_1_none skip stackinit_test_switch_2_none skip stackinit_test_small_hole_none pass stackinit_test_big_hole_none pass stackinit_test_trailing_hole_none pass stackinit_test_packed_none pass stackinit_test_user pass stackinit_stackinit pass fortify_fortify_test_known_sizes skip fortify_fortify_test_control_flow_split skip fortify_fortify_test_alloc_size_kmalloc_const skip fortify_fortify_test_alloc_size_kmalloc_dynamic skip fortify_fortify_test_alloc_size_vmalloc_const skip fortify_fortify_test_alloc_size_vmalloc_dynamic skip fortify_fortify_test_alloc_size_kvmalloc_const skip fortify_fortify_test_alloc_size_kvmalloc_dynamic skip fortify_fortify_test_alloc_size_devm_kmalloc_const skip fortify_fortify_test_alloc_size_devm_kmalloc_dynamic skip fortify_fortify_test_realloc_size skip fortify_fortify_test_strlen skip fortify_fortify_test_strnlen skip fortify_fortify_test_strcpy skip fortify_fortify_test_strncpy skip fortify_fortify_test_strscpy skip fortify_fortify_test_strcat skip fortify_fortify_test_strncat skip fortify_fortify_test_strlcat skip fortify_fortify_test_memcpy skip fortify_fortify_test_memmove skip fortify_fortify_test_memscan skip fortify_fortify_test_memchr skip fortify_fortify_test_memchr_inv skip fortify_fortify_test_memcmp skip fortify_fortify_test_kmemdup skip fortify_fortify skip siphash_siphash_test pass siphash_siphash pass clk_leaf_mux_set_rate_parent_determine_rate_test_clk_leaf_mux_set_rate_parent__clk_determine_rate_proper_parent pass clk_leaf_mux_set_rate_parent_determine_rate_test_clk_leaf_mux_set_rate_parent__clk_mux_determine_rate_proper_parent pass clk_leaf_mux_set_rate_parent_determine_rate_test_clk_leaf_mux_set_rate_parent__clk_mux_determine_rate_closest_proper_parent pass clk_leaf_mux_set_rate_parent_determine_rate_test_clk_leaf_mux_set_rate_parent_clk_hw_determine_rate_no_reparent_proper_parent pass clk_leaf_mux_set_rate_parent_determine_rate_test_clk_leaf_mux_set_rate_parent_determine_rate_test pass clk_leaf_mux_set_rate_parent_determine_rate_test_clk-leaf-mux-set-rate-parent pass clk-test_clk_test_get_rate pass clk-test_clk_test_set_get_rate pass clk-test_clk_test_set_set_get_rate pass clk-test_clk_test_round_set_get_rate pass clk-test_clk-test pass clk-multiple-parents-mux-test_clk_test_multiple_parents_mux_get_parent pass clk-multiple-parents-mux-test_clk_test_multiple_parents_mux_has_parent pass clk-multiple-parents-mux-test_clk_test_multiple_parents_mux_set_range_set_parent_get_rate skip clk-multiple-parents-mux-test_clk-multiple-parents-mux-test pass clk-mux-no-reparent_clk_mux_no_reparent_round_rate pass clk-mux-no-reparent_clk_mux_no_reparent_set_rate pass clk-mux-no-reparent_clk-mux-no-reparent pass clk-mux-notifier_clk_mux_notifier_set_parent_test pass clk-mux-notifier_clk-mux-notifier pass clk-orphan-transparent-multiple-parent-mux-test_clk_test_orphan_transparent_multiple_parent_mux_get_parent pass clk-orphan-transparent-multiple-parent-mux-test_clk_test_orphan_transparent_multiple_parent_mux_set_parent pass clk-orphan-transparent-multiple-parent-mux-test_clk_test_orphan_transparent_multiple_parent_mux_set_parent_drop_range pass clk-orphan-transparent-multiple-parent-mux-test_clk_test_orphan_transparent_multiple_parent_mux_set_parent_get_rate pass clk-orphan-transparent-multiple-parent-mux-test_clk_test_orphan_transparent_multiple_parent_mux_set_parent_put pass clk-orphan-transparent-multiple-parent-mux-test_clk_test_orphan_transparent_multiple_parent_mux_set_parent_set_range_modified pass clk-orphan-transparent-multiple-parent-mux-test_clk_test_orphan_transparent_multiple_parent_mux_set_parent_set_range_untouched pass clk-orphan-transparent-multiple-parent-mux-test_clk_test_orphan_transparent_multiple_parent_mux_set_range_round_rate pass clk-orphan-transparent-multiple-parent-mux-test_clk_test_orphan_transparent_multiple_parent_mux_set_range_set_parent_get_rate skip clk-orphan-transparent-multiple-parent-mux-test_clk-orphan-transparent-multiple-parent-mux-test pass clk-orphan-transparent-single-parent-test_clk_test_orphan_transparent_parent_mux_set_range pass clk-orphan-transparent-single-parent-test_clk-orphan-transparent-single-parent-test pass clk-orphan-two-level-root-last-test_clk_orphan_two_level_root_last_test_get_rate pass clk-orphan-two-level-root-last-test_clk_orphan_two_level_root_last_test_set_range pass clk-orphan-two-level-root-last-test_clk-orphan-two-level-root-last-test pass clk-range-test_clk_range_test_set_range pass clk-range-test_clk_range_test_set_range_invalid pass clk-range-test_clk_range_test_multiple_disjoints_range pass clk-range-test_clk_range_test_set_range_round_rate_lower pass clk-range-test_clk_range_test_set_range_set_rate_lower pass clk-range-test_clk_range_test_set_range_set_round_rate_consistent_lower pass clk-range-test_clk_range_test_set_range_round_rate_higher pass clk-range-test_clk_range_test_set_range_set_rate_higher pass clk-range-test_clk_range_test_set_range_set_round_rate_consistent_higher pass clk-range-test_clk_range_test_set_range_get_rate_raised pass clk-range-test_clk_range_test_set_range_get_rate_lowered pass clk-range-test_clk-range-test pass clk-range-maximize-test_clk_range_test_set_range_rate_maximized pass clk-range-maximize-test_clk_range_test_multiple_set_range_rate_maximized pass clk-range-maximize-test_clk_range_test_multiple_set_range_rate_put_maximized pass clk-range-maximize-test_clk-range-maximize-test pass clk-range-minimize-test_clk_range_test_set_range_rate_minimized pass clk-range-minimize-test_clk_range_test_multiple_set_range_rate_minimized pass clk-range-minimize-test_clk_range_test_multiple_set_range_rate_put_minimized pass clk-range-minimize-test_clk-range-minimize-test pass clk-single-parent-mux-test_clk_test_single_parent_mux_get_parent pass clk-single-parent-mux-test_clk_test_single_parent_mux_has_parent pass clk-single-parent-mux-test_clk_test_single_parent_mux_set_range_disjoint_child_last skip clk-single-parent-mux-test_clk_test_single_parent_mux_set_range_disjoint_parent_last skip clk-single-parent-mux-test_clk_test_single_parent_mux_set_range_round_rate_child_smaller pass clk-single-parent-mux-test_clk_test_single_parent_mux_set_range_round_rate_parent_only pass clk-single-parent-mux-test_clk_test_single_parent_mux_set_range_round_rate_parent_smaller pass clk-single-parent-mux-test_clk-single-parent-mux-test pass clk-uncached-test_clk_test_uncached_get_rate pass clk-uncached-test_clk_test_uncached_set_range pass clk-uncached-test_clk_test_uncached_updated_rate_set_range pass clk-uncached-test_clk-uncached-test pass clk-gate-register-test_clk_gate_register_test_dev pass clk-gate-register-test_clk_gate_register_test_parent_names pass clk-gate-register-test_clk_gate_register_test_parent_data pass clk-gate-register-test_clk_gate_register_test_parent_data_legacy pass clk-gate-register-test_clk_gate_register_test_parent_hw pass clk-gate-register-test_clk_gate_register_test_hiword_invalid pass clk-gate-register-test_clk-gate-register-test pass clk-gate-test_clk_gate_test_parent_rate pass clk-gate-test_clk_gate_test_enable pass clk-gate-test_clk_gate_test_disable pass clk-gate-test_clk-gate-test pass clk-gate-invert-test_clk_gate_test_invert_enable pass clk-gate-invert-test_clk_gate_test_invert_disable pass clk-gate-invert-test_clk-gate-invert-test pass clk-gate-hiword-test_clk_gate_test_hiword_enable pass clk-gate-hiword-test_clk_gate_test_hiword_disable pass clk-gate-hiword-test_clk-gate-hiword-test pass clk-gate-is_enabled-test_clk_gate_test_is_enabled pass clk-gate-is_enabled-test_clk_gate_test_is_disabled pass clk-gate-is_enabled-test_clk_gate_test_is_enabled_inverted pass clk-gate-is_enabled-test_clk_gate_test_is_disabled_inverted pass clk-gate-is_enabled-test_clk-gate-is_enabled-test pass clk-fd-approximation_clk_fd_test_approximation_max_denominator pass clk-fd-approximation_clk_fd_test_approximation_max_numerator pass clk-fd-approximation_clk_fd_test_approximation_max_denominator_zero_based pass clk-fd-approximation_clk_fd_test_approximation_max_numerator_zero_based pass clk-fd-approximation_clk-fd-approximation pass qos-kunit-test_freq_qos_test_min pass qos-kunit-test_freq_qos_test_maxdef pass qos-kunit-test_freq_qos_test_readd pass qos-kunit-test_qos-kunit-test pass basic_read_write_none-default0x0 pass basic_read_write_flat-default0x0 pass basic_read_write_rbtree-default0x0 pass basic_read_write_maple-default0x0 pass basic_read_write_basic_read_write pass read_bypassed_flat-default0x0 pass read_bypassed_flat-default0x2001 pass read_bypassed_flat-default0x2002 pass read_bypassed_flat-default0x2003 pass read_bypassed_flat-default0x2004 pass read_bypassed_rbtree-default0x0 pass read_bypassed_rbtree-default0x2001 pass read_bypassed_rbtree-default0x2002 pass read_bypassed_rbtree-default0x2003 pass read_bypassed_rbtree-default0x2004 pass read_bypassed_maple-default0x0 pass read_bypassed_maple-default0x2001 pass read_bypassed_maple-default0x2002 pass read_bypassed_maple-default0x2003 pass read_bypassed_maple-default0x2004 pass read_bypassed_read_bypassed pass read_bypassed_volatile_flat-default0x0 pass read_bypassed_volatile_flat-default0x2001 pass read_bypassed_volatile_flat-default0x2002 pass read_bypassed_volatile_flat-default0x2003 pass read_bypassed_volatile_flat-default0x2004 pass read_bypassed_volatile_rbtree-default0x0 pass read_bypassed_volatile_rbtree-default0x2001 pass read_bypassed_volatile_rbtree-default0x2002 pass read_bypassed_volatile_rbtree-default0x2003 pass read_bypassed_volatile_rbtree-default0x2004 pass read_bypassed_volatile_maple-default0x0 pass read_bypassed_volatile_maple-default0x2001 pass read_bypassed_volatile_maple-default0x2002 pass read_bypassed_volatile_maple-default0x2003 pass read_bypassed_volatile_maple-default0x2004 pass read_bypassed_volatile_read_bypassed_volatile pass bulk_write_none-default0x0 pass bulk_write_flat-default0x0 pass bulk_write_rbtree-default0x0 pass bulk_write_maple-default0x0 pass bulk_write_bulk_write pass bulk_read_none-default0x0 pass bulk_read_flat-default0x0 pass bulk_read_rbtree-default0x0 pass bulk_read_maple-default0x0 pass bulk_read_bulk_read pass write_readonly_none-default0x0 pass write_readonly_flat-default0x0 pass write_readonly_rbtree-default0x0 pass write_readonly_maple-default0x0 pass write_readonly_write_readonly pass read_writeonly_none-default0x0 pass read_writeonly_flat-default0x0 pass read_writeonly_rbtree-default0x0 pass read_writeonly_maple-default0x0 pass read_writeonly_read_writeonly pass reg_defaults_none-default0x0 pass reg_defaults_flat-default0x0 pass reg_defaults_rbtree-default0x0 pass reg_defaults_maple-default0x0 pass reg_defaults_reg_defaults pass reg_defaults_read_dev_none-default0x0 pass reg_defaults_read_dev_flat-default0x0 pass reg_defaults_read_dev_rbtree-default0x0 pass reg_defaults_read_dev_maple-default0x0 pass reg_defaults_read_dev_reg_defaults_read_dev pass register_patch_none-default0x0 pass register_patch_flat-default0x0 pass register_patch_rbtree-default0x0 pass register_patch_maple-default0x0 pass register_patch_register_patch pass stride_none-default0x0 pass stride_flat-default0x0 pass stride_rbtree-default0x0 pass stride_maple-default0x0 pass stride_stride pass basic_ranges_none-default0x0 pass basic_ranges_flat-default0x0 pass basic_ranges_rbtree-default0x0 pass basic_ranges_maple-default0x0 pass basic_ranges_basic_ranges pass stress_insert_none-default0x0 pass stress_insert_flat-default0x0 pass stress_insert_rbtree-default0x0 pass stress_insert_maple-default0x0 pass stress_insert_stress_insert pass cache_bypass_flat-default0x0 pass cache_bypass_flat-default0x2001 pass cache_bypass_flat-default0x2002 pass cache_bypass_flat-default0x2003 pass cache_bypass_flat-default0x2004 pass cache_bypass_rbtree-default0x0 pass cache_bypass_rbtree-default0x2001 pass cache_bypass_rbtree-default0x2002 pass cache_bypass_rbtree-default0x2003 pass cache_bypass_rbtree-default0x2004 pass cache_bypass_maple-default0x0 pass cache_bypass_maple-default0x2001 pass cache_bypass_maple-default0x2002 pass cache_bypass_maple-default0x2003 pass cache_bypass_maple-default0x2004 pass cache_bypass_cache_bypass pass cache_sync_marked_dirty_flat-default0x0 pass cache_sync_marked_dirty_flat-default0x2001 pass cache_sync_marked_dirty_flat-default0x2002 pass cache_sync_marked_dirty_flat-default0x2003 pass cache_sync_marked_dirty_flat-default0x2004 pass cache_sync_marked_dirty_rbtree-default0x0 pass cache_sync_marked_dirty_rbtree-default0x2001 pass cache_sync_marked_dirty_rbtree-default0x2002 pass cache_sync_marked_dirty_rbtree-default0x2003 pass cache_sync_marked_dirty_rbtree-default0x2004 pass cache_sync_marked_dirty_maple-default0x0 pass cache_sync_marked_dirty_maple-default0x2001 pass cache_sync_marked_dirty_maple-default0x2002 pass cache_sync_marked_dirty_maple-default0x2003 pass cache_sync_marked_dirty_maple-default0x2004 pass cache_sync_marked_dirty_cache_sync_marked_dirty pass cache_sync_after_cache_only_flat-default0x0 pass cache_sync_after_cache_only_flat-default0x2001 pass cache_sync_after_cache_only_flat-default0x2002 pass cache_sync_after_cache_only_flat-default0x2003 pass cache_sync_after_cache_only_flat-default0x2004 pass cache_sync_after_cache_only_rbtree-default0x0 pass cache_sync_after_cache_only_rbtree-default0x2001 pass cache_sync_after_cache_only_rbtree-default0x2002 pass cache_sync_after_cache_only_rbtree-default0x2003 pass cache_sync_after_cache_only_rbtree-default0x2004 pass cache_sync_after_cache_only_maple-default0x0 pass cache_sync_after_cache_only_maple-default0x2001 pass cache_sync_after_cache_only_maple-default0x2002 pass cache_sync_after_cache_only_maple-default0x2003 pass cache_sync_after_cache_only_maple-default0x2004 pass cache_sync_after_cache_only_cache_sync_after_cache_only pass cache_sync_defaults_marked_dirty_flat-default0x0 pass cache_sync_defaults_marked_dirty_flat-default0x2001 pass cache_sync_defaults_marked_dirty_flat-default0x2002 pass cache_sync_defaults_marked_dirty_flat-default0x2003 pass cache_sync_defaults_marked_dirty_flat-default0x2004 pass cache_sync_defaults_marked_dirty_rbtree-default0x0 pass cache_sync_defaults_marked_dirty_rbtree-default0x2001 pass cache_sync_defaults_marked_dirty_rbtree-default0x2002 pass cache_sync_defaults_marked_dirty_rbtree-default0x2003 pass cache_sync_defaults_marked_dirty_rbtree-default0x2004 pass cache_sync_defaults_marked_dirty_maple-default0x0 pass cache_sync_defaults_marked_dirty_maple-default0x2001 pass cache_sync_defaults_marked_dirty_maple-default0x2002 pass cache_sync_defaults_marked_dirty_maple-default0x2003 pass cache_sync_defaults_marked_dirty_maple-default0x2004 pass cache_sync_defaults_marked_dirty_cache_sync_defaults_marked_dirty pass cache_sync_default_after_cache_only_flat-default0x0 pass cache_sync_default_after_cache_only_flat-default0x2001 pass cache_sync_default_after_cache_only_flat-default0x2002 pass cache_sync_default_after_cache_only_flat-default0x2003 pass cache_sync_default_after_cache_only_flat-default0x2004 pass cache_sync_default_after_cache_only_rbtree-default0x0 pass cache_sync_default_after_cache_only_rbtree-default0x2001 pass cache_sync_default_after_cache_only_rbtree-default0x2002 pass cache_sync_default_after_cache_only_rbtree-default0x2003 pass cache_sync_default_after_cache_only_rbtree-default0x2004 pass cache_sync_default_after_cache_only_maple-default0x0 pass cache_sync_default_after_cache_only_maple-default0x2001 pass cache_sync_default_after_cache_only_maple-default0x2002 pass cache_sync_default_after_cache_only_maple-default0x2003 pass cache_sync_default_after_cache_only_maple-default0x2004 pass cache_sync_default_after_cache_only_cache_sync_default_after_cache_only pass cache_sync_readonly_flat-default0x0 pass cache_sync_readonly_flat-default0x2001 pass cache_sync_readonly_flat-default0x2002 pass cache_sync_readonly_flat-default0x2003 pass cache_sync_readonly_flat-default0x2004 pass cache_sync_readonly_rbtree-default0x0 pass cache_sync_readonly_rbtree-default0x2001 pass cache_sync_readonly_rbtree-default0x2002 pass cache_sync_readonly_rbtree-default0x2003 pass cache_sync_readonly_rbtree-default0x2004 pass cache_sync_readonly_maple-default0x0 pass cache_sync_readonly_maple-default0x2001 pass cache_sync_readonly_maple-default0x2002 pass cache_sync_readonly_maple-default0x2003 pass cache_sync_readonly_maple-default0x2004 pass cache_sync_readonly_cache_sync_readonly pass cache_sync_patch_flat-default0x0 pass cache_sync_patch_flat-default0x2001 pass cache_sync_patch_flat-default0x2002 pass cache_sync_patch_flat-default0x2003 pass cache_sync_patch_flat-default0x2004 pass cache_sync_patch_rbtree-default0x0 pass cache_sync_patch_rbtree-default0x2001 pass cache_sync_patch_rbtree-default0x2002 pass cache_sync_patch_rbtree-default0x2003 pass cache_sync_patch_rbtree-default0x2004 pass cache_sync_patch_maple-default0x0 pass cache_sync_patch_maple-default0x2001 pass cache_sync_patch_maple-default0x2002 pass cache_sync_patch_maple-default0x2003 pass cache_sync_patch_maple-default0x2004 pass cache_sync_patch_cache_sync_patch pass cache_drop_rbtree-default0x0 pass cache_drop_rbtree-default0x2001 pass cache_drop_rbtree-default0x2002 pass cache_drop_rbtree-default0x2003 pass cache_drop_rbtree-default0x2004 pass cache_drop_maple-default0x0 pass cache_drop_maple-default0x2001 pass cache_drop_maple-default0x2002 pass cache_drop_maple-default0x2003 pass cache_drop_maple-default0x2004 pass cache_drop_cache_drop pass cache_drop_with_non_contiguous_ranges_rbtree-default0x0 pass cache_drop_with_non_contiguous_ranges_rbtree-default0x2001 pass cache_drop_with_non_contiguous_ranges_rbtree-default0x2002 pass cache_drop_with_non_contiguous_ranges_rbtree-default0x2003 pass cache_drop_with_non_contiguous_ranges_rbtree-default0x2004 pass cache_drop_with_non_contiguous_ranges_maple-default0x0 pass cache_drop_with_non_contiguous_ranges_maple-default0x2001 pass cache_drop_with_non_contiguous_ranges_maple-default0x2002 pass cache_drop_with_non_contiguous_ranges_maple-default0x2003 pass cache_drop_with_non_contiguous_ranges_maple-default0x2004 pass cache_drop_with_non_contiguous_ranges_cache_drop_with_non_contiguous_ranges pass cache_drop_all_and_sync_marked_dirty_rbtree-default0x0 pass cache_drop_all_and_sync_marked_dirty_rbtree-default0x2001 pass cache_drop_all_and_sync_marked_dirty_rbtree-default0x2002 pass cache_drop_all_and_sync_marked_dirty_rbtree-default0x2003 pass cache_drop_all_and_sync_marked_dirty_rbtree-default0x2004 pass cache_drop_all_and_sync_marked_dirty_maple-default0x0 pass cache_drop_all_and_sync_marked_dirty_maple-default0x2001 pass cache_drop_all_and_sync_marked_dirty_maple-default0x2002 pass cache_drop_all_and_sync_marked_dirty_maple-default0x2003 pass cache_drop_all_and_sync_marked_dirty_maple-default0x2004 pass cache_drop_all_and_sync_marked_dirty_cache_drop_all_and_sync_marked_dirty pass cache_drop_all_and_sync_no_defaults_rbtree-default0x0 pass cache_drop_all_and_sync_no_defaults_rbtree-default0x2001 pass cache_drop_all_and_sync_no_defaults_rbtree-default0x2002 pass cache_drop_all_and_sync_no_defaults_rbtree-default0x2003 pass cache_drop_all_and_sync_no_defaults_rbtree-default0x2004 pass cache_drop_all_and_sync_no_defaults_maple-default0x0 pass cache_drop_all_and_sync_no_defaults_maple-default0x2001 pass cache_drop_all_and_sync_no_defaults_maple-default0x2002 pass cache_drop_all_and_sync_no_defaults_maple-default0x2003 pass cache_drop_all_and_sync_no_defaults_maple-default0x2004 pass cache_drop_all_and_sync_no_defaults_cache_drop_all_and_sync_no_defaults pass cache_drop_all_and_sync_has_defaults_rbtree-default0x0 pass cache_drop_all_and_sync_has_defaults_rbtree-default0x2001 pass cache_drop_all_and_sync_has_defaults_rbtree-default0x2002 pass cache_drop_all_and_sync_has_defaults_rbtree-default0x2003 pass cache_drop_all_and_sync_has_defaults_rbtree-default0x2004 pass cache_drop_all_and_sync_has_defaults_maple-default0x0 pass cache_drop_all_and_sync_has_defaults_maple-default0x2001 pass cache_drop_all_and_sync_has_defaults_maple-default0x2002 pass cache_drop_all_and_sync_has_defaults_maple-default0x2003 pass cache_drop_all_and_sync_has_defaults_maple-default0x2004 pass cache_drop_all_and_sync_has_defaults_cache_drop_all_and_sync_has_defaults pass cache_present_rbtree-default0x0 pass cache_present_rbtree-default0x2001 pass cache_present_rbtree-default0x2002 pass cache_present_rbtree-default0x2003 pass cache_present_rbtree-default0x2004 pass cache_present_maple-default0x0 pass cache_present_maple-default0x2001 pass cache_present_maple-default0x2002 pass cache_present_maple-default0x2003 pass cache_present_maple-default0x2004 pass cache_present_cache_present pass cache_range_window_reg_flat-default0x0 pass cache_range_window_reg_rbtree-default0x0 pass cache_range_window_reg_maple-default0x0 pass cache_range_window_reg_cache_range_window_reg pass raw_read_defaults_single_none-little0x0 pass raw_read_defaults_single_none-big0x0 pass raw_read_defaults_single_flat-little0x0 pass raw_read_defaults_single_flat-big0x0 pass raw_read_defaults_single_rbtree-little0x0 pass raw_read_defaults_single_rbtree-big0x0 pass raw_read_defaults_single_maple-little0x0 pass raw_read_defaults_single_maple-big0x0 pass raw_read_defaults_single_raw_read_defaults_single pass raw_read_defaults_none-little0x0 pass raw_read_defaults_none-big0x0 pass raw_read_defaults_flat-little0x0 pass raw_read_defaults_flat-big0x0 pass raw_read_defaults_rbtree-little0x0 pass raw_read_defaults_rbtree-big0x0 pass raw_read_defaults_maple-little0x0 pass raw_read_defaults_maple-big0x0 pass raw_read_defaults_raw_read_defaults pass raw_write_read_single_none-little0x0 pass raw_write_read_single_none-big0x0 pass raw_write_read_single_flat-little0x0 pass raw_write_read_single_flat-big0x0 pass raw_write_read_single_rbtree-little0x0 pass raw_write_read_single_rbtree-big0x0 pass raw_write_read_single_maple-little0x0 pass raw_write_read_single_maple-big0x0 pass raw_write_read_single_raw_write_read_single pass raw_write_none-little0x0 pass raw_write_none-big0x0 pass raw_write_flat-little0x0 pass raw_write_flat-big0x0 pass raw_write_rbtree-little0x0 pass raw_write_rbtree-big0x0 pass raw_write_maple-little0x0 pass raw_write_maple-big0x0 pass raw_write_raw_write pass raw_noinc_write_none-little0x0 pass raw_noinc_write_none-big0x0 pass raw_noinc_write_flat-little0x0 pass raw_noinc_write_flat-big0x0 pass raw_noinc_write_rbtree-little0x0 pass raw_noinc_write_rbtree-big0x0 pass raw_noinc_write_maple-little0x0 pass raw_noinc_write_maple-big0x0 pass raw_noinc_write_raw_noinc_write pass raw_sync_flat-little0x0 pass raw_sync_flat-big0x0 pass raw_sync_rbtree-little0x0 pass raw_sync_rbtree-big0x0 pass raw_sync_maple-little0x0 pass raw_sync_maple-big0x0 pass raw_sync_raw_sync pass raw_ranges_flat-little0x0 pass raw_ranges_flat-big0x0 pass raw_ranges_rbtree-little0x0 pass raw_ranges_rbtree-big0x0 pass raw_ranges_maple-little0x0 pass raw_ranges_maple-big0x0 pass raw_ranges_raw_ranges pass raw_ranges_regmap pass property-entry_pe_test_uints pass property-entry_pe_test_uint_arrays pass property-entry_pe_test_strings pass property-entry_pe_test_bool pass property-entry_pe_test_move_inline_u8 pass property-entry_pe_test_move_inline_str pass property-entry_pe_test_reference pass property-entry_property-entry pass scsi_lib_scsi_lib_test_check_passthough pass scsi_lib_scsi_lib pass scsi_proto_test_scsi_proto pass scsi_proto_scsi_proto pass input_core_input_test_polling pass input_core_input_test_timestamp pass input_core_input_test_match_device_id pass input_core_input_test_grab pass input_core_input_core pass rtc_lib_test_cases_rtc_time64_to_tm_test_date_range_1000 pass rtc_lib_test_cases_rtc_time64_to_tm_test_date_range_160000 pass rtc_lib_test_cases_rtc_lib_test_cases pass of_dtb_of_dtb_root_node_found_by_path pass of_dtb_of_dtb_root_node_populates_of_root pass of_dtb_of_dtb pass cros_ec_proto_test_cros_ec_proto_test_prepare_tx_legacy_normal pass cros_ec_proto_test_cros_ec_proto_test_prepare_tx_legacy_bad_msg_outsize pass cros_ec_proto_test_cros_ec_proto_test_prepare_tx_normal pass cros_ec_proto_test_cros_ec_proto_test_prepare_tx_bad_msg_outsize pass cros_ec_proto_test_cros_ec_proto_test_check_result pass cros_ec_proto_test_cros_ec_proto_test_query_all_normal pass cros_ec_proto_test_cros_ec_proto_test_query_all_no_pd_return_error pass cros_ec_proto_test_cros_ec_proto_test_query_all_no_pd_return0 pass cros_ec_proto_test_cros_ec_proto_test_query_all_legacy_normal_v3_return_error pass cros_ec_proto_test_cros_ec_proto_test_query_all_legacy_normal_v3_return0 pass cros_ec_proto_test_cros_ec_proto_test_query_all_legacy_xfer_error pass cros_ec_proto_test_cros_ec_proto_test_query_all_legacy_return_error pass cros_ec_proto_test_cros_ec_proto_test_query_all_legacy_data_error pass cros_ec_proto_test_cros_ec_proto_test_query_all_legacy_return0 pass cros_ec_proto_test_cros_ec_proto_test_query_all_no_mkbp pass cros_ec_proto_test_cros_ec_proto_test_query_all_no_mkbp_return_error pass cros_ec_proto_test_cros_ec_proto_test_query_all_no_mkbp_return0 pass cros_ec_proto_test_cros_ec_proto_test_query_all_no_host_sleep pass cros_ec_proto_test_cros_ec_proto_test_query_all_no_host_sleep_return0 pass cros_ec_proto_test_cros_ec_proto_test_query_all_default_wake_mask_return_error pass cros_ec_proto_test_cros_ec_proto_test_query_all_default_wake_mask_return0 pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_normal pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_excess_msg_insize pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_excess_msg_outsize_without_passthru pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_excess_msg_outsize_with_passthru pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_protocol_v3_normal pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_protocol_v3_no_op pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_protocol_v2_normal pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_protocol_v2_no_op pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_in_progress_normal pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_in_progress_retries_eagain pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_in_progress_retries_status_processing pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_in_progress_xfer_error pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_in_progress_return_error pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_in_progress_return0 pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_status_normal pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_status_xfer_error pass cros_ec_proto_test_cros_ec_proto_test_cmd_xfer_status_return_error pass cros_ec_proto_test_cros_ec_proto_test_get_next_event_no_mkbp_event pass cros_ec_proto_test_cros_ec_proto_test_get_next_event_mkbp_event_ec_suspended pass cros_ec_proto_test_cros_ec_proto_test_get_next_event_mkbp_event_version0 pass cros_ec_proto_test_cros_ec_proto_test_get_next_event_mkbp_event_version2 pass cros_ec_proto_test_cros_ec_proto_test_get_next_event_mkbp_event_host_event_rtc pass cros_ec_proto_test_cros_ec_proto_test_get_next_event_mkbp_event_host_event_masked pass cros_ec_proto_test_cros_ec_proto_test_get_host_event_no_mkbp_event pass cros_ec_proto_test_cros_ec_proto_test_get_host_event_not_host_event pass cros_ec_proto_test_cros_ec_proto_test_get_host_event_wrong_event_size pass cros_ec_proto_test_cros_ec_proto_test_get_host_event_normal pass cros_ec_proto_test_cros_ec_proto_test_check_features_cached pass cros_ec_proto_test_cros_ec_proto_test_check_features_not_cached pass cros_ec_proto_test_cros_ec_proto_test_get_sensor_count_normal pass cros_ec_proto_test_cros_ec_proto_test_get_sensor_count_xfer_error pass cros_ec_proto_test_cros_ec_proto_test_get_sensor_count_legacy pass cros_ec_proto_test_cros_ec_proto_test_ec_cmd pass cros_ec_proto_test_cros_ec_proto_test pass iio-format_iio_test_iio_format_value_integer pass iio-format_iio_test_iio_format_value_fixedpoint pass iio-format_iio_test_iio_format_value_fractional pass iio-format_iio_test_iio_format_value_fractional_log2 pass iio-format_iio_test_iio_format_value_multiple pass iio-format_iio_test_iio_format_value_integer_64 pass iio-format_iio-format pass iio-gain-time-scale_test_init_iio_gts_invalid pass iio-gain-time-scale_test_iio_gts_find_gain_for_scale_using_time pass iio-gain-time-scale_test_iio_gts_find_new_gain_sel_by_old_gain_time pass iio-gain-time-scale_test_iio_find_closest_gain_low pass iio-gain-time-scale_test_iio_gts_total_gain_to_scale pass iio-gain-time-scale_test_iio_gts_avail_test pass iio-gain-time-scale_iio-gain-time-scale pass sound-core-test_test_phys_format_size pass sound-core-test_test_format_width pass sound-core-test_test_format_endianness pass sound-core-test_test_format_signed pass sound-core-test_test_format_fill_silence pass sound-core-test_test_playback_avail pass sound-core-test_test_capture_avail pass sound-core-test_test_card_set_id pass sound-core-test_test_pcm_format_name pass sound-core-test_test_card_add_component pass sound-core-test_sound-core-test pass snd_soc_tplg_test_snd_soc_tplg_test_load_with_null_comp pass snd_soc_tplg_test_snd_soc_tplg_test_load_with_null_ops pass snd_soc_tplg_test_snd_soc_tplg_test_load_with_null_fw pass snd_soc_tplg_test_snd_soc_tplg_test_load_empty_tplg pass snd_soc_tplg_test_snd_soc_tplg_test_load_empty_tplg_bad_magic pass snd_soc_tplg_test_snd_soc_tplg_test_load_empty_tplg_bad_abi pass snd_soc_tplg_test_snd_soc_tplg_test_load_empty_tplg_bad_size pass snd_soc_tplg_test_snd_soc_tplg_test_load_empty_tplg_bad_payload_size pass snd_soc_tplg_test_snd_soc_tplg_test_load_pcm_tplg pass snd_soc_tplg_test_snd_soc_tplg_test_load_pcm_tplg_reload_comp pass snd_soc_tplg_test_snd_soc_tplg_test_load_pcm_tplg_reload_card pass snd_soc_tplg_test_snd_soc_tplg_test pass soc-card_test_snd_soc_card_get_kcontrol pass soc-card_test_snd_soc_card_get_kcontrol_locked pass soc-card_soc-card pass soc-utils_test_tdm_params_to_bclk pass soc-utils_test_snd_soc_params_to_bclk pass soc-utils_soc-utils pass snd-soc-cs-amp-lib-test_cs_amp_lib_test_cal_data_too_short_test pass snd-soc-cs-amp-lib-test_cs_amp_lib_test_cal_count_too_big_test pass snd-soc-cs-amp-lib-test_cs_amp_lib_test_no_cal_data_test pass snd-soc-cs-amp-lib-test_cs_amp_lib_test_get_efi_cal_uid_not_found_noindex_test pass snd-soc-cs-amp-lib-test_cs_amp_lib_test_get_efi_cal_uid_not_found_index_not_found_test pass snd-soc-cs-amp-lib-test_cs_amp_lib_test_get_efi_cal_no_uid_index_not_found_test pass snd-soc-cs-amp-lib-test_cs_amp_lib_test_get_efi_cal_no_uid_no_index_test pass snd-soc-cs-amp-lib-test_cs_amp_lib_test_get_efi_cal_zero_not_matched_test pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps2amp_index0 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps2amp_index1 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps3amp_index0 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps3amp_index1 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps3amp_index2 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps4amp_index0 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps4amp_index1 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps4amp_index2 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps4amp_index3 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps5amp_index0 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps5amp_index1 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps5amp_index2 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps5amp_index3 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps5amp_index4 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps6amp_index0 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps6amp_index1 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps6amp_index2 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps6amp_index3 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps6amp_index4 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps6amp_index5 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps8amp_index0 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps8amp_index1 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps8amp_index2 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps8amp_index3 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps8amp_index4 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps8amp_index5 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps8amp_index6 pass cs_amp_lib_test_get_efi_cal_by_uid_test_num_amps8amp_index7 pass cs_amp_lib_test_get_efi_cal_by_uid_test_cs_amp_lib_test_get_efi_cal_by_uid_test pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps2amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps2amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps3amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps3amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps3amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps4amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps4amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps4amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps4amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps5amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps5amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps5amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps5amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps5amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps6amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps6amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps6amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps6amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps6amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps6amp_index5 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps8amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps8amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps8amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps8amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps8amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps8amp_index5 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps8amp_index6 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_num_amps8amp_index7 pass cs_amp_lib_test_get_efi_cal_by_index_unchecked_test_cs_amp_lib_test_get_efi_cal_by_index_unchecked_test pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps2amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps2amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps3amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps3amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps3amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps4amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps4amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps4amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps4amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps5amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps5amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps5amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps5amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps5amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps6amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps6amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps6amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps6amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps6amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps6amp_index5 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps8amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps8amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps8amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps8amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps8amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps8amp_index5 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps8amp_index6 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_num_amps8amp_index7 pass cs_amp_lib_test_get_efi_cal_by_index_checked_test_cs_amp_lib_test_get_efi_cal_by_index_checked_test pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps2amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps2amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps3amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps3amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps3amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps4amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps4amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps4amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps4amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps5amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps5amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps5amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps5amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps5amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps6amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps6amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps6amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps6amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps6amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps6amp_index5 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps8amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps8amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps8amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps8amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps8amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps8amp_index5 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps8amp_index6 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_num_amps8amp_index7 pass cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test_cs_amp_lib_test_get_efi_cal_by_index_uid_mismatch_test pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps2amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps2amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps3amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps3amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps3amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps4amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps4amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps4amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps4amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps5amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps5amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps5amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps5amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps5amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps6amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps6amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps6amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps6amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps6amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps6amp_index5 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps8amp_index0 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps8amp_index1 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps8amp_index2 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps8amp_index3 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps8amp_index4 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps8amp_index5 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps8amp_index6 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_num_amps8amp_index7 pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_cs_amp_lib_test_get_efi_cal_by_index_fallback_test pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_cs_amp_lib_test_write_cal_data_test pass cs_amp_lib_test_get_efi_cal_by_index_fallback_test_snd-soc-cs-amp-lib-test pass dev-addr-list-test_dev_addr_test_basic pass dev-addr-list-test_dev_addr_test_sync_one pass dev-addr-list-test_dev_addr_test_add_del pass dev-addr-list-test_dev_addr_test_del_main pass dev-addr-list-test_dev_addr_test_add_set pass dev-addr-list-test_dev_addr_test_add_excl pass dev-addr-list-test_dev-addr-list-test pass gso_test_func_no_gso pass gso_test_func_linear pass gso_test_func_frags pass gso_test_func_frags_pure pass gso_test_func_gso_partial pass gso_test_func_frag_list pass gso_test_func_frag_list_pure pass gso_test_func_frag_list_non_uniform pass gso_test_func_gso_by_frags pass gso_test_func_gso_test_func pass ip_tunnel_flags_test_run_compat pass ip_tunnel_flags_test_run_conflict pass ip_tunnel_flags_test_run_new pass ip_tunnel_flags_test_run_ip_tunnel_flags_test_run pass ip_tunnel_flags_test_run_net_core pass RFC 3961 n-fold_64-fold012345 pass RFC 3961 n-fold_56-foldpassword pass RFC 3961 n-fold_64-foldRoughConsensusandRunningCode pass RFC 3961 n-fold_168-foldpassword pass RFC 3961 n-fold_192-foldMASSACHVSETTSINSTITVTEOFTECHNOLOGY pass RFC 3961 n-fold_168-foldQ pass RFC 3961 n-fold_168-foldba pass RFC 3961 n-fold_64-foldkerberos pass RFC 3961 n-fold_128-foldkerberos pass RFC 3961 n-fold_168-foldkerberos pass RFC 3961 n-fold_256-foldkerberos pass RFC 3961 n-fold_RFC3961n-fold pass RFC 3961 n-fold_RFC3961tests pass RFC 3962 encryption_Encryptwithaes128-cts-hmac-sha1-96case1 pass RFC 3962 encryption_Encryptwithaes128-cts-hmac-sha1-96case2 pass RFC 3962 encryption_Encryptwithaes128-cts-hmac-sha1-96case3 pass RFC 3962 encryption_Encryptwithaes128-cts-hmac-sha1-96case4 pass RFC 3962 encryption_Encryptwithaes128-cts-hmac-sha1-96case5 pass RFC 3962 encryption_Encryptwithaes128-cts-hmac-sha1-96case6 pass RFC 3962 encryption_RFC3962encryption pass RFC 3962 encryption_RFC3962suite pass RFC 6803 key derivation_DeriveKcsubkeyforcamellia128-cts-cmac skip RFC 6803 key derivation_DeriveKesubkeyforcamellia128-cts-cmac skip RFC 6803 key derivation_DeriveKisubkeyforcamellia128-cts-cmac skip RFC 6803 key derivation_DeriveKcsubkeyforcamellia256-cts-cmac skip RFC 6803 key derivation_DeriveKesubkeyforcamellia256-cts-cmac skip RFC 6803 key derivation_DeriveKisubkeyforcamellia256-cts-cmac skip RFC 6803 key derivation_RFC6803keyderivation skip RFC 6803 checksum_camellia128-cts-cmacchecksumtest1 skip RFC 6803 checksum_camellia128-cts-cmacchecksumtest2 skip RFC 6803 checksum_camellia256-cts-cmacchecksumtest3 skip RFC 6803 checksum_camellia256-cts-cmacchecksumtest4 skip RFC 6803 checksum_RFC6803checksum skip RFC 6803 encryption_Encryptemptyplaintextwithcamellia128-cts-cmac skip RFC 6803 encryption_Encrypt1bytewithcamellia128-cts-cmac skip RFC 6803 encryption_Encrypt9byteswithcamellia128-cts-cmac skip RFC 6803 encryption_Encrypt13byteswithcamellia128-cts-cmac skip RFC 6803 encryption_Encrypt30byteswithcamellia128-cts-cmac skip RFC 6803 encryption_Encryptemptyplaintextwithcamellia256-cts-cmac skip RFC 6803 encryption_Encrypt1bytewithcamellia256-cts-cmac skip RFC 6803 encryption_Encrypt9byteswithcamellia256-cts-cmac skip RFC 6803 encryption_Encrypt13byteswithcamellia256-cts-cmac skip RFC 6803 encryption_Encrypt30byteswithcamellia256-cts-cmac skip RFC 6803 encryption_RFC6803encryption skip RFC 6803 encryption_RFC6803suite skip RFC 8009 key derivation_DeriveKcsubkeyforaes128-cts-hmac-sha256-128 skip RFC 8009 key derivation_DeriveKesubkeyforaes128-cts-hmac-sha256-128 skip RFC 8009 key derivation_DeriveKisubkeyforaes128-cts-hmac-sha256-128 skip RFC 8009 key derivation_DeriveKcsubkeyforaes256-cts-hmac-sha384-192 skip RFC 8009 key derivation_DeriveKesubkeyforaes256-cts-hmac-sha384-192 skip RFC 8009 key derivation_DeriveKisubkeyforaes256-cts-hmac-sha384-192 skip RFC 8009 key derivation_RFC8009keyderivation skip RFC 8009 checksum_Checksumwithaes128-cts-hmac-sha256-128 skip RFC 8009 checksum_Checksumwithaes256-cts-hmac-sha384-192 skip RFC 8009 checksum_RFC8009checksum skip RFC 8009 encryption_Encryptemptyplaintextwithaes128-cts-hmac-sha256-128 skip RFC 8009 encryption_Encryptshortplaintextwithaes128-cts-hmac-sha256-128 skip RFC 8009 encryption_Encryptblockplaintextwithaes128-cts-hmac-sha256-128 skip RFC 8009 encryption_Encryptlongplaintextwithaes128-cts-hmac-sha256-128 skip RFC 8009 encryption_Encryptemptyplaintextwithaes256-cts-hmac-sha384-192 skip RFC 8009 encryption_Encryptshortplaintextwithaes256-cts-hmac-sha384-192 skip RFC 8009 encryption_Encryptblockplaintextwithaes256-cts-hmac-sha384-192 skip RFC 8009 encryption_Encryptlongplaintextwithaes256-cts-hmac-sha384-192 skip RFC 8009 encryption_RFC8009encryption skip RFC 8009 encryption_RFC8009suite skip Encryption self-tests_aes128-cts-hmac-sha1-96encryptionself-test pass Encryption self-tests_aes256-cts-hmac-sha1-96encryptionself-test pass Encryption self-tests_camellia128-cts-cmacencryptionself-test skip Encryption self-tests_camellia256-cts-cmacencryptionself-test skip Encryption self-tests_aes128-cts-hmac-sha256-128encryptionself-test skip Encryption self-tests_aes256-cts-hmac-sha384-192encryptionself-test skip Encryption self-tests_Encryptionself-tests pass Encryption self-tests_Encryptiontestsuite pass mptcp-crypto_mptcp_crypto_test_basic pass mptcp-crypto_mptcp-crypto pass mptcp-token_mptcp_token_test_req_basic pass mptcp-token_mptcp_token_test_msk_basic pass mptcp-token_mptcp_token_test_accept pass mptcp-token_mptcp_token_test_destroyed pass mptcp-token_mptcp-token pass req_alloc API fuzzing_handshake_req_allocNULLproto pass req_alloc API fuzzing_handshake_req_allocCLASS_NONE pass req_alloc API fuzzing_handshake_req_allocCLASS_MAX pass req_alloc API fuzzing_handshake_req_allocnocallbacks pass req_alloc API fuzzing_handshake_req_allocnodonecallback pass req_alloc API fuzzing_handshake_req_allocexcessiveprivsize pass req_alloc API fuzzing_handshake_req_allocallgood pass req_alloc API fuzzing_req_allocAPIfuzzing pass req_alloc API fuzzing_req_submitNULLreqarg pass req_alloc API fuzzing_req_submitNULLsockarg pass req_alloc API fuzzing_req_submitNULLsock-file pass req_alloc API fuzzing_req_lookupworks pass req_alloc API fuzzing_req_submitmaxpending pass req_alloc API fuzzing_req_submitmultiple pass req_alloc API fuzzing_req_cancelbeforeaccept pass req_alloc API fuzzing_req_cancelafteraccept pass req_alloc API fuzzing_req_cancelafterdone pass req_alloc API fuzzing_req_destroyworks pass req_alloc API fuzzing_HandshakeAPItests pass + ../../utils/send-to-lava.sh ./output/result.txt <8>[ 184.595210] <8>[ 184.778022] <8>[ 184.964477] <8>[ 185.209612] <8>[ 185.412297] <8>[ 185.669616] <8>[ 185.892917] <8>[ 186.109031] <8>[ 186.330890] <8>[ 186.546168] <8>[ 186.741839] <8>[ 186.975384] <8>[ 187.210518] <8>[ 187.449649] <8>[ 187.681425] <8>[ 187.955730] <8>[ 188.183691] <8>[ 188.423430] <8>[ 188.656046] <8>[ 188.879243] <8>[ 189.102742] <8>[ 189.322966] <8>[ 189.555305] <8>[ 189.747736] <8>[ 189.929354] <8>[ 190.142772] <8>[ 190.370094] <8>[ 190.593612] <8>[ 190.824722] <8>[ 191.045198] <8>[ 191.273462] <8>[ 191.505185] <8>[ 191.730171] <8>[ 191.958328] <8>[ 192.193856] <8>[ 192.429137] <8>[ 192.663353] <8>[ 192.904695] <8>[ 193.136876] <8>[ 193.377247] <8>[ 193.608637] <8>[ 193.806602] <8>[ 194.059448] <8>[ 194.298927] <8>[ 194.530459] <8>[ 194.720167] <8>[ 194.906847] <8>[ 195.092543] <8>[ 195.325011] <8>[ 195.526882] <8>[ 195.782616] <8>[ 196.013242] <8>[ 196.248010] <8>[ 196.484071] <8>[ 196.714596] <8>[ 196.950218] <8>[ 197.430367] <8>[ 197.722501] <8>[ 197.956252] <8>[ 198.185328] <8>[ 198.418700] <8>[ 198.643230] <8>[ 198.875592] <8>[ 199.098781] <8>[ 199.288538] <8>[ 199.512697] <8>[ 199.755907] <8>[ 199.981030] <8>[ 200.162590] <8>[ 200.382556] <8>[ 200.617196] <8>[ 200.854188] <8>[ 201.082654] <8>[ 201.313351] <8>[ 201.535141] <8>[ 201.762729] <8>[ 201.994614] <8>[ 202.217209] <8>[ 202.438678] <8>[ 202.656571] <8>[ 202.889474] <8>[ 203.113377] <8>[ 203.346723] <8>[ 203.572811] <8>[ 203.799171] <8>[ 204.026809] <8>[ 204.238389] <8>[ 204.461553] <8>[ 204.689438] <8>[ 204.868763] <8>[ 205.093382] <8>[ 205.286982] <8>[ 205.498298] <8>[ 205.726212] <8>[ 205.944689] <8>[ 206.174889] <8>[ 206.409718] <8>[ 206.605547] <8>[ 206.791320] <8>[ 207.014806] <8>[ 207.245226] <8>[ 207.468734] <8>[ 207.696331] <8>[ 207.917339] <8>[ 208.135211] <8>[ 208.359135] <8>[ 208.591724] <8>[ 208.832956] <8>[ 209.076622] <8>[ 209.300730] <8>[ 209.532947] <8>[ 209.761784] <8>[ 209.986975] <8>[ 210.211097] <8>[ 210.398784] <8>[ 210.646936] <8>[ 210.846467] <8>[ 211.037564] <8>[ 211.269146] <8>[ 211.500272] <8>[ 211.730866] <8>[ 211.934480] <8>[ 212.142892] <8>[ 212.356886] <8>[ 212.543912] <8>[ 212.740944] <8>[ 212.964936] <8>[ 213.151317] <8>[ 213.391320] <8>[ 213.625019] <8>[ 213.820670] <8>[ 214.009402] <8>[ 214.223109] <8>[ 214.467727] <8>[ 214.707845] <8>[ 214.928602] <8>[ 215.118605] <8>[ 215.337850] <8>[ 215.529719] <8>[ 215.758427] <8>[ 215.993082] <8>[ 216.230089] <8>[ 216.471530] <8>[ 216.736096] <8>[ 216.940201] <8>[ 217.164235] <8>[ 217.400260] <8>[ 217.632666] <8>[ 217.859377] <8>[ 218.098935] <8>[ 218.315129] <8>[ 218.527126] <8>[ 218.717675] <8>[ 218.905014] <8>[ 219.134527] <8>[ 219.353449] <8>[ 219.561708] <8>[ 219.786795] <8>[ 220.007542] <8>[ 220.241417] <8>[ 220.445433] <8>[ 220.650193] <8>[ 220.877206] <8>[ 221.064631] <8>[ 221.289381] <8>[ 221.525113] <8>[ 221.713442] <8>[ 221.931281] <8>[ 222.158641] <8>[ 222.396143] <8>[ 222.575215] <8>[ 222.812286] <8>[ 223.010742] <8>[ 223.239954] <8>[ 223.471595] <8>[ 223.666984] <8>[ 223.890400] <8>[ 224.117826] <8>[ 224.351102] <8>[ 224.550221] <8>[ 224.777253] <8>[ 225.001288] <8>[ 225.233099] <8>[ 225.464330] <8>[ 225.725231] <8>[ 225.912647] <8>[ 226.131921] <8>[ 226.363452] <8>[ 226.592889] <8>[ 226.817192] <8>[ 227.054667] <8>[ 227.274594] <8>[ 227.513100] <8>[ 227.704819] <8>[ 227.939851] <8>[ 228.169179] <8>[ 228.378348] <8>[ 228.599384] <8>[ 228.813987] <8>[ 229.009516] <8>[ 229.206449] <8>[ 229.760444] <8>[ 230.007593] <8>[ 230.236241] <8>[ 230.479230] <8>[ 230.708310] <8>[ 230.908971] <8>[ 231.092147] <8>[ 231.358087] <8>[ 231.588686] <8>[ 231.820731] <8>[ 232.058435] <8>[ 232.282745] <8>[ 232.477790] <8>[ 232.709060] <8>[ 232.941368] <8>[ 233.165355] <8>[ 233.394735] <8>[ 233.580815] <8>[ 233.801788] <8>[ 234.026589] <8>[ 234.251064] <8>[ 234.494566] <8>[ 234.698884] <8>[ 234.939735] <8>[ 235.164903] <8>[ 235.366425] <8>[ 235.621596] <8>[ 235.855201] <8>[ 236.049296] <8>[ 236.233380] <8>[ 236.456970] <8>[ 236.689120] <8>[ 236.923722] <8>[ 237.123836] <8>[ 237.360189] <8>[ 237.545730] <8>[ 237.750450] <8>[ 237.983789] <8>[ 238.210033] <8>[ 238.392691] <8>[ 238.582940] <8>[ 238.820560] <8>[ 239.060915] <8>[ 239.298647] <8>[ 239.543797] <8>[ 239.781214] <8>[ 240.024476] <8>[ 240.249641] <8>[ 240.489188] <8>[ 240.726994] <8>[ 240.962895] <8>[ 241.224696] <8>[ 241.421801] <8>[ 241.643489] <8>[ 241.863534] <8>[ 242.107712] <8>[ 242.343043] <8>[ 242.569688] <8>[ 242.807368] <8>[ 243.039717] <8>[ 243.274508] <8>[ 243.506774] <8>[ 243.743244] <8>[ 243.975953] <8>[ 244.198308] <8>[ 244.429250] <8>[ 244.653200] <8>[ 244.887889] <8>[ 245.147259] <8>[ 245.384052] <8>[ 245.614543] <8>[ 245.827815] <8>[ 246.060661] <8>[ 246.287125] <8>[ 246.473147] <8>[ 246.661244] <8>[ 246.886522] <8>[ 247.120019] <8>[ 247.308750] <8>[ 247.501730] <8>[ 247.732052] <8>[ 247.962416] <8>[ 248.200850] <8>[ 248.395209] <8>[ 248.611546] <8>[ 248.840761] <8>[ 249.088737] <8>[ 249.333781] <8>[ 249.518977] <8>[ 249.738740] <8>[ 249.972539] <8>[ 250.190791] <8>[ 250.422672] <8>[ 250.655962] <8>[ 250.892009] <8>[ 251.131301] <8>[ 251.380163] <8>[ 251.582649] <8>[ 251.780753] <8>[ 252.016396] <8>[ 252.248905] <8>[ 252.491016] <8>[ 252.720888] <8>[ 252.941559] <8>[ 253.137465] <8>[ 253.385335] <8>[ 253.614120] <8>[ 253.846882] <8>[ 254.094772] <8>[ 254.330180] <8>[ 254.580190] <8>[ 254.808705] <8>[ 255.045411] <8>[ 255.279260] <8>[ 255.504188] <8>[ 255.705050] <8>[ 255.940913] <8>[ 256.171011] <8>[ 256.362997] <8>[ 256.579893] <8>[ 256.766225] <8>[ 256.971412] <8>[ 257.184877] <8>[ 257.387774] <8>[ 257.619507] <8>[ 257.849828] <8>[ 258.081373] <8>[ 258.282889] <8>[ 258.499957] <8>[ 258.740215] <8>[ 258.973709] <8>[ 259.202776] <8>[ 259.436007] <8>[ 259.661091] <8>[ 259.891334] <8>[ 260.079879] <8>[ 260.297426] <8>[ 260.504099] <8>[ 260.700630] <8>[ 260.944109] <8>[ 261.186085] <8>[ 261.384678] <8>[ 261.583183] <8>[ 261.772556] <8>[ 261.956676] <8>[ 262.183438] <8>[ 262.731680] <8>[ 262.965085] <8>[ 263.198425] <8>[ 263.438409] <8>[ 263.673479] <8>[ 263.893846] <8>[ 264.075876] <8>[ 264.329024] <8>[ 264.552188] <8>[ 264.777173] <8>[ 265.017269] <8>[ 265.250430] <8>[ 265.488681] <8>[ 265.699554] <8>[ 265.931804] <8>[ 266.163600] <8>[ 266.388565] <8>[ 266.576757] <8>[ 266.804338] <8>[ 266.998676] <8>[ 267.208201] <8>[ 267.438392] <8>[ 267.665797] <8>[ 267.915656] <8>[ 268.144216] <8>[ 268.377756] <8>[ 268.607402] <8>[ 268.837388] <8>[ 269.065553] <8>[ 269.294454] <8>[ 269.537405] <8>[ 269.762789] <8>[ 269.991864] <8>[ 270.231032] <8>[ 270.469814] <8>[ 270.712853] <8>[ 270.947428] <8>[ 271.147636] <8>[ 271.390663] <8>[ 271.590923] <8>[ 271.822792] <8>[ 272.045977] <8>[ 272.233248] <8>[ 272.438191] <8>[ 272.665227] <8>[ 272.881155] <8>[ 273.101232] <8>[ 273.332920] <8>[ 273.577530] <8>[ 273.776469] <8>[ 274.019570] <8>[ 274.264458] <8>[ 274.510219] <8>[ 274.719316] <8>[ 274.963897] <8>[ 275.207508] <8>[ 275.432644] <8>[ 275.666936] <8>[ 275.910194] <8>[ 276.146091] <8>[ 276.370938] <8>[ 276.594874] <8>[ 276.816048] <8>[ 277.042591] <8>[ 277.232235] <8>[ 277.417605] <8>[ 277.618463] <8>[ 277.874707] <8>[ 278.104240] <8>[ 278.331676] <8>[ 278.521262] <8>[ 278.744693] <8>[ 278.987532] <8>[ 279.218830] <8>[ 279.449692] <8>[ 279.675973] <8>[ 279.862937] <8>[ 280.066969] <8>[ 280.263576] <8>[ 280.489690] <8>[ 280.725426] <8>[ 280.948307] <8>[ 281.174468] <8>[ 281.396713] <8>[ 281.598387] <8>[ 281.824216] <8>[ 282.059320] <8>[ 282.292914] <8>[ 282.480210] <8>[ 282.660529] <8>[ 282.890472] <8>[ 283.114190] <8>[ 283.328591] <8>[ 283.559824] <8>[ 283.791669] <8>[ 284.022770] <8>[ 284.259873] <8>[ 284.456275] <8>[ 284.700901] <8>[ 284.947968] <8>[ 285.174872] <8>[ 285.399218] <8>[ 285.637781] <8>[ 285.874414] <8>[ 286.108309] <8>[ 286.336426] <8>[ 286.602984] <8>[ 286.834590] <8>[ 287.068174] <8>[ 287.286596] <8>[ 287.507288] <8>[ 287.690176] <8>[ 287.902499] <8>[ 288.142325] <8>[ 288.390877] <8>[ 288.622223] <8>[ 288.850961] <8>[ 289.073562] <8>[ 289.307053] <8>[ 289.532695] <8>[ 289.767936] <8>[ 289.989674] <8>[ 290.226504] <8>[ 290.431757] <8>[ 290.656581] <8>[ 290.844705] <8>[ 291.050876] <8>[ 291.291282] <8>[ 291.523534] <8>[ 291.768378] <8>[ 292.003193] <8>[ 292.239529] <8>[ 292.491159] <8>[ 292.698854] <8>[ 292.918466] <8>[ 293.143843] <8>[ 293.341180] <8>[ 293.576567] <8>[ 293.775207] <8>[ 293.991687] <8>[ 294.224180] <8>[ 294.456870] <8>[ 294.679711] <8>[ 294.920927] <8>[ 295.110396] <8>[ 295.328408] <8>[ 295.558748] <8>[ 296.064098] <8>[ 296.355610] <8>[ 296.593502] <8>[ 296.791638] <8>[ 297.010782] <8>[ 297.198737] <8>[ 297.387120] <8>[ 297.617760] <8>[ 297.810648] <8>[ 298.002925] <8>[ 298.234716] <8>[ 298.471380] <8>[ 298.702802] <8>[ 298.935816] <8>[ 299.174722] <8>[ 299.395698] <8>[ 299.621710] <8>[ 299.842295] <8>[ 300.110388] <8>[ 300.345650] <8>[ 300.544004] <8>[ 300.786143] <8>[ 300.975893] <8>[ 301.160172] <8>[ 301.398554] <8>[ 301.620794] <8>[ 301.849253] <8>[ 302.082902] <8>[ 302.280568] <8>[ 302.521801] <8>[ 302.756624] <8>[ 302.984260] <8>[ 303.174383] <8>[ 303.416188] <8>[ 303.646423] <8>[ 303.877211] <8>[ 304.112747] <8>[ 304.344850] <8>[ 304.574371] <8>[ 304.771424] <8>[ 304.979663] <8>[ 305.193476] <8>[ 305.424382] <8>[ 305.660551] <8>[ 305.882975] <8>[ 306.123527] <8>[ 306.360652] <8>[ 306.588445] <8>[ 306.823665] <8>[ 307.059044] <8>[ 307.292687] <8>[ 307.517258] <8>[ 307.764953] <8>[ 307.998617] <8>[ 308.190431] <8>[ 308.368995] <8>[ 308.599749] <8>[ 308.842736] <8>[ 309.069687] <8>[ 309.312597] <8>[ 309.562787] <8>[ 309.791158] <8>[ 310.022912] <8>[ 310.253690] <8>[ 310.451741] <8>[ 310.707468] <8>[ 310.929026] <8>[ 311.168101] <8>[ 311.367877] <8>[ 311.605031] <8>[ 311.856542] <8>[ 312.084708] <8>[ 312.323110] <8>[ 312.560109] <8>[ 312.782345] <8>[ 313.007695] <8>[ 313.233788] <8>[ 313.417652] <8>[ 313.604907] <8>[ 313.833373] <8>[ 314.066598] <8>[ 314.300418] <8>[ 314.531049] <8>[ 314.766490] <8>[ 314.998499] <8>[ 315.230542] <8>[ 315.465070] <8>[ 315.689145] <8>[ 315.930471] <8>[ 316.171127] <8>[ 316.383735] <8>[ 316.620087] <8>[ 316.861671] <8>[ 317.095131] <8>[ 317.333394] <8>[ 317.569844] <8>[ 317.799678] <8>[ 318.033410] <8>[ 318.252064] <8>[ 318.434130] <8>[ 318.626525] <8>[ 318.842692] <8>[ 319.064823] <8>[ 319.292215] <8>[ 319.520380] <8>[ 319.748922] <8>[ 320.002961] <8>[ 320.253586] <8>[ 320.488631] <8>[ 320.681802] <8>[ 320.913527] <8>[ 321.148149] <8>[ 321.386804] <8>[ 321.615503] <8>[ 321.844687] <8>[ 322.080163] <8>[ 322.307405] <8>[ 322.537505] <8>[ 322.772050] <8>[ 323.001598] <8>[ 323.226161] <8>[ 323.443656] <8>[ 323.627127] <8>[ 323.847073] <8>[ 324.084758] <8>[ 324.311085] <8>[ 324.546105] <8>[ 324.747518] <8>[ 324.987483] <8>[ 325.223256] <8>[ 325.458249] <8>[ 325.673447] <8>[ 325.901073] <8>[ 326.132516] <8>[ 326.356716] <8>[ 326.582541] <8>[ 326.801455] <8>[ 327.033083] <8>[ 327.247542] <8>[ 327.480421] <8>[ 327.709650] <8>[ 327.937439] <8>[ 328.488395] <8>[ 328.719452] <8>[ 328.905629] <8>[ 329.138232] <8>[ 329.367214] <8>[ 329.598641] <8>[ 329.824236] <8>[ 330.053393] <8>[ 330.287070] <8>[ 330.505643] <8>[ 330.699315] <8>[ 330.900757] <8>[ 331.075478] <8>[ 331.299762] <8>[ 331.530984] <8>[ 331.759860] <8>[ 331.978389] <8>[ 332.204377] <8>[ 332.421200] <8>[ 332.652200] <8>[ 332.883877] <8>[ 333.097780] <8>[ 333.290953] <8>[ 333.527207] <8>[ 333.756552] <8>[ 333.954888] <8>[ 334.175118] <8>[ 334.393255] <8>[ 334.618311] <8>[ 334.838707] <8>[ 335.056162] <8>[ 335.303613] <8>[ 335.527343] <8>[ 335.714976] <8>[ 335.961224] <8>[ 336.198992] <8>[ 336.427685] <8>[ 336.663153] <8>[ 336.891774] <8>[ 337.123269] <8>[ 337.318886] <8>[ 337.540575] <8>[ 337.761482] <8>[ 337.990518] <8>[ 338.221747] <8>[ 338.468674] <8>[ 338.717702] <8>[ 338.941185] <8>[ 339.134734] <8>[ 339.359788] <8>[ 339.618667] <8>[ 339.871281] <8>[ 340.099228] <8>[ 340.350771] <8>[ 340.587649] <8>[ 340.817138] <8>[ 341.047335] <8>[ 341.282820] <8>[ 341.508800] <8>[ 341.692456] <8>[ 341.920095] <8>[ 342.114812] <8>[ 342.344697] <8>[ 342.572726] <8>[ 342.753165] <8>[ 342.990104] <8>[ 343.224298] <8>[ 343.457457] <8>[ 343.655054] <8>[ 343.883179] <8>[ 344.109321] <8>[ 344.301508] <8>[ 344.485612] <8>[ 344.721574] <8>[ 344.948568] <8>[ 345.188216] <8>[ 345.415816] <8>[ 345.654930] <8>[ 345.895479] <8>[ 346.133376] <8>[ 346.362730] <8>[ 346.598829] <8>[ 346.828007] <8>[ 347.026774] <8>[ 347.234786] <8>[ 347.415063] <8>[ 347.622151] <8>[ 347.822867] <8>[ 348.042965] <8>[ 348.275078] <8>[ 348.511082] <8>[ 348.742911] <8>[ 348.980429] <8>[ 349.207187] <8>[ 349.403011] <8>[ 349.589001] <8>[ 349.835565] <8>[ 350.081266] <8>[ 350.325219] <8>[ 350.563798] <8>[ 350.750304] <8>[ 350.940030] <8>[ 351.141165] <8>[ 351.371909] <8>[ 351.626999] <8>[ 351.893883] <8>[ 352.142811] <8>[ 352.377339] <8>[ 352.595440] <8>[ 352.799381] <8>[ 353.042480] <8>[ 353.284872] <8>[ 353.532682] <8>[ 353.783317] <8>[ 354.022601] <8>[ 354.260203] <8>[ 354.488679] <8>[ 354.710749] <8>[ 354.895200] <8>[ 355.131161] <8>[ 355.368856] <8>[ 355.603830] <8>[ 355.849811] <8>[ 356.042766] <8>[ 356.280100] <8>[ 356.523887] <8>[ 356.746751] <8>[ 356.969268] <8>[ 357.212036] <8>[ 357.441621] <8>[ 357.625292] <8>[ 357.850699] <8>[ 358.088057] <8>[ 358.324785] <8>[ 358.563614] <8>[ 358.821376] <8>[ 359.063435] <8>[ 359.271643] <8>[ 359.754942] <8>[ 360.026785] <8>[ 360.210034] <8>[ 360.467754] <8>[ 360.699378] <8>[ 360.883666] <8>[ 361.146767] <8>[ 361.372995] <8>[ 361.578586] <8>[ 361.815557] <8>[ 362.063825] <8>[ 362.287541] <8>[ 362.516660] <8>[ 362.747820] <8>[ 362.985161] <8>[ 363.225199] <8>[ 363.447228] <8>[ 363.684806] <8>[ 363.897085] <8>[ 364.139819] <8>[ 364.399662] <8>[ 364.635664] <8>[ 364.828134] <8>[ 365.064680] <8>[ 365.313812] <8>[ 365.562856] <8>[ 365.803971] <8>[ 366.043508] <8>[ 366.280825] <8>[ 366.535349] <8>[ 366.769333] <8>[ 366.994829] <8>[ 367.230873] <8>[ 367.471828] <8>[ 367.711668] <8>[ 367.934977] <8>[ 368.172307] <8>[ 368.406228] <8>[ 368.596741] <8>[ 368.822215] <8>[ 369.055149] <8>[ 369.291040] <8>[ 369.533639] <8>[ 369.770509] <8>[ 369.961033] <8>[ 370.206634] <8>[ 370.455001] <8>[ 370.645620] <8>[ 370.869744] <8>[ 371.105124] <8>[ 371.329841] <8>[ 371.540153] <8>[ 371.782867] <8>[ 371.980961] <8>[ 372.209237] <8>[ 372.445760] <8>[ 372.675661] <8>[ 372.909799] <8>[ 373.148069] <8>[ 373.371170] <8>[ 373.620270] <8>[ 373.863223] <8>[ 374.099987] <8>[ 374.332067] <8>[ 374.565277] <8>[ 374.802282] <8>[ 375.032887] <8>[ 375.214783] <8>[ 375.453309] <8>[ 375.690998] <8>[ 375.938945] <8>[ 376.173622] <8>[ 376.412543] <8>[ 376.638924] <8>[ 376.862997] <8>[ 377.089234] <8>[ 377.326426] <8>[ 377.545687] <8>[ 377.778541] <8>[ 378.012439] <8>[ 378.242694] <8>[ 378.478155] <8>[ 378.723976] <8>[ 378.948277] <8>[ 379.139892] <8>[ 379.384446] <8>[ 379.656970] <8>[ 379.894944] <8>[ 380.132330] <8>[ 380.330621] <8>[ 380.518340] <8>[ 380.750191] <8>[ 380.976342] <8>[ 381.208769] <8>[ 381.426923] <8>[ 381.635838] <8>[ 381.822892] <8>[ 382.063545] <8>[ 382.292811] <8>[ 382.536292] <8>[ 382.723855] <8>[ 382.950654] <8>[ 383.192169] <8>[ 383.424208] <8>[ 383.660431] <8>[ 383.850072] <8>[ 384.094490] <8>[ 384.335092] <8>[ 384.528825] <8>[ 384.765847] <8>[ 384.998372] <8>[ 385.224645] <8>[ 385.421389] <8>[ 385.644896] <8>[ 385.884206] <8>[ 386.108069] <8>[ 386.323836] <8>[ 386.508487] <8>[ 386.688074] <8>[ 386.911788] <8>[ 387.150606] <8>[ 387.374965] <8>[ 387.558965] <8>[ 387.747792] <8>[ 387.964408] <8>[ 388.185320] <8>[ 388.407312] <8>[ 388.635906] <8>[ 388.877696] <8>[ 389.079618] <8>[ 389.310900] <8>[ 389.548419] <8>[ 389.792027] <8>[ 390.028526] <8>[ 390.268642] <8>[ 390.462983] <8>[ 390.655762] <8>[ 390.892843] <8>[ 391.121761] <8>[ 391.333181] <8>[ 391.544194] <8>[ 391.770812] <8>[ 392.002596] <8>[ 392.239429] <8>[ 392.477165] <8>[ 392.655581] <8>[ 392.883956] <8>[ 393.129546] <8>[ 393.641745] <8>[ 393.933344] <8>[ 394.160278] <8>[ 394.356339] <8>[ 394.592372] <8>[ 394.832409] <8>[ 395.078922] <8>[ 395.317066] <8>[ 395.553566] <8>[ 395.756147] <8>[ 396.013699] <8>[ 396.236147] <8>[ 396.471085] <8>[ 396.708286] <8>[ 396.933357] <8>[ 397.163340] <8>[ 397.418745] <8>[ 397.675758] <8>[ 397.923905] <8>[ 398.155921] <8>[ 398.391988] <8>[ 398.631481] <8>[ 398.830954] <8>[ 399.069326] <8>[ 399.302782] <8>[ 399.530123] <8>[ 399.787485] <8>[ 399.989389] <8>[ 400.227545] <8>[ 400.464105] <8>[ 400.687782] <8>[ 400.890423] <8>[ 401.117054] <8>[ 401.359535] <8>[ 401.571461] <8>[ 401.791023] <8>[ 401.994742] <8>[ 402.240506] <8>[ 402.476980] <8>[ 402.726691] <8>[ 402.978473] <8>[ 403.206178] <8>[ 403.435279] <8>[ 403.676384] <8>[ 403.884639] <8>[ 404.122354] <8>[ 404.347169] <8>[ 404.545050] <8>[ 404.774734] <8>[ 404.963064] <8>[ 405.210548] <8>[ 405.445797] <8>[ 405.680954] <8>[ 405.890692] <8>[ 406.073607] <8>[ 406.311852] <8>[ 406.554537] <8>[ 406.798416] <8>[ 407.039103] <8>[ 407.275126] <8>[ 407.513726] <8>[ 407.744474] <8>[ 407.970406] <8>[ 408.204702] <8>[ 408.449819] <8>[ 408.688804] <8>[ 408.929642] <8>[ 409.192355] <8>[ 409.408536] <8>[ 409.647394] <8>[ 409.879792] <8>[ 410.119226] <8>[ 410.345500] <8>[ 410.582943] <8>[ 410.815462] <8>[ 411.003753] <8>[ 411.196508] <8>[ 411.419606] <8>[ 411.646798] <8>[ 411.883574] <8>[ 412.115391] <8>[ 412.322758] <8>[ 412.564447] <8>[ 412.804043] <8>[ 413.038835] <8>[ 413.272206] <8>[ 413.502752] <8>[ 413.735506] <8>[ 413.971327] <8>[ 414.205302] <8>[ 414.446303] <8>[ 414.693596] <8>[ 414.936754] <8>[ 415.173596] <8>[ 415.413658] <8>[ 415.655898] <8>[ 415.895112] <8>[ 416.096495] <8>[ 416.300393] <8>[ 416.483799] <8>[ 416.706588] <8>[ 416.928168] <8>[ 417.177132] <8>[ 417.400927] <8>[ 417.637810] <8>[ 417.850907] <8>[ 418.105422] <8>[ 418.340377] <8>[ 418.586939] <8>[ 418.821623] <8>[ 419.070266] <8>[ 419.317273] <8>[ 419.576184] <8>[ 419.817699] <8>[ 420.060625] <8>[ 420.264580] <8>[ 420.503365] <8>[ 420.742475] <8>[ 420.992747] <8>[ 421.187805] <8>[ 421.390687] <8>[ 421.624298] <8>[ 421.808889] <8>[ 422.041200] <8>[ 422.287811] <8>[ 422.533162] <8>[ 422.780299] <8>[ 423.039709] <8>[ 423.293435] <8>[ 423.488570] <8>[ 423.733364] <8>[ 423.982502] <8>[ 424.218829] <8>[ 424.450920] <8>[ 424.692989] <8>[ 424.899171] <8>[ 425.136710] <8>[ 425.384396] <8>[ 425.633128] <8>[ 425.847855] <8>[ 426.051368] <8>[ 426.279029] <8>[ 426.484005] <8>[ 426.673388] <8>[ 426.904907] <8>[ 427.132459] <8>[ 427.366839] <8>[ 427.972773] <8>[ 428.208073] <8>[ 428.435664] <8>[ 428.692165] <8>[ 428.936436] <8>[ 429.176692] <8>[ 429.431679] <8>[ 429.673367] <8>[ 429.921766] <8>[ 430.162849] <8>[ 430.405198] <8>[ 430.652233] <8>[ 430.883132] <8>[ 431.124962] <8>[ 431.351307] <8>[ 431.577189] <8>[ 431.771770] <8>[ 432.010522] <8>[ 432.240293] <8>[ 432.476928] <8>[ 432.714400] <8>[ 432.953703] <8>[ 433.154150] <8>[ 433.405459] <8>[ 433.633489] <8>[ 433.874262] <8>[ 434.113187] <8>[ 434.353219] <8>[ 434.590904] <8>[ 434.820451] <8>[ 435.054431] <8>[ 435.297412] <8>[ 435.511782] <8>[ 435.709702] <8>[ 435.966668] <8>[ 436.201672] <8>[ 436.454321] <8>[ 436.690916] <8>[ 436.893132] <8>[ 437.115794] <8>[ 437.350413] <8>[ 437.586487] <8>[ 437.823339] <8>[ 438.062615] <8>[ 438.307621] <8>[ 438.542794] <8>[ 438.751720] <8>[ 438.945754] <8>[ 439.178598] <8>[ 439.424053] <8>[ 439.667526] <8>[ 439.926878] <8>[ 440.189183] <8>[ 440.433812] <8>[ 440.664155] <8>[ 440.898664] <8>[ 441.101610] <8>[ 441.336539] <8>[ 441.572954] <8>[ 441.807878] <8>[ 442.008676] <8>[ 442.189560] <8>[ 442.415689] <8>[ 442.652375] <8>[ 442.886137] <8>[ 443.129361] <8>[ 443.373110] <8>[ 443.611210] <8>[ 443.848625] <8>[ 444.097192] <8>[ 444.327562] <8>[ 444.567353] <8>[ 444.806414] <8>[ 445.010712] <8>[ 445.238795] <8>[ 445.473779] <8>[ 445.679258] <8>[ 445.921731] <8>[ 446.166224] <8>[ 446.419673] <8>[ 446.615100] <8>[ 446.847430] <8>[ 447.076158] <8>[ 447.267074] <8>[ 447.491608] <8>[ 447.722496] <8>[ 447.953140] <8>[ 448.147226] <8>[ 448.386716] <8>[ 448.645111] <8>[ 448.887942] <8>[ 449.122630] <8>[ 449.365143] <8>[ 449.600786] <8>[ 449.847953] <8>[ 450.085129] <8>[ 450.328910] <8>[ 450.574864] <8>[ 450.820236] <8>[ 451.049221] <8>[ 451.296451] <8>[ 451.534908] <8>[ 451.767400] <8>[ 452.014603] <8>[ 452.243597] <8>[ 452.494784] <8>[ 452.743259] <8>[ 452.928120] <8>[ 453.155917] <8>[ 453.391850] <8>[ 453.626429] <8>[ 453.874237] <8>[ 454.056859] <8>[ 454.248458] <8>[ 454.468532] <8>[ 454.693844] <8>[ 454.936955] <8>[ 455.171909] <8>[ 455.405414] <8>[ 455.624708] <8>[ 455.880132] <8>[ 456.101088] <8>[ 456.357509] <8>[ 456.581123] <8>[ 456.846592] <8>[ 457.044065] <8>[ 457.222902] <8>[ 457.440273] <8>[ 457.626130] <8>[ 457.867697] <8>[ 458.101477] <8>[ 458.292365] <8>[ 458.527573] <8>[ 458.770776] <8>[ 458.988120] <8>[ 459.216072] <8>[ 459.456821] <8>[ 459.687083] <8>[ 459.915208] <8>[ 460.147931] <8>[ 460.596171] <8>[ 460.916966] <8>[ 461.149414] <8>[ 461.390794] <8>[ 461.639525] <8>[ 461.877169] <8>[ 462.122692] <8>[ 462.364135] <8>[ 462.576320] <8>[ 462.804656] <8>[ 463.047953] <8>[ 463.301221] <8>[ 463.550819] <8>[ 463.771660] <8>[ 463.957007] <8>[ 464.204210] <8>[ 464.450955] <8>[ 464.713814] <8>[ 464.961002] <8>[ 465.210241] <8>[ 465.460138] <8>[ 465.703083] <8>[ 465.936466] <8>[ 466.184111] <8>[ 466.473489] <8>[ 466.729675] <8>[ 466.975291] <8>[ 467.221355] <8>[ 467.477255] <8>[ 467.694129] <8>[ 467.893565] <8>[ 468.151804] <8>[ 468.394911] <8>[ 468.633604] <8>[ 468.868371] <8>[ 469.066904] <8>[ 469.307504] <8>[ 469.541762] <8>[ 469.783333] <8>[ 470.027019] <8>[ 470.261238] <8>[ 470.494795] <8>[ 470.737359] <8>[ 470.939194] <8>[ 471.180922] <8>[ 471.429658] <8>[ 471.652831] <8>[ 471.892936] <8>[ 472.117020] <8>[ 472.359268] <8>[ 472.599851] <8>[ 472.832003] <8>[ 473.066341] <8>[ 473.256524] <8>[ 473.489524] <8>[ 473.731950] <8>[ 473.955316] <8>[ 474.138334] <8>[ 474.373138] + set +x <8>[ 474.415462] [?2004hroot@runner-vwmj3eza-project-40964107-concurrent-2:~# poweroff